Adversarial Examples in Machine Learning - Crafting and Defending Against Attacks
USENIX Enigma Conference via YouTube
Overview
Syllabus
Intro
Successes of machine learning
Failures of machine learning: Dave's talk
Crafting adversarial examples: fast gradient sign method
Threat model of a black-box attack
Our approach to black-box attacks
Adversarial example transferability
Intra-technique transferability: cross training data
Cross-technique transferability
Attacking remotely hosted black-box models
Results on real-world remote systems
Hands-on tutorial with the MNIST dataset
Taught by
USENIX Enigma Conference