no code implementations • 17 Apr 2023 • Asim Waheed, Vasisht Duddu, N. Asokan
In non-graph settings, fingerprinting models, or the data used to build them, have shown to be a promising approach toward ownership verification.
1 code implementation • 7 Mar 2021 • Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath
T-Miner employs a sequence-to-sequence (seq-2-seq) generative model that probes the suspicious classifier and learns to produce text sequences that are likely to contain the Trojan trigger.