no code implementations • 21 Mar 2024 • Sayanton V. Dibbo, Adam Breuer, Juston Moore, Michael Teti
Recent model inversion attack algorithms permit adversaries to reconstruct a neural network's private training data just by repeatedly querying the network and inspecting its outputs.
no code implementations • 10 Aug 2023 • Adam Breuer, Nazanin Khosravani, Michael Tingley, Bradford Cottel
We show that even before a new account has made friends or shared content, these initial friend request behaviors evoke a natural multi-class extension of the canonical Preferential Attachment model of social network growth.
no code implementations • 9 Apr 2020 • Adam Breuer, Roee Eilat, Udi Weinsberg
In this paper, we study the problem of early detection of fake user accounts on social networks based solely on their network connectivity with other users.
2 code implementations • ICML 2020 • Adam Breuer, Eric Balkanski, Yaron Singer
Recent algorithms have comparable guarantees in terms of asymptotic worst case analysis, but their actual number of rounds and query complexity depend on very large constants and polynomials in terms of precision and confidence, making them impractical for large data sets.