1 code implementation • 20 Mar 2023 • Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras
After showing how DRSM is theoretically robust against attacks with contiguous adversarial bytes, we verify its performance and certified robustness experimentally, where we observe only marginal accuracy drops as the cost of robustness.
no code implementations • 9 Jun 2020 • Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras
Finally, we quantify the opportunity of future MIAs to compromise privacy by designing a white-box `distance-to-confident' (DtC) metric, based on adversarial sample crafting.
2 code implementations • 16 Oct 2018 • Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras
Overthinking is computationally wasteful, and it can also be destructive when, by the final layer, a correct prediction changes into a misclassification.