Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples

Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples

USENIX via YouTube Direct link

Attack success rates in insecurity

29 of 37

29 of 37

Attack success rates in insecurity

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Lessons Learned from Evaluating the Robustness of Defenses to Adversarial Examples

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Adversarial Examples
  3. 3 Why Care
  4. 4 What are Defenses
  5. 5 Adversarial Training
  6. 6 Thermometer Encoding
  7. 7 Input Transformation
  8. 8 Evaluating the robustness
  9. 9 Why are defenses easily broken
  10. 10 Lessons Learned
  11. 11 Adversary Training
  12. 12 Empty Set
  13. 13 Evaluating Adversely
  14. 14 Actionable Advice
  15. 15 Evaluation
  16. 16 Holding Out Data
  17. 17 FGSM
  18. 18 Gradient Descent
  19. 19 No Bounds
  20. 20 Random Classification
  21. 21 Negative Things
  22. 22 Evaluate Against the Worst Attack
  23. 23 Accuracy vs Distortion
  24. 24 Verification
  25. 25 Gradient Free
  26. 26 Random Noise
  27. 27 Conclusion
  28. 28 AES 1997
  29. 29 Attack success rates in insecurity
  30. 30 Why are we not yet crypto
  31. 31 How much we can prove
  32. 32 Still a lot of work to do
  33. 33 L2 Distortion
  34. 34 We dont know what we want
  35. 35 We dont have that today
  36. 36 Summary
  37. 37 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.