Completed
How do we generate adversarial examples?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 How do we generate adversarial examples?
- 3 Threat Models
- 4 A threat model is a formal statement defining when a system is intended to be secure.
- 5 This talk: non-certified defenses
- 6 For example: adversarial training
- 7 How complete are evaluations?
- 8 Case Study: ICLR 2018
- 9 Broken Defenses Correct Defenses
- 10 Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples
- 11 Disentangling true robustness from apparent robustness is nontrivial
- 12 Lessons (2 of 2) performing better evaluations
- 13 To understand adversarial examples, repeatedly attack and defend, optimizing for lessons learned.