Picture for Vincent Bindschaedler

Vincent Bindschaedler

University of Florida

Characterizing Resource Sharing Practices on Underground Internet Forum Synthetic Non-Consensual Intimate Image Content Creation Communities

Add code
Apr 14, 2026
Viaarxiv icon

Towards Reliable and Generalizable Differentially Private Machine Learning (Extended Version)

Add code
Aug 21, 2025
Viaarxiv icon

Inference Attacks for X-Vector Speaker Anonymization

Add code
May 13, 2025
Figure 1 for Inference Attacks for X-Vector Speaker Anonymization
Figure 2 for Inference Attacks for X-Vector Speaker Anonymization
Figure 3 for Inference Attacks for X-Vector Speaker Anonymization
Figure 4 for Inference Attacks for X-Vector Speaker Anonymization
Viaarxiv icon

DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning

Add code
Nov 02, 2023
Figure 1 for DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning
Figure 2 for DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning
Figure 3 for DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning
Figure 4 for DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning
Viaarxiv icon

SoK: Memorization in General-Purpose Large Language Models

Add code
Oct 24, 2023
Figure 1 for SoK: Memorization in General-Purpose Large Language Models
Viaarxiv icon

On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning

Add code
May 13, 2022
Figure 1 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 2 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 3 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 4 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Viaarxiv icon

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

Add code
Mar 10, 2022
Figure 1 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 2 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 3 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 4 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Viaarxiv icon

Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs

Add code
Oct 25, 2021
Figure 1 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 2 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 3 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 4 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Viaarxiv icon

Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption

Add code
Oct 13, 2021
Figure 1 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 2 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 3 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 4 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Viaarxiv icon

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

Add code
Jul 21, 2020
Figure 1 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 2 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 3 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 4 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Viaarxiv icon