User contributions for S362khan
Jump to navigation
Jump to search
16 November 2018
- 17:0717:07, 16 November 2018 diff hist +273 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 16:4316:43, 16 November 2018 diff hist +4 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The Attacks
- 16:4016:40, 16 November 2018 diff hist +1,276 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Input Transformation, [Guo, 2018]
- 16:0916:09, 16 November 2018 diff hist +129 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The Attacks
- 16:0716:07, 16 November 2018 diff hist 0 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 16:0616:06, 16 November 2018 diff hist +135 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 15:2715:27, 16 November 2018 diff hist −6 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Detailed Results
- 15:2615:26, 16 November 2018 diff hist +235 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 15:2315:23, 16 November 2018 diff hist +1,196 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Pixel Defend, [Song, 2018]
- 00:2900:29, 16 November 2018 diff hist +164 stat946F18 →Record your contributions here [https://docs.google.com/spreadsheets/d/1SxkjNfhOg_eXWpUnVHuIP93E6tEiXEdpm68dQGencgE/edit?usp=sharing]
- 00:1000:10, 16 November 2018 diff hist −7 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Recommendations for future defense presentations to facilitate reproducibility
- 00:0800:08, 16 November 2018 diff hist +12 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Local Intrinsic Dimensionality
- 00:0800:08, 16 November 2018 diff hist +42 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Detailed Results
- 00:0700:07, 16 November 2018 diff hist +665 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Stochastic Activation Pruning, [Dhillon, 2018]
15 November 2018
- 23:5223:52, 15 November 2018 diff hist −26 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique
- 23:4923:49, 15 November 2018 diff hist +62 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Gradient Shattering
- 23:3323:33, 15 November 2018 diff hist +1,569 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Thermometer Coding, [Buckman, 2018]
- 21:3421:34, 15 November 2018 diff hist +655 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique
- 20:3620:36, 15 November 2018 diff hist +200 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 20:3420:34, 15 November 2018 diff hist +421 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Critique
- 20:2720:27, 15 November 2018 diff hist +434 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Conclusion
- 20:2120:21, 15 November 2018 diff hist +36 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 20:2020:20, 15 November 2018 diff hist +191 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 20:1920:19, 15 November 2018 diff hist −2 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The technique that worked - Adversarial Training [Madary, 2018]
- 20:1820:18, 15 November 2018 diff hist +43 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Main Results
- 19:5819:58, 15 November 2018 diff hist +1,137 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →The technique that worked - Adversarial Training [Madary, 2018]
- 19:2619:26, 15 November 2018 diff hist −26 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →How to check for Obfuscated Gradients
- 18:2018:20, 15 November 2018 diff hist +559 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →How to check for Obfuscated Gradients
- 16:4616:46, 15 November 2018 diff hist −3 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Summary Results
- 16:4616:46, 15 November 2018 diff hist +676 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 16:4316:43, 15 November 2018 diff hist +1,779 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Summary Results
- 14:3914:39, 15 November 2018 diff hist +18 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples No edit summary
- 12:2312:23, 15 November 2018 diff hist +24 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Detailed Results
- 12:2312:23, 15 November 2018 diff hist +365 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Detailed Results
- 12:1112:11, 15 November 2018 diff hist +18 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples No edit summary
- 12:1012:10, 15 November 2018 diff hist +180 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →References
- 11:4011:40, 15 November 2018 diff hist +43 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Summary Results
- 11:2911:29, 15 November 2018 diff hist +93 N File:Summary Table.png Summary of the attacks on various defense techniques from Athalye 2018 - obfuscated Gradients current
- 11:2711:27, 15 November 2018 diff hist +100 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Summary Results
- 11:1211:12, 15 November 2018 diff hist +2 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Obfuscated Gradients
