Picture for Mathias Humbert

Mathias Humbert

Link Stealing Attacks Against Inductive Graph Neural Networks

Add code
May 09, 2024
Viaarxiv icon

Fine-Tuning Is All You Need to Mitigate Backdoor Attacks

Add code
Dec 18, 2022
Figure 1 for Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Figure 2 for Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Figure 3 for Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Figure 4 for Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Viaarxiv icon

Data Poisoning Attacks Against Multimodal Encoders

Add code
Sep 30, 2022
Figure 1 for Data Poisoning Attacks Against Multimodal Encoders
Figure 2 for Data Poisoning Attacks Against Multimodal Encoders
Figure 3 for Data Poisoning Attacks Against Multimodal Encoders
Figure 4 for Data Poisoning Attacks Against Multimodal Encoders
Viaarxiv icon

Graph Unlearning

Add code
Mar 27, 2021
Figure 1 for Graph Unlearning
Figure 2 for Graph Unlearning
Figure 3 for Graph Unlearning
Figure 4 for Graph Unlearning
Viaarxiv icon

BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models

Oct 08, 2020
Figure 1 for BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models
Figure 2 for BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models
Figure 3 for BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models
Figure 4 for BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models
Viaarxiv icon

When Machine Unlearning Jeopardizes Privacy

Add code
May 05, 2020
Figure 1 for When Machine Unlearning Jeopardizes Privacy
Figure 2 for When Machine Unlearning Jeopardizes Privacy
Figure 3 for When Machine Unlearning Jeopardizes Privacy
Figure 4 for When Machine Unlearning Jeopardizes Privacy
Viaarxiv icon

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models

Add code
Jun 04, 2018
Figure 1 for ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
Figure 2 for ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
Figure 3 for ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
Figure 4 for ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models
Viaarxiv icon