firstbacksecondback
13 Results
Poster
|
Wed 9:00 |
Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching Jonas Geiping · Liam H Fowl · Ronny Huang · Wojciech Czaja · Gavin Taylor · Michael Moeller · Tom Goldstein |
|
Poster
|
Mon 9:00 |
Teaching Temporal Logics to Neural Networks Christopher Hahn · Frederik Schmitt · Jens Kreber · Markus Rabe · Bernd Finkbeiner |
|
Poster
|
Mon 17:00 |
SAFENet: A Secure, Accurate and Fast Neural Network Inference Qian Lou · Yilin Shen · Hongxia Jin · Lei Jiang |
|
Poster
|
Thu 17:00 |
Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models Mitchell Hill · Jonathan Mitchell · Song-Chun Zhu |
|
Poster
|
Thu 9:00 |
CaPC Learning: Confidential and Private Collaborative Learning Christopher Choquette-Choo · Natalie Dullerud · Adam Dziedzic · Yunxiang Zhang · Somesh Jha · Nicolas Papernot · Xiao Wang |
|
Poster
|
Tue 17:00 |
Information Laundering for Model Privacy Xinran Wang · Yu Xiang · Jun Gao · Jie Ding |
|
Workshop
|
Fri 7:00 |
Synthetic Data Generation: Quality, Privacy, Bias Sergul Aydore · Krishnaram Kenthapadi · Haipeng Chen · Edward Choi · Jamie Hayes · Mario Fritz · Rachel Cummings · Krishnaram Kenthapadi |
|
Spotlight
|
Mon 20:38 |
Information Laundering for Model Privacy Xinran Wang · Yu Xiang · Jun Gao · Jie Ding |
|
Workshop
|
Fri 8:45 |
Security and Safety in Machine Learning Systems Xinyun Chen · Cihang Xie · Ali Shafahi · Bo Li · Ding Zhao · Tom Goldstein · Dawn Song |
|
Poster
|
Wed 17:00 |
Protecting DNNs from Theft using an Ensemble of Diverse Models Sanjay Kariyappa · Atul Prakash · Moinuddin K Qureshi |
|
Workshop
|
Fri 16:16 |
Bo Li - Secure Learning in Adversarial Environments with Knowledge Inference Bo Li |
|
Workshop
|
Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release Liam H Fowl · Ping-yeh Chiang · Micah Goldblum · Jonas Geiping · Tom Goldstein |