Search Results for author: Nikita Borisov

Found 3 papers, 2 papers with code

Detecting AI Trojans Using Meta Neural Analysis

1 code implementation8 Oct 2019 Xiaojun Xu, Qi. Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li

To train the meta-model without knowledge of the attack strategy, we introduce a technique called jumbo learning that samples a set of Trojaned models following a general distribution.

Data Poisoning

Differentially Private Data Generative Models

no code implementations6 Dec 2018 Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaarfar, Haojin Zhu

We conjecture that the key to defend against the model inversion and GAN-based attacks is not due to differential privacy but the perturbation of training data.

BIG-bench Machine Learning Federated Learning +2

SWEET: Serving the Web by Exploiting Email Tunnels

1 code implementation14 Nov 2012 Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov

As the operation of SWEET is not bound to specific email providers we argue that a censor will need to block all email communications in order to disrupt SWEET, which is infeasible as email constitutes an important part of today's Internet.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.