Picture for Oluwaseyi Feyisetan

Oluwaseyi Feyisetan

Removing Spurious Correlation from Neural Network Interpretations

Add code
Dec 03, 2024
Figure 1 for Removing Spurious Correlation from Neural Network Interpretations
Figure 2 for Removing Spurious Correlation from Neural Network Interpretations
Figure 3 for Removing Spurious Correlation from Neural Network Interpretations
Viaarxiv icon

Fast Training Dataset Attribution via In-Context Learning

Add code
Aug 14, 2024
Viaarxiv icon

On Codomain Separability and Label Inference from (Noisy) Loss Functions

Add code
Jul 07, 2021
Figure 1 for On Codomain Separability and Label Inference from (Noisy) Loss Functions
Figure 2 for On Codomain Separability and Label Inference from (Noisy) Loss Functions
Figure 3 for On Codomain Separability and Label Inference from (Noisy) Loss Functions
Figure 4 for On Codomain Separability and Label Inference from (Noisy) Loss Functions
Viaarxiv icon

Label Inference Attacks from Log-loss Scores

Add code
May 18, 2021
Figure 1 for Label Inference Attacks from Log-loss Scores
Figure 2 for Label Inference Attacks from Log-loss Scores
Figure 3 for Label Inference Attacks from Log-loss Scores
Figure 4 for Label Inference Attacks from Log-loss Scores
Viaarxiv icon

On a Utilitarian Approach to Privacy Preserving Text Generation

Add code
Apr 23, 2021
Figure 1 for On a Utilitarian Approach to Privacy Preserving Text Generation
Figure 2 for On a Utilitarian Approach to Privacy Preserving Text Generation
Figure 3 for On a Utilitarian Approach to Privacy Preserving Text Generation
Viaarxiv icon

Research Challenges in Designing Differentially Private Text Generation Mechanisms

Add code
Dec 10, 2020
Figure 1 for Research Challenges in Designing Differentially Private Text Generation Mechanisms
Viaarxiv icon

A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric

Add code
Oct 22, 2020
Figure 1 for A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric
Figure 2 for A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric
Figure 3 for A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric
Figure 4 for A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric
Viaarxiv icon

Differentially Private Adversarial Robustness Through Randomized Perturbations

Add code
Sep 27, 2020
Figure 1 for Differentially Private Adversarial Robustness Through Randomized Perturbations
Figure 2 for Differentially Private Adversarial Robustness Through Randomized Perturbations
Figure 3 for Differentially Private Adversarial Robustness Through Randomized Perturbations
Figure 4 for Differentially Private Adversarial Robustness Through Randomized Perturbations
Viaarxiv icon

On Primes, Log-Loss Scores and Privacy

Add code
Sep 17, 2020
Viaarxiv icon

Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text

Add code
Oct 20, 2019
Figure 1 for Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Figure 2 for Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Figure 3 for Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Figure 4 for Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text
Viaarxiv icon