no code implementations • 22 Jun 2023 • Jan Dubiński, Antoni Kowalczuk, Stanisław Pawlak, Przemysław Rokita, Tomasz Trzciński, Paweł Morawiecki
In this paper, we examine whether it is possible to determine if a specific image was used in the training set, a problem known in the cybersecurity community and referred to as a membership inference attack.
no code implementations • 4 Jul 2022 • Stanisław Pawlak, Filip Szatkowski, Michał Bortkiewicz, Jan Dubiński, Tomasz Trzciński
We introduce a new method for internal replay that modulates the frequency of rehearsal based on the depth of the network.