Picture for Sebastian Szyller

Sebastian Szyller

Imperceptible Adversarial Examples in the Physical World

Add code
Nov 25, 2024
Viaarxiv icon

SoK: Unintended Interactions among Machine Learning Defenses and Risks

Add code
Dec 07, 2023
Viaarxiv icon

False Claims against Model Ownership Resolution

Add code
Apr 28, 2023
Viaarxiv icon

On the Robustness of Dataset Inference

Add code
Oct 24, 2022
Viaarxiv icon

Conflicting Interactions Among Protections Mechanisms for Machine Learning Models

Add code
Jul 05, 2022
Figure 1 for Conflicting Interactions Among Protections Mechanisms for Machine Learning Models
Figure 2 for Conflicting Interactions Among Protections Mechanisms for Machine Learning Models
Figure 3 for Conflicting Interactions Among Protections Mechanisms for Machine Learning Models
Figure 4 for Conflicting Interactions Among Protections Mechanisms for Machine Learning Models
Viaarxiv icon

SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning

Add code
Dec 04, 2021
Figure 1 for SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Figure 2 for SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Figure 3 for SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Figure 4 for SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning
Viaarxiv icon

Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks

Add code
Apr 26, 2021
Figure 1 for Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks
Figure 2 for Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks
Figure 3 for Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks
Figure 4 for Good Artists Copy, Great Artists Steal: Model Extraction Attacks Against Image Translation Generative Adversarial Networks
Viaarxiv icon

Extraction of Complex DNN Models: Real Threat or Boogeyman?

Add code
Oct 11, 2019
Figure 1 for Extraction of Complex DNN Models: Real Threat or Boogeyman?
Figure 2 for Extraction of Complex DNN Models: Real Threat or Boogeyman?
Figure 3 for Extraction of Complex DNN Models: Real Threat or Boogeyman?
Figure 4 for Extraction of Complex DNN Models: Real Threat or Boogeyman?
Viaarxiv icon

Detecting organized eCommerce fraud using scalable categorical clustering

Add code
Oct 10, 2019
Figure 1 for Detecting organized eCommerce fraud using scalable categorical clustering
Figure 2 for Detecting organized eCommerce fraud using scalable categorical clustering
Figure 3 for Detecting organized eCommerce fraud using scalable categorical clustering
Figure 4 for Detecting organized eCommerce fraud using scalable categorical clustering
Viaarxiv icon

DAWN: Dynamic Adversarial Watermarking of Neural Networks

Add code
Jun 12, 2019
Figure 1 for DAWN: Dynamic Adversarial Watermarking of Neural Networks
Figure 2 for DAWN: Dynamic Adversarial Watermarking of Neural Networks
Figure 3 for DAWN: Dynamic Adversarial Watermarking of Neural Networks
Figure 4 for DAWN: Dynamic Adversarial Watermarking of Neural Networks
Viaarxiv icon