Search

Your search keyword '"Shumailov, Ilia"' showing total 177 results

Search Constraints

Start Over You searched for: Author "Shumailov, Ilia" Remove constraint Author: "Shumailov, Ilia"
177 results on '"Shumailov, Ilia"'

Search Results

1. Operationalizing Contextual Integrity in Privacy-Conscious Assistants

2. A False Sense of Safety: Unsafe Information Leakage in 'Safe' AI Responses

3. UnUnlearning: Unlearning is not sufficient for content regulation in advanced generative AI

4. Measuring memorization in RLHF for code completion

5. Beyond Slow Signs in High-fidelity Model Extraction

6. Locking Machine Learning Models into Hardware

7. Fairness Feedback Loops: Training on Synthetic Data Amplifies Bias

8. Gemini 1.5: Unlocking multimodal understanding across millions of tokens of context

9. Inexact Unlearning Needs More Careful Evaluations to Avoid a False Sense of Privacy

10. Architectural Neural Backdoors from First Principles

11. Buffer Overflow in Mixture of Experts

13. Revisiting Block-based Quantisation: What is Important for Sub-8-bit LLM Inference?

14. Beyond Labeling Oracles: What does it mean to steal ML models?

15. Human-Producible Adversarial Examples

16. SEA: Shareable and Explainable Attribution for Query-based Black-box Attacks

17. LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?

18. Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD

19. Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks

20. When Vision Fails: Text Attacks Against ViT and OCR

21. The Curse of Recursion: Training on Generated Data Makes Models Forget

22. Boosting Big Brother: Attacking Search Engines with Encodings

23. Revisiting Automated Prompting: Are We Actually Doing Better?

24. Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation

25. DARTFormer: Finding The Best Type Of Attention

26. Wide Attention Is The Way Forward For Transformers?

27. ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks

28. Augmentation Backdoors

29. In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning

30. Efficient Adversarial Training With Data Pruning

31. On the Limitations of Stochastic Pre-processing Defenses

32. Architectural Backdoors in Neural Networks

33. Bounding Membership Inference

34. Model Architecture Adaption for Bayesian Neural Networks

35. Tubes Among Us: Analog Attack on Automatic Speaker Identification

36. When the Curious Abandon Honesty: Federated Learning Is Not Private

37. ExtremeBB: A Database for Large-Scale Research into Online Hate, Harassment, the Manosphere and Extremism

38. On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning

39. Rapid Model Architecture Adaption for Meta-Learning

40. Bad Characters: Imperceptible NLP Attacks

41. Markpainting: Adversarial Machine Learning meets Inpainting

42. Manipulating SGD with Data Ordering Attacks

43. Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

44. Hey Alexa what did I just type? Decoding smartphone sounds with a voice assistant

45. Nudge Attacks on Point-Cloud DNNs

46. On Attribution of Deepfakes

47. BatNet: Data transmission between smartphones over ultrasound

48. Snitches Get Stitches: On The Difficulty of Whistleblowing

49. Sponge Examples: Energy-Latency Attacks on Neural Networks

50. Towards Certifiable Adversarial Sample Detection

Catalog

Books, media, physical & digital resources