Extracting Targeted Training Data from ASR Models, and How to Mitigate It. (arXiv:2204.08345v2 [cs.SD] UPDATED)
Recent work has designed methods to demonstrate that model updates in ASR training can leak potentially sensitive attributes of the...
Recent work has designed methods to demonstrate that model updates in ASR training can leak potentially sensitive attributes of the...
Data poisoning attacks aim at manipulating model behaviors through distorting training data. Previously, an aggregation-based certified defense, Deep Partition Aggregation...
End-to-end (E2E) models are often being accompanied by language models (LMs) via shallow fusion for boosting their overall quality as...
Recent work has designed methods to demonstrate that model updates in ASR training can leak potentially sensitive attributes of the...
Cross-architecture binary similarity comparison is essential in many security applications. Recently, researchers have proposed learning-based approaches to improve comparison performance....
End-to-end (E2E) models are often being accompanied by language models (LMs) via shallow fusion for boosting their overall quality as...
Cross-architecture binary similarity comparison is essential in many security applications. Recently, researchers have proposed learning-based approaches to improve comparison performance....
Learned recommender systems may inadvertently leak information about their training data, leading to privacy violations. We investigate privacy threats faced...
The gear that helped us walk on the Moon nearly 60 years ago is still giving up its mysteries today,...
These tiny, adorable, rechargeable, and affordable synths fit in a backpack and make you sound like a modern-day A-ha.