Picture for Seira Hidano

Seira Hidano

EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning

Add code
Dec 12, 2023
Viaarxiv icon

Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems

Add code
Nov 01, 2023
Viaarxiv icon

VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations

Add code
Jun 02, 2023
Viaarxiv icon

NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression

Add code
Apr 04, 2023
Figure 1 for NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression
Figure 2 for NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression
Figure 3 for NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression
Figure 4 for NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression
Viaarxiv icon

Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers

Add code
Sep 21, 2022
Figure 1 for Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers
Figure 2 for Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers
Figure 3 for Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers
Figure 4 for Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers
Viaarxiv icon

Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems

Add code
Mar 18, 2022
Figure 1 for Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems
Figure 2 for Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems
Figure 3 for Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems
Figure 4 for Adversarial Attacks on Deep Learning-based Video Compression and Classification Systems
Viaarxiv icon

Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy

Add code
Feb 21, 2022
Figure 1 for Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy
Figure 2 for Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy
Figure 3 for Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy
Figure 4 for Degree-Preserving Randomized Response for Graph Neural Networks under Local Differential Privacy
Viaarxiv icon

SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text

Add code
Oct 13, 2021
Figure 1 for SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text
Figure 2 for SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text
Figure 3 for SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text
Figure 4 for SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text
Viaarxiv icon

TransMIA: Membership Inference Attacks Using Transfer Shadow Training

Add code
Nov 30, 2020
Figure 1 for TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Figure 2 for TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Figure 3 for TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Figure 4 for TransMIA: Membership Inference Attacks Using Transfer Shadow Training
Viaarxiv icon

Identifying Adversarial Sentences by Analyzing Text Complexity

Add code
Dec 19, 2019
Figure 1 for Identifying Adversarial Sentences by Analyzing Text Complexity
Figure 2 for Identifying Adversarial Sentences by Analyzing Text Complexity
Figure 3 for Identifying Adversarial Sentences by Analyzing Text Complexity
Figure 4 for Identifying Adversarial Sentences by Analyzing Text Complexity
Viaarxiv icon