Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Defense Against the Dark Arts

IEEE via YouTube

Overview

Explore a comprehensive keynote address on adversarial example research in machine learning and cybersecurity. Delve into the intricacies of defending against attacks on the machine learning pipeline, including transfer attacks, gradient masking, and norm ball scenarios. Examine the concept of adversarial logit pairing (ALP) and investigate future research directions in indirect methods and improved attack models. Gain insights into non-security applications of adversarial examples and the fascinating "Clever Hans" phenomenon. Learn from Ian Goodfellow's expertise as he presents at the 1st Deep Learning and Security Workshop during the 2018 IEEE Symposium on Security & Privacy in San Francisco.

Syllabus

Intro
I.I.D. Machine Learning
Attacks on the machine learning pipeline
Define a game
Fifty Shades of Gray Box Attacks
Transfer Attack
Norm Balls: A Toy Game
Tradeoff
Gradient Masking
Pipeline of Defense Failures
Adversarial Logit Pairing (ALP)
Future Directions: Indirect Methods
Future Directions: Better Attack Models
Some Non-Security Reasons to Study Adversarial Examples
Clever Hans

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Defense Against the Dark Arts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.