no code implementations • 8 Jan 2020 • Bijeeta Pal, Shruti Tople
Thus, our results motivate the need for designing training techniques that are robust to unintended feature learning, specifically for transfer learned models.
1 code implementation • 31 May 2019 • Lucy Li, Bijeeta Pal, Junade Ali, Nick Sullivan, Rahul Chatterjee, Thomas Ristenpart
Current widely deployed C3 services have the user share a small prefix of a hash computed over the user's password.
Cryptography and Security