Picture for Dayong Ye

Dayong Ye

Minhui

When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?

Add code
Oct 20, 2024
Viaarxiv icon

Reinforcement Unlearning

Add code
Dec 26, 2023
Viaarxiv icon

Boosting Model Inversion Attacks with Adversarial Examples

Add code
Jun 24, 2023
Viaarxiv icon

New Challenges in Reinforcement Learning: A Survey of Security and Privacy

Add code
Dec 31, 2022
Viaarxiv icon

One Parameter Defense -- Defending against Data Inference Attacks via Differential Privacy

Add code
Mar 13, 2022
Viaarxiv icon

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It

Add code
Mar 13, 2022
Figure 1 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 2 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 3 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 4 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Viaarxiv icon

Label-only Model Inversion Attack: The Attack that Requires the Least Information

Add code
Mar 13, 2022
Figure 1 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 2 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 3 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 4 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Viaarxiv icon

DP-Image: Differential Privacy for Image Data in Feature Space

Add code
Mar 12, 2021
Figure 1 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 2 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 3 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 4 for DP-Image: Differential Privacy for Image Data in Feature Space
Viaarxiv icon

Differentially Private Multi-Agent Planning for Logistic-like Problems

Add code
Aug 16, 2020
Figure 1 for Differentially Private Multi-Agent Planning for Logistic-like Problems
Figure 2 for Differentially Private Multi-Agent Planning for Logistic-like Problems
Figure 3 for Differentially Private Multi-Agent Planning for Logistic-like Problems
Figure 4 for Differentially Private Multi-Agent Planning for Logistic-like Problems
Viaarxiv icon

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence

Add code
Aug 05, 2020
Figure 1 for More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
Figure 2 for More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
Figure 3 for More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
Figure 4 for More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
Viaarxiv icon