Picture for Mehmet Emre Gursoy

Mehmet Emre Gursoy

Utility-Optimized Synthesis of Differentially Private Location Traces

Add code
Sep 14, 2020
Figure 1 for Utility-Optimized Synthesis of Differentially Private Location Traces
Figure 2 for Utility-Optimized Synthesis of Differentially Private Location Traces
Figure 3 for Utility-Optimized Synthesis of Differentially Private Location Traces
Figure 4 for Utility-Optimized Synthesis of Differentially Private Location Traces
Viaarxiv icon

Data Poisoning Attacks Against Federated Learning Systems

Add code
Aug 11, 2020
Figure 1 for Data Poisoning Attacks Against Federated Learning Systems
Figure 2 for Data Poisoning Attacks Against Federated Learning Systems
Viaarxiv icon

Understanding Object Detection Through An Adversarial Lens

Add code
Jul 11, 2020
Figure 1 for Understanding Object Detection Through An Adversarial Lens
Figure 2 for Understanding Object Detection Through An Adversarial Lens
Figure 3 for Understanding Object Detection Through An Adversarial Lens
Figure 4 for Understanding Object Detection Through An Adversarial Lens
Viaarxiv icon

LDP-Fed: Federated Learning with Local Differential Privacy

Add code
Jun 05, 2020
Figure 1 for LDP-Fed: Federated Learning with Local Differential Privacy
Figure 2 for LDP-Fed: Federated Learning with Local Differential Privacy
Figure 3 for LDP-Fed: Federated Learning with Local Differential Privacy
Figure 4 for LDP-Fed: Federated Learning with Local Differential Privacy
Viaarxiv icon

A Framework for Evaluating Gradient Leakage Attacks in Federated Learning

Add code
Apr 23, 2020
Figure 1 for A Framework for Evaluating Gradient Leakage Attacks in Federated Learning
Figure 2 for A Framework for Evaluating Gradient Leakage Attacks in Federated Learning
Figure 3 for A Framework for Evaluating Gradient Leakage Attacks in Federated Learning
Figure 4 for A Framework for Evaluating Gradient Leakage Attacks in Federated Learning
Viaarxiv icon

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

Add code
Apr 09, 2020
Figure 1 for TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems
Figure 2 for TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems
Figure 3 for TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems
Figure 4 for TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems
Viaarxiv icon

Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability

Add code
Nov 21, 2019
Figure 1 for Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability
Figure 2 for Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability
Figure 3 for Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability
Figure 4 for Effects of Differential Privacy and Data Skewness on Membership Inference Vulnerability
Viaarxiv icon

Differentially Private Model Publishing for Deep Learning

Add code
May 05, 2019
Figure 1 for Differentially Private Model Publishing for Deep Learning
Figure 2 for Differentially Private Model Publishing for Deep Learning
Figure 3 for Differentially Private Model Publishing for Deep Learning
Figure 4 for Differentially Private Model Publishing for Deep Learning
Viaarxiv icon

Adversarial Examples in Deep Learning: Characterization and Divergence

Add code
Oct 29, 2018
Figure 1 for Adversarial Examples in Deep Learning: Characterization and Divergence
Figure 2 for Adversarial Examples in Deep Learning: Characterization and Divergence
Figure 3 for Adversarial Examples in Deep Learning: Characterization and Divergence
Figure 4 for Adversarial Examples in Deep Learning: Characterization and Divergence
Viaarxiv icon