User contributions for S362khan
Jump to navigation
Jump to search
16 November 2018
- 17:0717:07, 16 November 2018 diff hist +273 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 16:4316:43, 16 November 2018 diff hist +4 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The Attacks
- 16:4016:40, 16 November 2018 diff hist +1,276 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Input Transformation, [Guo, 2018]
- 16:0916:09, 16 November 2018 diff hist +129 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The Attacks
- 16:0716:07, 16 November 2018 diff hist 0 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 16:0616:06, 16 November 2018 diff hist +135 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 15:2715:27, 16 November 2018 diff hist −6 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Detailed Results
- 15:2615:26, 16 November 2018 diff hist +235 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 15:2315:23, 16 November 2018 diff hist +1,196 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Pixel Defend, [Song, 2018]
- 00:2900:29, 16 November 2018 diff hist +164 stat946F18 →Record your contributions here [https://docs.google.com/spreadsheets/d/1SxkjNfhOg_eXWpUnVHuIP93E6tEiXEdpm68dQGencgE/edit?usp=sharing]
- 00:1000:10, 16 November 2018 diff hist −7 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Recommendations for future defense presentations to facilitate reproducibility
- 00:0800:08, 16 November 2018 diff hist +12 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Local Intrinsic Dimensionality
- 00:0800:08, 16 November 2018 diff hist +42 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Detailed Results
- 00:0700:07, 16 November 2018 diff hist +665 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Stochastic Activation Pruning, [Dhillon, 2018]
15 November 2018
- 23:5223:52, 15 November 2018 diff hist −26 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique
- 23:4923:49, 15 November 2018 diff hist +62 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Gradient Shattering
- 23:3323:33, 15 November 2018 diff hist +1,569 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Thermometer Coding, [Buckman, 2018]
- 21:3421:34, 15 November 2018 diff hist +655 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique
- 20:3620:36, 15 November 2018 diff hist +200 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 20:3420:34, 15 November 2018 diff hist +421 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique