-
Data and Model Dependencies of Membership Inference Attack
Machine Learning (ML) techniques are used by most data-driven organisati...
read it
-
Invisible Backdoor Attacks Against Deep Neural Networks
Deep neural networks (DNNs) have been proven vulnerable to backdoor atta...
read it
-
The Audio Auditor: Participant-Level Membership Inference in Internet of Things Voice Services
Voice interfaces and assistants implemented by various services have bec...
read it
-
The Audio Auditor: Participant-Level Membership Inference in Voice-Based IoT
Voice interfaces and assistants implemented by various services have bec...
read it
-
Averaging Attacks on Bounded Perturbation Algorithms
We describe and evaluate an attack that reconstructs the histogram of an...
read it
-
Private Continual Release of Real-Valued Data Streams
We present a differentially private mechanism to display statistics (e.g...
read it
-
A Geometric Approach for Real-time Monitoring of Dynamic Large Scale Graphs: AS-level graphs illustrated
The monitoring of large dynamic networks is a major chal- lenge for a wi...
read it

Dali Kaafar
is this you? claim profile