Search Results for author: Esha Ghosh

Found 4 papers, 1 papers with code

Combing for Credentials: Active Pattern Extraction from Smart Reply

no code implementations14 Jul 2022 Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai, David Evans

We show experimentally that it is possible for an adversary to extract sensitive user information present in the training data, even in realistic settings where all interactions with the model must go through a front-end that limits the types of queries.

Language Modelling

Membership Inference on Word Embedding and Beyond

no code implementations21 Jun 2021 Saeed Mahloujifar, Huseyin A. Inan, Melissa Chase, Esha Ghosh, Marcello Hasegawa

Indeed, our attack is a cheaper membership inference attack on text-generative models, which does not require the knowledge of the target model or any expensive training of text-generative models as shadow models.

Inference Attack Language Modelling +3

Property Inference From Poisoning

no code implementations26 Jan 2021 Melissa Chase, Esha Ghosh, Saeed Mahloujifar

In this work, we study property inference in scenarios where the adversary can maliciously control part of the training data (poisoning data) with the goal of increasing the leakage.

Data Poisoning

Cannot find the paper you are looking for? You can Submit a new open access paper.