Picture for Shruti Tople

Shruti Tople

Microsoft Research

Permissive Information-Flow Analysis for Large Language Models

Add code
Oct 04, 2024
Viaarxiv icon

Closed-Form Bounds for DP-SGD against Record-level Inference

Add code
Feb 22, 2024
Viaarxiv icon

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective

Add code
Nov 27, 2023
Viaarxiv icon

SoK: Memorization in General-Purpose Large Language Models

Add code
Oct 24, 2023
Viaarxiv icon

Why Train More? Effective and Efficient Membership Inference via Memorization

Add code
Oct 12, 2023
Figure 1 for Why Train More? Effective and Efficient Membership Inference via Memorization
Figure 2 for Why Train More? Effective and Efficient Membership Inference via Memorization
Figure 3 for Why Train More? Effective and Efficient Membership Inference via Memorization
Figure 4 for Why Train More? Effective and Efficient Membership Inference via Memorization
Viaarxiv icon

Re-aligning Shadow Models can Improve White-box Membership Inference Attacks

Add code
Jun 08, 2023
Viaarxiv icon

On the Efficacy of Differentially Private Few-shot Image Classification

Add code
Feb 02, 2023
Viaarxiv icon

Analyzing Leakage of Personally Identifiable Information in Language Models

Add code
Feb 01, 2023
Figure 1 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 2 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 3 for Analyzing Leakage of Personally Identifiable Information in Language Models
Figure 4 for Analyzing Leakage of Personally Identifiable Information in Language Models
Viaarxiv icon

SoK: Let The Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

Add code
Dec 21, 2022
Viaarxiv icon

Invariant Aggregator for Defending Federated Backdoor Attacks

Add code
Oct 04, 2022
Figure 1 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 2 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 3 for Invariant Aggregator for Defending Federated Backdoor Attacks
Figure 4 for Invariant Aggregator for Defending Federated Backdoor Attacks
Viaarxiv icon