Adversarial Examples in Machine Learning - Crafting and Defending Against Attacks

Adversarial Examples in Machine Learning - Crafting and Defending Against Attacks

USENIX Enigma Conference via YouTube Direct link

Attacking remotely hosted black-box models

10 of 12

10 of 12

Attacking remotely hosted black-box models

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Adversarial Examples in Machine Learning - Crafting and Defending Against Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Successes of machine learning
  3. 3 Failures of machine learning: Dave's talk
  4. 4 Crafting adversarial examples: fast gradient sign method
  5. 5 Threat model of a black-box attack
  6. 6 Our approach to black-box attacks
  7. 7 Adversarial example transferability
  8. 8 Intra-technique transferability: cross training data
  9. 9 Cross-technique transferability
  10. 10 Attacking remotely hosted black-box models
  11. 11 Results on real-world remote systems
  12. 12 Hands-on tutorial with the MNIST dataset

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.