Alert button
Picture for Giuseppe Ateniese

Giuseppe Ateniese

Alert button

Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models

Add code
Bookmark button
Alert button
Nov 15, 2023
Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak

Viaarxiv icon

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

Add code
Bookmark button
Alert button
Jan 18, 2023
Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso

Figure 1 for Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data
Figure 2 for Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data
Figure 3 for Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data
Figure 4 for Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data
Viaarxiv icon

Eluding Secure Aggregation in Federated Learning via Model Inconsistency

Add code
Bookmark button
Alert button
Nov 14, 2021
Dario Pasquini, Danilo Francati, Giuseppe Ateniese

Figure 1 for Eluding Secure Aggregation in Federated Learning via Model Inconsistency
Figure 2 for Eluding Secure Aggregation in Federated Learning via Model Inconsistency
Figure 3 for Eluding Secure Aggregation in Federated Learning via Model Inconsistency
Figure 4 for Eluding Secure Aggregation in Federated Learning via Model Inconsistency
Viaarxiv icon

Unleashing the Tiger: Inference Attacks on Split Learning

Add code
Bookmark button
Alert button
Dec 04, 2020
Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

Figure 1 for Unleashing the Tiger: Inference Attacks on Split Learning
Figure 2 for Unleashing the Tiger: Inference Attacks on Split Learning
Figure 3 for Unleashing the Tiger: Inference Attacks on Split Learning
Figure 4 for Unleashing the Tiger: Inference Attacks on Split Learning
Viaarxiv icon

Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries

Add code
Bookmark button
Alert button
Oct 26, 2020
Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi

Figure 1 for Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Figure 2 for Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Figure 3 for Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Figure 4 for Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Viaarxiv icon

Interpretable Probabilistic Password Strength Meters via Deep Learning

Add code
Bookmark button
Alert button
Apr 29, 2020
Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi

Figure 1 for Interpretable Probabilistic Password Strength Meters via Deep Learning
Figure 2 for Interpretable Probabilistic Password Strength Meters via Deep Learning
Figure 3 for Interpretable Probabilistic Password Strength Meters via Deep Learning
Figure 4 for Interpretable Probabilistic Password Strength Meters via Deep Learning
Viaarxiv icon

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning

Add code
Bookmark button
Alert button
Sep 14, 2017
Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz

Figure 1 for Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Figure 2 for Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Figure 3 for Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Figure 4 for Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Viaarxiv icon

Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers

Add code
Bookmark button
Alert button
Jun 19, 2013
Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali

Figure 1 for Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers
Figure 2 for Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers
Figure 3 for Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers
Figure 4 for Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers
Viaarxiv icon