Getting Robust - Securing Neural Networks Against Adversarial Attacks
University of Melbourne via YouTube
Overview
Syllabus
Introduction
Meet Andrew
Deep Learning Applications
Adversarial Learning
Deanonymization
Tay
Simon Wecker
What is an adversarial attack
Examples of adversarial attacks
Why adversarial attacks exist
Accuracy
Accuracy Robustness
Adversarial Attacks
Adversarial Defense
Certified Robustness
Differential Privacy
Differential Privacy Equation
Other Methods
Example
Polytope Bounding
Test Time Samples
Training Time Attacks
Conclusion
Taught by
The University of Melbourne