no code implementations • 18 Jan 2024 • Janvi Thakkar, Giulio Zizzo, Sergio Maffeis
Malicious adversaries can attack machine learning models to infer sensitive information or damage the system by launching a series of evasion attacks.
no code implementations • 21 Dec 2023 • Janvi Thakkar, Giulio Zizzo, Sergio Maffeis
We use adversarial training together with adversarial watermarks to train a robust watermarked model.
no code implementations • 4 Feb 2023 • Janvi Thakkar, Devvrat Joshi
While the distributed spectral clustering algorithm exists, they face the problem of data privacy and increased communication costs between the clients.
no code implementations • 7 Jan 2023 • Devvrat Joshi, Janvi Thakkar
These DP mechanisms do not guarantee convergence of differentially private iterative algorithms and degrade the quality of the cluster.
no code implementations • 6 Sep 2022 • Devvrat Joshi, Janvi Thakkar, Siddharth Soni, Shril Mody, Rohan Patil, Nipun Batra
We propose two variations: Geometrical Homogeneous Clustering for Image Data Reduction (GHCIDR) and Merged-GHCIDR upon the baseline algorithm - Reduction through Homogeneous Clustering (RHC) to achieve better accuracy and training time.
1 code implementation • 27 Aug 2022 • Shril Mody, Janvi Thakkar, Devvrat Joshi, Siddharth Soni, Rohan Patil, Nipun Batra
The intuition behind the first approach, RHCKON, is that the boundary points contribute significantly towards the representation of clusters.