Privacy Backdoors: Stealing Data with Corrupted Pretrained Models - Explained

Privacy Backdoors: Stealing Data with Corrupted Pretrained Models - Explained

Yannic Kilcher via YouTube Direct link

-Core idea: single-use data traps

2 of 5

2 of 5

-Core idea: single-use data traps

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Privacy Backdoors: Stealing Data with Corrupted Pretrained Models - Explained

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Intro & Overview
  2. 2 -Core idea: single-use data traps
  3. 3 - Backdoors in transformer models
  4. 4 - Additional numerical tricks
  5. 5 - Experimental results & conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.