
-
Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Convex relaxations have emerged as a promising approach for verifying de...
read it
-
Creating High Resolution Images with a Latent Adversarial Generator
Generating realistic images is difficult, and many formulations for this...
read it
-
MixMatch: A Holistic Approach to Semi-Supervised Learning
Semi-supervised learning has proven to be a powerful paradigm for levera...
read it
-
Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition
Adversarial examples are inputs to machine learning models designed by a...
read it
-
A Research Agenda: Dynamic Models to Defend Against Correlated Attacks
In this article I describe a research agenda for securing machine learni...
read it
-
On Evaluating Adversarial Robustness
Correctly evaluating defenses against adversarial examples has proven to...
read it
-
New CleverHans Feature: Better Adversarial Robustness Evaluations with Attack Bundling
This technical report describes a new feature of the CleverHans library ...
read it
-
Discriminator Rejection Sampling
We propose a rejection sampling scheme using the discriminator of a GAN ...
read it
-
Local Explanation Methods for Deep Neural Networks Lack Sensitivity to Parameter Values
Explaining the output of a complicated machine learning model like a dee...
read it
-
Sanity Checks for Saliency Maps
Saliency methods have emerged as a popular tool to highlight features in...
read it
-
Unrestricted Adversarial Examples
We introduce a two-player contest for evaluating the safety and robustne...
read it
-
Skill Rating for Generative Models
We explore a new way to evaluate generative models using insights from e...
read it
-
TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing
Machine learning models are notoriously difficult to interpret and debug...
read it
-
Understanding and Improving Interpolation in Autoencoders via an Adversarial Regularizer
Autoencoders provide a powerful framework for learning compressed repres...
read it
-
Motivating the Rules of the Game for Adversarial Example Research
Advances in machine learning have led to broad deployment of systems wit...
read it
-
Adversarial Reprogramming of Neural Networks
Deep neural networks are susceptible to adversarial attacks. In computer...
read it
-
Defense Against the Dark Arts: An overview of adversarial example security research and future research directions
This article presents a summary of a keynote lecture at the Deep Learnin...
read it
-
Self-Attention Generative Adversarial Networks
In this paper, we propose the Self-Attention Generative Adversarial Netw...
read it
-
Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size
A key problem in research on adversarial examples is that vulnerability ...
read it
-
Adversarial Attacks and Defences Competition
To accelerate research on adversarial examples and robustness of machine...
read it
-
Adversarial Logit Pairing
In this paper, we develop improved techniques for defending against adve...
read it
-
Is Generator Conditioning Causally Related to GAN Performance?
Recent work (Pennington et al, 2017) suggests that controlling the entir...
read it
-
Adversarial Examples that Fool both Human and Computer Vision
Machine learning models are vulnerable to adversarial examples: small ch...
read it
-
MaskGAN: Better Text Generation via Filling in the ______
Neural text generation models are often autoregressive language models o...
read it
-
Adversarial Spheres
State of the art computer vision models have been shown to be vulnerable...
read it
-
Many Paths to Equilibrium: GANs Do Not Need to Decrease a Divergence At Every Step
Generative adversarial networks (GANs) are a family of generative models...
read it
-
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches
The recent, remarkable growth of machine learning has led to intense int...
read it
-
The Space of Transferable Adversarial Examples
Adversarial examples are maliciously perturbed inputs designed to mislea...
read it
-
Adversarial Attacks on Neural Network Policies
Machine learning classifiers are known to be vulnerable to inputs malici...
read it
-
NIPS 2016 Tutorial: Generative Adversarial Networks
This report summarizes the tutorial presented by the author at NIPS 2016...
read it
-
Adversarial Machine Learning at Scale
Adversarial examples are malicious inputs designed to fool machine learn...
read it
-
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data
Some machine learning applications involve training data that is sensiti...
read it
-
cleverhans v2.0.0: an adversarial machine learning library
cleverhans is a software library that provides standardized reference im...
read it
-
Adversarial examples in the physical world
Most existing machine learning classifiers are highly vulnerable to adve...
read it
-
Deep Learning with Differential Privacy
Machine learning techniques based on neural networks are achieving remar...
read it
-
Improved Techniques for Training GANs
We present a variety of new architectural features and training procedur...
read it
-
Adversarial Training Methods for Semi-Supervised Text Classification
Adversarial training provides a means of regularizing supervised learnin...
read it
-
Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples
Many machine learning models are vulnerable to adversarial examples: inp...
read it
-
Unsupervised Learning for Physical Interaction through Video Prediction
A core challenge for an agent learning to interact with the world is to ...
read it
-
Theano: A Python framework for fast computation of mathematical expressions
Theano is a Python library that allows to define, optimize, and evaluate...
read it
-
Improving the Robustness of Deep Neural Networks via Stability Training
In this paper we address the issue of output instability of deep neural ...
read it
-
TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems
TensorFlow is an interface for expressing machine learning algorithms, a...
read it
-
Practical Black-Box Attacks against Machine Learning
Machine learning (ML) models, e.g., deep neural networks (DNNs), are vul...
read it
-
Adversarial Autoencoders
In this paper, we propose the "adversarial autoencoder" (AAE), which is ...
read it
-
Net2Net: Accelerating Learning via Knowledge Transfer
We introduce techniques for rapidly transferring the information stored ...
read it
-
Efficient Per-Example Gradient Computations
This technical report describes an efficient technique for computing the...
read it
-
Intriguing properties of neural networks
Deep neural networks are highly expressive models that have recently ach...
read it
-
Joint Training of Deep Boltzmann Machines
We introduce a new method for training deep Boltzmann machines jointly. ...
read it
-
Theano: new features and speed improvements
Theano is a linear algebra compiler that optimizes a user's symbolically...
read it
-
Large-Scale Feature Learning With Spike-and-Slab Sparse Coding
We consider the problem of object recognition with a large number of cla...
read it