1 code implementation • 8 Oct 2019 • Xiaojun Xu, Qi. Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li
To train the meta-model without knowledge of the attack strategy, we introduce a technique called jumbo learning that samples a set of Trojaned models following a general distribution.
no code implementations • 6 Dec 2018 • Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaarfar, Haojin Zhu
We conjecture that the key to defend against the model inversion and GAN-based attacks is not due to differential privacy but the perturbation of training data.
1 code implementation • 14 Nov 2012 • Amir Houmansadr, Wenxuan Zhou, Matthew Caesar, Nikita Borisov
As the operation of SWEET is not bound to specific email providers we argue that a censor will need to block all email communications in order to disrupt SWEET, which is infeasible as email constitutes an important part of today's Internet.
Cryptography and Security