Picture for Dan Boneh

Dan Boneh

Cybench: A Framework for Evaluating Cybersecurity Capabilities and Risk of Language Models

Add code
Aug 15, 2024
Viaarxiv icon

Optimistic Verifiable Training by Controlling Hardware Nondeterminism

Add code
Mar 16, 2024
Viaarxiv icon

FairProof : Confidential and Certifiable Fairness for Neural Networks

Add code
Feb 19, 2024
Viaarxiv icon

Differentially Private Learning Needs Better Features (or Much More Data)

Add code
Nov 26, 2020
Figure 1 for Differentially Private Learning Needs Better Features (or Much More Data)
Figure 2 for Differentially Private Learning Needs Better Features (or Much More Data)
Figure 3 for Differentially Private Learning Needs Better Features (or Much More Data)
Figure 4 for Differentially Private Learning Needs Better Features (or Much More Data)
Viaarxiv icon

How Relevant is the Turing Test in the Age of Sophisbots?

Add code
Aug 30, 2019
Viaarxiv icon

Adversarial Training and Robustness for Multiple Perturbations

Add code
Apr 30, 2019
Figure 1 for Adversarial Training and Robustness for Multiple Perturbations
Figure 2 for Adversarial Training and Robustness for Multiple Perturbations
Figure 3 for Adversarial Training and Robustness for Multiple Perturbations
Figure 4 for Adversarial Training and Robustness for Multiple Perturbations
Viaarxiv icon

Ad-versarial: Defeating Perceptual Ad-Blocking

Add code
Nov 08, 2018
Figure 1 for Ad-versarial: Defeating Perceptual Ad-Blocking
Figure 2 for Ad-versarial: Defeating Perceptual Ad-Blocking
Figure 3 for Ad-versarial: Defeating Perceptual Ad-Blocking
Figure 4 for Ad-versarial: Defeating Perceptual Ad-Blocking
Viaarxiv icon

Ensemble Adversarial Training: Attacks and Defenses

Add code
Jul 22, 2018
Figure 1 for Ensemble Adversarial Training: Attacks and Defenses
Figure 2 for Ensemble Adversarial Training: Attacks and Defenses
Figure 3 for Ensemble Adversarial Training: Attacks and Defenses
Figure 4 for Ensemble Adversarial Training: Attacks and Defenses
Viaarxiv icon

Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

Add code
Jun 08, 2018
Figure 1 for Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware
Figure 2 for Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware
Figure 3 for Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware
Figure 4 for Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware
Viaarxiv icon

The Space of Transferable Adversarial Examples

Add code
May 23, 2017
Figure 1 for The Space of Transferable Adversarial Examples
Figure 2 for The Space of Transferable Adversarial Examples
Figure 3 for The Space of Transferable Adversarial Examples
Figure 4 for The Space of Transferable Adversarial Examples
Viaarxiv icon