I
AM
DAVID
STUTZ
CV
ABOUT
PROJECTS
BLOG
CV
ABOUT
PROJECTS
BLOG
ARCHIVEMONTHLY»AUGUST2019«
AUGUST2019
READING NOTES
Kathrin Grosse, David Pfaff, Michael T. Smith, Michael Backes.
The Limitations of Model Uncertainty in Adversarial Settings
. CoRR abs/1812.02606 (2018).
ADVERSARIAL MACHINE LEARNING
MACHINE LEARNING
More ...
AUGUST2019
READING NOTES
Yinpeng Dong, Hang Su, Jun Zhu, Fan Bao.
Towards Interpretable Deep Neural Networks by Leveraging Adversarial Examples
. CoRR abs/1708.05493 (2017).
ADVERSARIAL MACHINE LEARNING
DEEP LEARNING
More ...
AUGUST2019
READING NOTES
Nicholas Carlini, Chang Liu, Jernej Kos, Ăšlfar Erlingsson, Dawn Song.
The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets
. CoRR abs/1802.08232 (2018).
ADVERSARIAL MACHINE LEARNING
DEEP LEARNING
More ...
AUGUST2019
READING NOTES
Xiaoyu Cao, Neil Zhenqiang Gong.
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
. ACSAC, 2017
ADVERSARIAL MACHINE LEARNING
DEEP LEARNING
More ...
AUGUST2019
READING NOTES
Qi-Zhi Cai, Chang Liu, Dawn Song.
Curriculum Adversarial Training
. IJCAI, 2018.
ADVERSARIAL MACHINE LEARNING
DEEP LEARNING
More ...
AUGUST2019
READING NOTES
Timon Gehr, Matthew Mirman, Dana Drachsler-Cohen, Petar Tsankov, Swarat Chaudhuri, Martin T. Vechev.
AI2: Safety and Robustness Certification of Neural Networks with Abstract Interpretation.
IEEE Symposium on Security and Privacy, 2018.
ADVERSARIAL MACHINE LEARNING
DEEP LEARNING
More ...
AUGUST2019
READING NOTES
David Alvarez-Melis, Tommi S. Jaakkola.
Towards Robust Interpretability with Self-Explaining Neural Networks
. NeurIPS, 2018.
COMPUTER VISION
DEEP LEARNING
More ...
AUGUST2019
READING NOTES
Yinzhi Cao, Alexander Fangxiao Yu, Andrew Aday, Eric Stahl, Jon Merwine, Junfeng Yang.
Efficient Repair of Polluted Machine Learning Systems via Causal Unlearning.
AsiaCCS, 2018.
ADVERSARIAL MACHINE LEARNING
DEEP LEARNING
More ...
AUGUST2019
READING NOTES
Cormac Herley, Paul C. van Oorschot.
SoK: Science, Security and the Elusive Goal of Security as a Scientific Pursuit
. IEEE Symposium on Security and Privacy 2017.
SECURITY AND PRIVACY
More ...
AUGUST2019
READING NOTES
Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang.
Model-Reuse Attacks on Deep Learning Systems.
CoRR abs/1812.00483 (2018).
ADVERSARIAL MACHINE LEARNING
DEEP LEARNING
More ...
OLDER
SEARCH
THEBLOG
ARCHIVES
TAGS
2023 —
OCTOBER
SEPTEMBER
JULY
JUNE
MAY
APRIL
MARCH
FEBRUARY
JANUARY
2022 —
NOVEMBER
OCTOBER
SEPTEMBER
AUGUST
2021 —
DECEMBER
NOVEMBER
OCTOBER
JULY
JUNE
MAY
APRIL
JANUARY
2020 —
NOVEMBER
AUGUST
JULY
JUNE
MAY
APRIL
MARCH
FEBRUARY
JANUARY
2019 —
DECEMBER
NOVEMBER
OCTOBER
SEPTEMBER
AUGUST
JULY
JUNE
APRIL
MARCH
FEBRUARY
JANUARY
2018 —
DECEMBER
OCTOBER
SEPTEMBER
AUGUST
JULY
JUNE
MAY
APRIL
MARCH
FEBRUARY
JANUARY
2017 —
DECEMBER
OCTOBER
SEPTEMBER
JULY
JUNE
MAY
APRIL
MARCH
FEBRUARY
JANUARY
2016 —
DECEMBER
NOVEMBER
OCTOBER
SEPTEMBER
AUGUST
JULY
JUNE
MAY
APRIL
FEBRUARY
JANUARY
2015 —
NOVEMBER
OCTOBER
JULY
JUNE
MAY
APRIL
MARCH
FEBRUARY
JANUARY
2014 —
DECEMBER
NOVEMBER
OCTOBER
AUGUST
JULY
JUNE
MAY
APRIL
MARCH
2013 —
DECEMBER
NOVEMBER
OCTOBER
ACADEMIA
ADVERSARIAL MACHINE LEARNING
ARTIFICIAL INTELLIGENCE
BASH
BLENDER
C
C++
CAFFE
CAREER
CMSIMPLE
COMPRESSED SENSING
COMPUTER GRAPHICS
COMPUTER VISION
CSS
CUDA
D3JS
DATA MINING
DEEP LEARNING
DNN ACCELERATORS
GAME THEORY
HAIKU
IMAGE PROCESSING
JAVASCRIPT
JAX
JQUERY
KOHANA
LATEX
LUA
MACHINE LEARNING
MATHEMATICS
MATLAB
MEDIA COVERAGE
MEDICAL IMAGE PROCESSING
NATURAL LANGUAGE PROCESSING
NUMERICAL ANALYSIS
OPENCV
OPTIMIZATION
PHP
PODCAST
POSTER
PRODUCT
PUBLICATION
PYTHON
PYTORCH
RASPBERRY PI
RASPBIAN
RECORDING
ROBOTICS
SECURITY AND PRIVACY
SEMINAR
SOCIAL NETWORKS
SOFTWARE ENGINEERING
STATISTICS
TALK
TENSORFLOW
THEANO
THESIS
TORCH
TRUECRYPT
TWITTER BOOTSTRAP
UBUNTU
UNCERTAINTY ESTIMATION
WEB SECURITY
WORDPRESS