Picture for Dali Kaafar

Dali Kaafar

Preempting Text Sanitization Utility in Resource-Constrained Privacy-Preserving LLM Interactions

Add code
Nov 18, 2024
Viaarxiv icon

Practical, Private Assurance of the Value of Collaboration

Add code
Oct 04, 2023
Viaarxiv icon

On the Adversarial Inversion of Deep Biometric Representations

Add code
Apr 12, 2023
Viaarxiv icon

DDoD: Dual Denial of Decision Attacks on Human-AI Teams

Add code
Dec 07, 2022
Viaarxiv icon

Unintended Memorization and Timing Attacks in Named Entity Recognition Models

Add code
Nov 04, 2022
Viaarxiv icon

Data and Model Dependencies of Membership Inference Attack

Add code
Feb 17, 2020
Figure 1 for Data and Model Dependencies of Membership Inference Attack
Figure 2 for Data and Model Dependencies of Membership Inference Attack
Figure 3 for Data and Model Dependencies of Membership Inference Attack
Figure 4 for Data and Model Dependencies of Membership Inference Attack
Viaarxiv icon

Invisible Backdoor Attacks Against Deep Neural Networks

Add code
Sep 06, 2019
Figure 1 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 2 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 3 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 4 for Invisible Backdoor Attacks Against Deep Neural Networks
Viaarxiv icon

A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated

Add code
Jun 02, 2018
Figure 1 for A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
Figure 2 for A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
Figure 3 for A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
Figure 4 for A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
Viaarxiv icon