David Evans (@udacitydave) 's Twitter Profile
David Evans

@udacitydave

Dad, Teacher, Computer Scientist, Unreasonable Optimist

ID: 498104228

linkhttps://www.cs.virginia.edu/evans calendar_today20-02-2012 17:59:07

404 Tweet

1,1K Followers

578 Following

Anshuman Suri (@iamgroot42) 's Twitter Profile Photo

Super stoked about this work!! (interesting problem *and* superb collaborators 😍) Turns out certain LLM training characteristics (*and the way we think of membership for generative models) make MI hard! Read more at: iamgroot42.github.io/mimir.github.i… (+ Michael Duan David Evans)

Blue Ridge Boost (@blueridgeboost) 's Twitter Profile Photo

🌟 Dive into the world of coding this summer at Blue Ridge Boost! Let your child explore the fun and practical Python Camp in Charlottesville for ages 10-13. Engaging courses, expert instructors, and hands-on learning await! Sign up now for early bird discounts. #CodingAdventure

Wenxi Wang (@wenxiwang4) 's Twitter Profile Photo

As an incoming Assistant Professor UVA CS, I invite applications for multiple PhD and internship positions! Seeking passionate individuals for interdisciplinary research in Software Engineering, Formal Methods, and Machine Learning. For more details, visit

Blue Ridge Boost (@blueridgeboost) 's Twitter Profile Photo

Dive into the universe of LEGO Spike Essential at our new location on 2171 Ivy Road, Charlottesville, Virginia. Join us from June 17 to 21, 8:30 AM - 1:00 PM or 5:00 PM, for children aged 6 and 7. Explore more at our website (buff.ly/457yAOJ) #LEGO #SpikeEssential

Dive into the universe of LEGO Spike Essential at our new location on 2171 Ivy Road, Charlottesville, Virginia. Join us from June 17 to 21, 8:30 AM - 1:00 PM or 5:00 PM, for children aged 6 and 7. Explore more at our website (buff.ly/457yAOJ) #LEGO #SpikeEssential
Nando Fioretto (@nandofioretto) 's Twitter Profile Photo

Excited to share our work on data minimization for ML! The principle of data minimization is a cornerstone of global data protection regulations, but how do we implement it in ML contexts? 🧵: Let's dive into some insights. 🔗: arxiv.org/abs/2405.19471

Excited to share our work on data minimization for ML!

The principle of data minimization is a cornerstone of  global data protection regulations, but how do we implement it in ML contexts? 

🧵: Let's dive into some insights.  
🔗: arxiv.org/abs/2405.19471
Blue Ridge Boost (@blueridgeboost) 's Twitter Profile Photo

The first two days of summer camp have been a smashing success! We still have spots available for next week, June 17 to June 21. Visit our website to sign-up buff.ly/3UU8onG . Hurry, spots are filling up quickly!

The first two days of summer camp have been a smashing success! 
We still have spots available for next week, June 17 to June 21. 
Visit our website to sign-up buff.ly/3UU8onG .

Hurry, spots are filling up quickly!
Blue Ridge Boost (@blueridgeboost) 's Twitter Profile Photo

We will be closed the week of the Fourth of July. Camps will start on July 8 at 8:30 am. Join us for coding and robotics camps for kids aged 6 to thirteen from July 8 to August 16. Register at: buff.ly/3UU8onG Happy Fourth of July! #SummerCamps #CodingRoboticCamps

We will be closed the week of the Fourth of July. Camps will start on July 8 at 8:30 am.

Join us for coding and robotics camps for kids aged 6 to thirteen from July 8 to August 16. Register at: buff.ly/3UU8onG

Happy Fourth of July!

#SummerCamps #CodingRoboticCamps
Anshuman Suri (@iamgroot42) 's Twitter Profile Photo

Our MIA evaluation research for LLMs has been accepted at Conference on Language Modeling! 🥳 It's time to think beyond just exact-record membership for privacy audits. Hope to see you in Philly soon! Meanwhile, check out this fascinating collection of related works that have emerged recently 👇

Anshuman Suri (@iamgroot42) 's Twitter Profile Photo

Does white-box access help with membership inference? 🤔 tl;dr: Yes ✅ Come find Xiao (Xiao Zhang) at the High-dimensional Learning Dynamics (HiLD) Workshop at ICML Conference this Friday to learn more 📊🔍 Prior works (Alex Sablayrolles et al. proceedings.mlr.press/v97/sablayroll…) theoretically

Blue Ridge Boost (@blueridgeboost) 's Twitter Profile Photo

🌟 Join Our First Lego League Teams! 🚀 🔹 Division 1: One spot open for Grades 5 and 6! 🔹 Division 2: Three spots open for Grades 7 and 8! Don't miss the chance to be part of an exciting journey! 🤖

🌟 Join Our First Lego League Teams! 🚀

🔹 Division 1: One spot open for Grades 5 and 6!

🔹 Division 2: Three spots open for Grades 7 and 8!

Don't miss the chance to be part of an exciting journey! 🤖
EECS (@eecs_utk) 's Twitter Profile Photo

Meet Assistant Professor Fnu Suya. His research interests include the application of machine learning techniques to security-critical applications and the vulnerabilities of machine learning models in the presence of adversaries, generally known as trustworthy machine learning.

Meet Assistant Professor Fnu Suya. His research interests include the application of machine learning techniques to security-critical applications and the vulnerabilities of machine learning models in the presence of adversaries, generally known as trustworthy machine learning.
Fnu Suya ᠰᠥᠶᠦᠭᠡ (@suyafnu) 's Twitter Profile Photo

I’m recruiting PhD students interested in trustworthy ML and ML for security this cycle! Please reach out via email anytime or find me at ACM CCS 2025 next week. Retweets are greatly appreciated!

David Evans (@udacitydave) 's Twitter Profile Photo

Thanks, Jaydeep Borkar! I should probably update that someday - its more than 20 years old now, but mostly still true. Even harder now for new students to get an email noticed with all the GPT-generated emails around now, but can still make it clear you've put in some effort.

Mikerah (@badcryptobitch) 's Twitter Profile Photo

Best book to started is A Pragmatic Introduction to Secure Computation Despite working on MPC for almost 4 years, I refer to this pretty regularly and have my staff at both HashCloak and Stoffel MPC read it. It's pretty accessible as long as you have high school to first 1 of

Anshuman Suri (@iamgroot42) 's Twitter Profile Photo

Wrote a blurb for my submission "adversarial rinsing" 😈🧼 to the 'Erasing the Invisible' competition organized by Bang An Furong Huang & co - awesome job btw! 🎉 Ranked nowhere near the top lol but a great learning experience! anshumansuri.com/post/eti/

Anshuman Suri (@iamgroot42) 's Twitter Profile Photo

Temporally shifted data splits in membership inference can be misleading ⚠️ Be cautious when interpreting these benchmarks!

Anshuman Suri (@iamgroot42) 's Twitter Profile Photo

1/ Most membership inference attacks (MIAs) have seemingly converged to black-box settings, driven by empirical evidence and theoretical folklore suggesting black-box access was optimal. But what if this assumption missed something critical? 😨 tl;dr? It did 🧵