Picture for Vincent Bindschaedler

Vincent Bindschaedler

DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning

Add code
Nov 02, 2023
Figure 1 for DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning
Figure 2 for DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning
Figure 3 for DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning
Figure 4 for DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning
Viaarxiv icon

SoK: Memorization in General-Purpose Large Language Models

Add code
Oct 24, 2023
Viaarxiv icon

On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning

Add code
May 13, 2022
Figure 1 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 2 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 3 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Figure 4 for On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning
Viaarxiv icon

Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems

Add code
Mar 10, 2022
Figure 1 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 2 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 3 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Figure 4 for Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems
Viaarxiv icon

Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs

Add code
Oct 25, 2021
Figure 1 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 2 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 3 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Figure 4 for Beyond $L_p$ clipping: Equalization-based Psychoacoustic Attacks against ASRs
Viaarxiv icon

Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption

Add code
Oct 13, 2021
Figure 1 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 2 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 3 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Figure 4 for Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption
Viaarxiv icon

SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems

Add code
Jul 21, 2020
Figure 1 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 2 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 3 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Figure 4 for SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems
Viaarxiv icon

Understanding Membership Inferences on Well-Generalized Learning Models

Add code
Feb 13, 2018
Figure 1 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 2 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 3 for Understanding Membership Inferences on Well-Generalized Learning Models
Figure 4 for Understanding Membership Inferences on Well-Generalized Learning Models
Viaarxiv icon

Plausible Deniability for Privacy-Preserving Data Synthesis

Add code
Aug 26, 2017
Figure 1 for Plausible Deniability for Privacy-Preserving Data Synthesis
Figure 2 for Plausible Deniability for Privacy-Preserving Data Synthesis
Figure 3 for Plausible Deniability for Privacy-Preserving Data Synthesis
Figure 4 for Plausible Deniability for Privacy-Preserving Data Synthesis
Viaarxiv icon