- 10:4510:45, 15 November 2018 diff hist +317 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Obfuscated Gradients
- 10:3210:32, 15 November 2018 diff hist +15 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Adversarial Attacks Terminology
- 10:2010:20, 15 November 2018 diff hist −34 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Adversarial Images Mathematically
- 10:1710:17, 15 November 2018 diff hist −3 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Introduction
- 00:2900:29, 15 November 2018 diff hist +1 m Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Obfuscated Gradients
- 00:2700:27, 15 November 2018 diff hist +127 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Obfuscated Gradients
- 00:1800:18, 15 November 2018 diff hist +118 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Obfuscated Gradients
- 00:0600:06, 15 November 2018 diff hist +3,565 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Motivation
14 November 2018
- 20:5620:56, 14 November 2018 diff hist +1,091 Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples →Introduction
- 19:5519:55, 14 November 2018 diff hist +115 N Obfuscated Gradients Give a False Sense of Security Circumventing Defenses to Adversarial Examples Init
11 November 2018
- 22:2022:20, 11 November 2018 diff hist +2 Zero-Shot Visual Imitation →Goal Recognizer
- 22:1922:19, 11 November 2018 diff hist +114 Zero-Shot Visual Imitation →Goal Recognizer
- 21:0921:09, 11 November 2018 diff hist +143 Zero-Shot Visual Imitation →Forward Consistency Loss
- 20:4920:49, 11 November 2018 diff hist +50 Zero-Shot Visual Imitation →Learning the Goal-Conditioned Skill Policy (GSP)
- 20:3020:30, 11 November 2018 diff hist −207 Zero-Shot Visual Imitation →Learning to Imitate Without Expert Supervision
9 November 2018
- 19:3119:31, 9 November 2018 diff hist +187 Annotating Object Instances with a Polygon RNN No edit summary
- 19:2619:26, 9 November 2018 diff hist +687 Annotating Object Instances with a Polygon RNN →Critique
2 November 2018
- 10:3210:32, 2 November 2018 diff hist +947 stat946F18/Beyond Word Importance Contextual Decomposition to Extract Interactions from LSTMs →Critique/Future Work
1 November 2018
27 October 2018
- 22:1822:18, 27 October 2018 diff hist +155 Fairness Without Demographics in Repeated Loss Minimization No edit summary
- 21:2321:23, 27 October 2018 diff hist −37 Fairness Without Demographics in Repeated Loss Minimization →Empirical Risk Minimization (ERM)
- 21:2121:21, 27 October 2018 diff hist +79 Fairness Without Demographics in Repeated Loss Minimization →Disparity Amplification
- 21:0621:06, 27 October 2018 diff hist +25 Fairness Without Demographics in Repeated Loss Minimization →Disparity Amplification
- 20:4220:42, 27 October 2018 diff hist −427 Fairness Without Demographics in Repeated Loss Minimization →Representation Disparity
- 20:2020:20, 27 October 2018 diff hist +473 Fairness Without Demographics in Repeated Loss Minimization →Representation Disparity
23 October 2018
- 22:4822:48, 23 October 2018 diff hist +307 DCN plus: Mixed Objective And Deep Residual Coattention for Question Answering No edit summary
- 22:2322:23, 23 October 2018 diff hist +110 DCN plus: Mixed Objective And Deep Residual Coattention for Question Answering →Mixed objective using self-critical policy learning
- 22:1622:16, 23 October 2018 diff hist +181 DCN plus: Mixed Objective And Deep Residual Coattention for Question Answering →Mixed objective using self-critical policy learning
- 21:5821:58, 23 October 2018 diff hist +331 DCN plus: Mixed Objective And Deep Residual Coattention for Question Answering →Deep residual coattention encoder
- 21:4221:42, 23 October 2018 diff hist +11 m DCN plus: Mixed Objective And Deep Residual Coattention for Question Answering →Deep residual coattention encoder
- 21:3921:39, 23 October 2018 diff hist +98 DCN plus: Mixed Objective And Deep Residual Coattention for Question Answering →Deep residual coattention encoder
- 21:2021:20, 23 October 2018 diff hist +755 DCN plus: Mixed Objective And Deep Residual Coattention for Question Answering →Important Terms
19 October 2018
- 14:5814:58, 19 October 2018 diff hist +55 m Hierarchical Representations for Efficient Architecture Search →Search algorithms
- 14:5314:53, 19 October 2018 diff hist +65 m Hierarchical Representations for Efficient Architecture Search →Initialization
- 14:4914:49, 19 October 2018 diff hist −1 Hierarchical Representations for Efficient Architecture Search →Mutation
- 14:4914:49, 19 October 2018 diff hist +290 Hierarchical Representations for Efficient Architecture Search →Mutation
- 14:4114:41, 19 October 2018 diff hist +1,171 Hierarchical Representations for Efficient Architecture Search →Hierarchical architecture representation
3 October 2018
- 18:2618:26, 3 October 2018 diff hist +199 stat946F18 →Paper presentation