Search Results for author: Harsh Chaudhari

Found 7 papers, 2 papers with code

L3Cube-MahaSocialNER: A Social Media based Marathi NER Dataset and BERT models

1 code implementation30 Dec 2023 Harsh Chaudhari, Anuja Patil, Dhanashree Lavekar, Pranav Khairnar, Raviraj Joshi

This work introduces the L3Cube-MahaSocialNER dataset, the first and largest social media dataset specifically designed for Named Entity Recognition (NER) in the Marathi language.

Marketing named-entity-recognition +2

Chameleon: Increasing Label-Only Membership Leakage with Adaptive Poisoning

no code implementations5 Oct 2023 Harsh Chaudhari, Giorgio Severi, Alina Oprea, Jonathan Ullman

The integration of machine learning (ML) in numerous critical applications introduces a range of privacy concerns for individuals who provide their datasets for model training.

Data Poisoning

SNAP: Efficient Extraction of Private Properties with Poisoning

1 code implementation25 Aug 2022 Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman

Property inference attacks allow an adversary to extract global properties of the training dataset from a machine learning model.

Inference Attack

SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

no code implementations20 May 2022 Harsh Chaudhari, Matthew Jagielski, Alina Oprea

Secure multiparty computation (MPC) has been proposed to allow multiple mutually distrustful data owners to jointly train machine learning (ML) models on their combined data.

Backdoor Attack BIG-bench Machine Learning +2

Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning

no code implementations5 Dec 2019 Harsh Chaudhari, Rahul Rachuri, Ajith Suresh

Machine learning has started to be deployed in fields such as healthcare and finance, which propelled the need for and growth of privacy-preserving machine learning (PPML).

Benchmarking BIG-bench Machine Learning +2

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction

no code implementations5 Dec 2019 Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh

In this work, we present concretely-efficient protocols for secure $3$-party computation (3PC) over a ring of integers modulo $2^{\ell}$ tolerating one corruption, both with semi-honest and malicious security.

Fairness regression +1

Cannot find the paper you are looking for? You can Submit a new open access paper.