firstbacksecondback
11 Results
Poster
|
Wed 18:30 |
Generating steganographic images via adversarial training Jamie Hayes · George Danezis |
|
Poster
|
Tue 18:30 |
Certified Defenses for Data Poisoning Attacks Jacob Steinhardt · Pang Wei Koh · Percy Liang |
|
Poster
|
Wed 18:30 |
Deanonymization in the Bitcoin P2P Network Giulia Fanti · Pramod Viswanath |
|
Poster
|
Mon 18:30 |
SafetyNets: Verifiable Execution of Deep Neural Networks on an Untrusted Cloud Zahra Ghodsi · Tianyu Gu · Siddharth Garg |
|
Poster
|
Wed 18:30 |
Collecting Telemetry Data Privately Bolin Ding · Janardhan Kulkarni · Sergey Yekhanin |
|
Poster
|
Wed 18:30 |
Accuracy First: Selecting a Differential Privacy Level for Accuracy Constrained ERM Katrina Ligett · Seth Neel · Aaron Roth · Bo Waggoner · Steven Wu |
|
Poster
|
Tue 18:30 |
Houdini: Fooling Deep Structured Visual and Speech Recognition Models with Adversarial Examples Moustapha Cisse · Yossi Adi · Natalia Neverova · Joseph Keshet |
|
Poster
|
Tue 18:30 |
Differentially Private Empirical Risk Minimization Revisited: Faster and More General Di Wang · Minwei Ye · Jinhui Xu |
|
Poster
|
Wed 18:30 |
Practical Locally Private Heavy Hitters Raef Bassily · Kobbi Nissim · Uri Stemmer · Abhradeep Guha Thakurta |
|
Poster
|
Wed 18:30 |
Renyi Differential Privacy Mechanisms for Posterior Sampling Joseph Geumlek · Shuang Song · Kamalika Chaudhuri |
|
Poster
|
Mon 18:30 |
Differentially private Bayesian learning on distributed data Mikko Heikkilä · Eemil Lagerspetz · Samuel Kaski · Kana Shimizu · Sasu Tarkoma · Antti Honkela |