Picture for Massimo Bernaschi

Massimo Bernaschi

Unleashing the Tiger: Inference Attacks on Split Learning

Add code
Dec 04, 2020
Figure 1 for Unleashing the Tiger: Inference Attacks on Split Learning
Figure 2 for Unleashing the Tiger: Inference Attacks on Split Learning
Figure 3 for Unleashing the Tiger: Inference Attacks on Split Learning
Figure 4 for Unleashing the Tiger: Inference Attacks on Split Learning
Viaarxiv icon

Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries

Add code
Oct 26, 2020
Figure 1 for Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Figure 2 for Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Figure 3 for Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Figure 4 for Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Viaarxiv icon

Interpretable Probabilistic Password Strength Meters via Deep Learning

Add code
Apr 29, 2020
Figure 1 for Interpretable Probabilistic Password Strength Meters via Deep Learning
Figure 2 for Interpretable Probabilistic Password Strength Meters via Deep Learning
Figure 3 for Interpretable Probabilistic Password Strength Meters via Deep Learning
Figure 4 for Interpretable Probabilistic Password Strength Meters via Deep Learning
Viaarxiv icon

Out-domain examples for generative models

Add code
Mar 07, 2019
Figure 1 for Out-domain examples for generative models
Figure 2 for Out-domain examples for generative models
Figure 3 for Out-domain examples for generative models
Figure 4 for Out-domain examples for generative models
Viaarxiv icon