User contributions for S362khan
Jump to navigation
Jump to search
18 November 2018
- 21:1521:15, 18 November 2018 diff hist −20 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Non-obfuscated Gradients
- 18:0818:08, 18 November 2018 diff hist +1 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Cascade Adversarial Training [Na, 2018]
- 18:0718:07, 18 November 2018 diff hist +172 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 18:0518:05, 18 November 2018 diff hist +1 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Cascade Adversarial Training [Na 2018]
- 18:0518:05, 18 November 2018 diff hist −1,253 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Non-obfuscated Gradients
- 17:5217:52, 18 November 2018 diff hist +161 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Other Sources
- 17:5117:51, 18 November 2018 diff hist −157 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Introduction
17 November 2018
- 12:3612:36, 17 November 2018 diff hist +883 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Mitigation Through Randomization, [Xie, 2018]
- 12:2512:25, 17 November 2018 diff hist +1,254 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Local Intrinsic Dimensionality, [Ma, 2018]
- 11:0311:03, 17 November 2018 diff hist −145 Countering Adversarial Images Using Input Transformations →Defenses
- 10:5810:58, 17 November 2018 diff hist +3 Countering Adversarial Images Using Input Transformations →Defenses
- 10:5710:57, 17 November 2018 diff hist +23 Countering Adversarial Images Using Input Transformations →Adversarial Attacks
- 10:5510:55, 17 November 2018 diff hist +77 Countering Adversarial Images Using Input Transformations →Adversarial Attacks
- 10:5310:53, 17 November 2018 diff hist +1 Countering Adversarial Images Using Input Transformations →Adversarial Attacks
- 10:5210:52, 17 November 2018 diff hist +163 Countering Adversarial Images Using Input Transformations →Problem Definition
- 10:3510:35, 17 November 2018 diff hist +168 Countering Adversarial Images Using Input Transformations →Terminology
- 10:3510:35, 17 November 2018 diff hist −162 Countering Adversarial Images Using Input Transformations →Problem Definition
- 10:3410:34, 17 November 2018 diff hist 0 Countering Adversarial Images Using Input Transformations →Problem Definition
- 10:3210:32, 17 November 2018 diff hist −3 Countering Adversarial Images Using Input Transformations →Problem Definition/Terminology
- 10:2110:21, 17 November 2018 diff hist +124 Countering Adversarial Images Using Input Transformations →Previous Work
- 10:1410:14, 17 November 2018 diff hist +6 Countering Adversarial Images Using Input Transformations →Motivation
- 10:1310:13, 17 November 2018 diff hist +39 Countering Adversarial Images Using Input Transformations →Introduction
16 November 2018
- 17:0717:07, 16 November 2018 diff hist +273 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 16:4316:43, 16 November 2018 diff hist +4 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The Attacks
- 16:4016:40, 16 November 2018 diff hist +1,276 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Input Transformation, [Guo, 2018]
- 16:0916:09, 16 November 2018 diff hist +129 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The Attacks
- 16:0716:07, 16 November 2018 diff hist 0 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 16:0616:06, 16 November 2018 diff hist +135 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 15:2715:27, 16 November 2018 diff hist −6 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Detailed Results
- 15:2615:26, 16 November 2018 diff hist +235 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 15:2315:23, 16 November 2018 diff hist +1,196 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Pixel Defend, [Song, 2018]
- 00:2900:29, 16 November 2018 diff hist +164 stat946F18 →Record your contributions here [https://docs.google.com/spreadsheets/d/1SxkjNfhOg_eXWpUnVHuIP93E6tEiXEdpm68dQGencgE/edit?usp=sharing]
- 00:1000:10, 16 November 2018 diff hist −7 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Recommendations for future defense presentations to facilitate reproducibility
- 00:0800:08, 16 November 2018 diff hist +12 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Local Intrinsic Dimensionality
- 00:0800:08, 16 November 2018 diff hist +42 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Detailed Results
- 00:0700:07, 16 November 2018 diff hist +665 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Stochastic Activation Pruning, [Dhillon, 2018]
15 November 2018
- 23:5223:52, 15 November 2018 diff hist −26 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique
- 23:4923:49, 15 November 2018 diff hist +62 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Gradient Shattering
- 23:3323:33, 15 November 2018 diff hist +1,569 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Thermometer Coding, [Buckman, 2018]
- 21:3421:34, 15 November 2018 diff hist +655 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique
- 20:3620:36, 15 November 2018 diff hist +200 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 20:3420:34, 15 November 2018 diff hist +421 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique
- 20:2720:27, 15 November 2018 diff hist +434 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Conclusion
- 20:2120:21, 15 November 2018 diff hist +36 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 20:2020:20, 15 November 2018 diff hist +191 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 20:1920:19, 15 November 2018 diff hist −2 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The technique that worked - Adversarial Training [Madary, 2018]
- 20:1820:18, 15 November 2018 diff hist +43 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Main Results
- 19:5819:58, 15 November 2018 diff hist +1,137 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The technique that worked - Adversarial Training [Madary, 2018]
- 19:2619:26, 15 November 2018 diff hist −26 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →How to check for Obfuscated Gradients
- 18:2018:20, 15 November 2018 diff hist +559 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →How to check for Obfuscated Gradients