User profiles for Borja Balle

Borja Balle

DeepMind
Verified email at google.com
Cited by 6331

Improving the gaussian mechanism for differential privacy: Analytical calibration and optimal denoising

B Balle, YX Wang - International Conference on Machine …, 2018 - proceedings.mlr.press
The Gaussian mechanism is an essential building block used in multitude of differentially
private data analysis algorithms. In this paper we revisit the Gaussian mechanism and show …

The privacy blanket of the shuffle model

B Balle, J Bell, A Gascón, K Nissim - … , Santa Barbara, CA, USA, August 18 …, 2019 - Springer
This work studies differential privacy in the context of the recently proposed shuffle model.
Unlike in the local model, where the server collecting privatized data from users can track back …

Unlocking high-accuracy differentially private image classification through scale

S De, L Berrada, J Hayes, SL Smith, B Balle - arXiv preprint arXiv …, 2022 - arxiv.org
Differential Privacy (DP) provides a formal privacy guarantee preventing adversaries with
access to a machine learning model from extracting information about individual training points…

Subsampled rényi differential privacy and analytical moments accountant

YX Wang, B Balle… - The 22nd international …, 2019 - proceedings.mlr.press
We study the problem of subsampling in differential privacy (DP), a question that is the
centerpiece behind many successful differentially private machine learning algorithms. …

Learning weighted automata

B Balle, M Mohri - International Conference on Algebraic Informatics, 2015 - Springer
Weighted finite automata (WFA) are finite automata whose transitions and states are augmented
with some weights, elements of a semiring. A WFA induces a function over strings. The …

Privacy amplification by subsampling: Tight analyses via couplings and divergences

B Balle, G Barthe, M Gaboardi - Advances in neural …, 2018 - proceedings.neurips.cc
Differential privacy comes equipped with multiple analytical tools for the design of private
data analyses. One important tool is the so-called" privacy amplification by subsampling" …

Extracting training data from diffusion models

…, M Jagielski, V Sehwag, F Tramer, B Balle… - 32nd USENIX Security …, 2023 - usenix.org
Image diffusion models such as DALL-E 2, Imagen, and Stable Diffusion have attracted
significant attention due to their ability to generate high-quality synthetic images. In this work, we …

Ethical and social risks of harm from language models

…, PS Huang, M Cheng, M Glaese, B Balle… - arXiv preprint arXiv …, 2021 - arxiv.org
This paper aims to help structure the risk landscape associated with large-scale Language
Models (LMs). In order to foster advances in responsible innovation, an in-depth …

Reconstructing training data with informed adversaries

B Balle, G Cherubin, J Hayes - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Given access to a machine learning model, can an adversary reconstruct the model’s training
data? This work studies this question from the lens of a powerful informed adversary who …

Taxonomy of risks posed by language models

…, J Mellor, A Glaese, M Cheng, B Balle… - Proceedings of the …, 2022 - dl.acm.org
Responsible innovation on large-scale Language Models (LMs) requires foresight into and
in-depth understanding of the risks these models may pose. This paper develops a …