Picture for Soteris Demetriou

Soteris Demetriou

DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech

Add code
Oct 05, 2024
Viaarxiv icon

Prosody-Driven Privacy-Preserving Dementia Detection

Add code
Jul 03, 2024
Viaarxiv icon

Adversarial 3D Virtual Patches using Integrated Gradients

Add code
Jun 01, 2024
Viaarxiv icon

Data Augmentation for Dementia Detection in Spoken Language

Add code
Jun 26, 2022
Figure 1 for Data Augmentation for Dementia Detection in Spoken Language
Figure 2 for Data Augmentation for Dementia Detection in Spoken Language
Figure 3 for Data Augmentation for Dementia Detection in Spoken Language
Figure 4 for Data Augmentation for Dementia Detection in Spoken Language
Viaarxiv icon

Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception

Add code
Apr 29, 2022
Figure 1 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 2 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 3 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 4 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Viaarxiv icon

Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception

Add code
Jun 15, 2021
Figure 1 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 2 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 3 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 4 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Viaarxiv icon

Quantifying Information Leakage from Gradients

Add code
May 28, 2021
Figure 1 for Quantifying Information Leakage from Gradients
Figure 2 for Quantifying Information Leakage from Gradients
Figure 3 for Quantifying Information Leakage from Gradients
Figure 4 for Quantifying Information Leakage from Gradients
Viaarxiv icon

Object Removal Attacks on LiDAR-based 3D Object Detectors

Add code
Feb 07, 2021
Figure 1 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 2 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 3 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Viaarxiv icon

Layer-wise Characterization of Latent Information Leakage in Federated Learning

Add code
Oct 17, 2020
Figure 1 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 2 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 3 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 4 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Viaarxiv icon

DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

Add code
Apr 12, 2020
Figure 1 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 2 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 3 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 4 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Viaarxiv icon