Search Results for author: Adam Breuer

Found 4 papers, 1 papers with code

Improving Robustness to Model Inversion Attacks via Sparse Coding Architectures

no code implementations21 Mar 2024 Sayanton V. Dibbo, Adam Breuer, Juston Moore, Michael Teti

Recent model inversion attack algorithms permit adversaries to reconstruct a neural network's private training data just by repeatedly querying the network and inspecting its outputs.

Image Denoising Object Recognition +1

Preemptive Detection of Fake Accounts on Social Networks via Multi-Class Preferential Attachment Classifiers

no code implementations10 Aug 2023 Adam Breuer, Nazanin Khosravani, Michael Tingley, Bradford Cottel

We show that even before a new account has made friends or shared content, these initial friend request behaviors evoke a natural multi-class extension of the canonical Preferential Attachment model of social network growth.

Friend or Faux: Graph-Based Early Detection of Fake Accounts on Social Networks

no code implementations9 Apr 2020 Adam Breuer, Roee Eilat, Udi Weinsberg

In this paper, we study the problem of early detection of fake user accounts on social networks based solely on their network connectivity with other users.

The FAST Algorithm for Submodular Maximization

2 code implementations ICML 2020 Adam Breuer, Eric Balkanski, Yaron Singer

Recent algorithms have comparable guarantees in terms of asymptotic worst case analysis, but their actual number of rounds and query complexity depend on very large constants and polynomials in terms of precision and confidence, making them impractical for large data sets.

Cannot find the paper you are looking for? You can Submit a new open access paper.