Completed
Intra-technique transferability: cross training data
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Adversarial Examples in Machine Learning - Crafting and Defending Against Attacks
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Successes of machine learning
- 3 Failures of machine learning: Dave's talk
- 4 Crafting adversarial examples: fast gradient sign method
- 5 Threat model of a black-box attack
- 6 Our approach to black-box attacks
- 7 Adversarial example transferability
- 8 Intra-technique transferability: cross training data
- 9 Cross-technique transferability
- 10 Attacking remotely hosted black-box models
- 11 Results on real-world remote systems
- 12 Hands-on tutorial with the MNIST dataset