1 code implementation • Findings of the Association for Computational Linguistics 2020 • Mika Juuti, Tommi Gröndahl, Adrian Flanagan, N. Asokan
Detection of some types of toxic language is hampered by extreme scarcity of labeled training data.
no code implementations • 11 Oct 2019 • Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan
However, model extraction attacks can steal the functionality of ML models using the information leaked to clients through the results returned via the API.
no code implementations • 8 Jun 2019 • Mika Juuti, Buse Gul Atli, N. Asokan
We investigate how an adversary can optimally use its query budget for targeted evasion attacks against deep neural networks in a black-box setting.
no code implementations • 28 Aug 2018 • Tommi Gröndahl, Luca Pajola, Mika Juuti, Mauro Conti, N. Asokan
With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem.
1 code implementation • 7 May 2018 • Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan
Automatically generated fake restaurant reviews are a threat to online review systems.
2 code implementations • 7 May 2018 • Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan
Access to the model can be restricted to be only via well-defined prediction APIs.
Cryptography and Security