Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–22 of 22 results for author: Carlini, N

Searching in archive stat. Search in all archives.
.
  1. arXiv:2306.02895  [pdf, other

    cs.CR cs.LG stat.ML

    Evading Black-box Classifiers Without Breaking Eggs

    Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr

    Abstract: Decision-based evasion attacks repeatedly query a black-box classifier to generate adversarial examples. Prior work measures the cost of such attacks by the total number of queries made to the classifier. We argue this metric is flawed. Most security-critical machine learning systems aim to weed out "bad" data (e.g., malware, harmful content, etc). Queries to such systems carry a fundamentally asy… ▽ More

    Submitted 14 February, 2024; v1 submitted 5 June, 2023; originally announced June 2023.

    Comments: Code at https://github.com/ethz-privsec/realistic-adv-examples. Accepted at IEEE SaTML 2024

  2. arXiv:2212.06470  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Position: Considerations for Differentially Private Learning with Large-Scale Public Pretraining

    Authors: Florian Tramèr, Gautam Kamath, Nicholas Carlini

    Abstract: The performance of differentially private machine learning can be boosted significantly by leveraging the transfer learning capabilities of non-private models pretrained on large public datasets. We critically review this approach. We primarily question whether the use of large Web-scraped datasets should be viewed as differential-privacy-preserving. We caution that publicizing these models pret… ▽ More

    Submitted 17 July, 2024; v1 submitted 13 December, 2022; originally announced December 2022.

    Comments: Full and unabridged version of paper ICML 2024

  3. arXiv:2204.00032  [pdf, other

    cs.CR cs.LG stat.ML

    Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets

    Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini

    Abstract: We introduce a new class of attacks on machine learning models. We show that an adversary who can poison a training dataset can cause models trained on this dataset to leak significant private details of training points belonging to other parties. Our active inference attacks connect two independent lines of work targeting the integrity and privacy of machine learning training data. Our attacks… ▽ More

    Submitted 6 October, 2022; v1 submitted 31 March, 2022; originally announced April 2022.

    Comments: ACM CCS 2022

  4. arXiv:2010.00071  [pdf, ps, other

    cs.LG stat.ML

    Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning

    Authors: Guneet S. Dhillon, Nicholas Carlini

    Abstract: Stochastic Activation Pruning (SAP) (Dhillon et al., 2018) is a defense to adversarial examples that was attacked and found to be broken by the "Obfuscated Gradients" paper (Athalye et al., 2018). We discover a flaw in the re-implementation that artificially weakens SAP. When SAP is applied properly, the proposed attack is not effective. However, we show that a new use of the BPDA attack technique… ▽ More

    Submitted 30 September, 2020; originally announced October 2020.

  5. arXiv:2007.14321  [pdf, other

    cs.CR cs.LG stat.ML

    Label-Only Membership Inference Attacks

    Authors: Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot

    Abstract: Membership inference attacks are one of the simplest forms of privacy leakage for machine learning models: given a data point and model, determine whether the point was used to train the model. Existing membership inference attacks exploit models' abnormal confidence when queried on their training data. These attacks do not apply if the adversary only gets access to models' predicted labels, witho… ▽ More

    Submitted 5 December, 2021; v1 submitted 28 July, 2020; originally announced July 2020.

    Comments: 16 pages, 11 figures, 2 tables Revision 2: 19 pages, 12 figures, 3 tables. Improved text and additional experiments. Final ICML paper

  6. arXiv:2007.00644  [pdf, other

    cs.LG cs.CV stat.ML

    Measuring Robustness to Natural Distribution Shifts in Image Classification

    Authors: Rohan Taori, Achal Dave, Vaishaal Shankar, Nicholas Carlini, Benjamin Recht, Ludwig Schmidt

    Abstract: We study how robust current ImageNet models are to distribution shifts arising from natural variations in datasets. Most research on robustness focuses on synthetic image perturbations (noise, simulated weather artifacts, adversarial examples, etc.), which leaves open how robustness on synthetic distribution shift relates to distribution shift arising in real data. Informed by an evaluation of 204… ▽ More

    Submitted 14 September, 2020; v1 submitted 1 July, 2020; originally announced July 2020.

  7. arXiv:2002.08347  [pdf, other

    cs.LG cs.CR stat.ML

    On Adaptive Attacks to Adversarial Example Defenses

    Authors: Florian Tramer, Nicholas Carlini, Wieland Brendel, Aleksander Madry

    Abstract: Adaptive attacks have (rightfully) become the de facto standard for evaluating defenses to adversarial examples. We find, however, that typical adaptive evaluations are incomplete. We demonstrate that thirteen defenses recently published at ICLR, ICML and NeurIPS---and chosen for illustrative and pedagogical purposes---can be circumvented despite attempting to perform evaluations using adaptive at… ▽ More

    Submitted 23 October, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

    Comments: NeurIPS 2020

  8. arXiv:2002.04599  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Fundamental Tradeoffs between Invariance and Sensitivity to Adversarial Perturbations

    Authors: Florian Tramèr, Jens Behrmann, Nicholas Carlini, Nicolas Papernot, Jörn-Henrik Jacobsen

    Abstract: Adversarial examples are malicious inputs crafted to induce misclassification. Commonly studied sensitivity-based adversarial examples introduce semantically-small changes to an input that result in a different model prediction. This paper studies a complementary failure mode, invariance-based adversarial examples, that introduce minimal semantic changes that modify an input's true label yet prese… ▽ More

    Submitted 4 August, 2020; v1 submitted 11 February, 2020; originally announced February 2020.

    Comments: ICML 2020 (Supersedes the workshop paper "Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness", arXiv:1903.10484)

  9. arXiv:2001.07685  [pdf

    cs.LG cs.CV stat.ML

    FixMatch: Simplifying Semi-Supervised Learning with Consistency and Confidence

    Authors: Kihyuk Sohn, David Berthelot, Chun-Liang Li, Zizhao Zhang, Nicholas Carlini, Ekin D. Cubuk, Alex Kurakin, Han Zhang, Colin Raffel

    Abstract: Semi-supervised learning (SSL) provides an effective means of leveraging unlabeled data to improve a model's performance. In this paper, we demonstrate the power of a simple combination of two common SSL methods: consistency regularization and pseudo-labeling. Our algorithm, FixMatch, first generates pseudo-labels using the model's predictions on weakly-augmented unlabeled images. For a given imag… ▽ More

    Submitted 25 November, 2020; v1 submitted 21 January, 2020; originally announced January 2020.

    Comments: Published at NeurIPS 2020 as a conference paper

  10. arXiv:1911.09785  [pdf, other

    cs.LG cs.CV stat.ML

    ReMixMatch: Semi-Supervised Learning with Distribution Alignment and Augmentation Anchoring

    Authors: David Berthelot, Nicholas Carlini, Ekin D. Cubuk, Alex Kurakin, Kihyuk Sohn, Han Zhang, Colin Raffel

    Abstract: We improve the recently-proposed "MixMatch" semi-supervised learning algorithm by introducing two new techniques: distribution alignment and augmentation anchoring. Distribution alignment encourages the marginal distribution of predictions on unlabeled data to be close to the marginal distribution of ground-truth labels. Augmentation anchoring feeds multiple strongly augmented versions of an input… ▽ More

    Submitted 13 February, 2020; v1 submitted 21 November, 2019; originally announced November 2019.

  11. arXiv:1910.13427  [pdf, other

    cs.LG stat.ML

    Distribution Density, Tails, and Outliers in Machine Learning: Metrics and Applications

    Authors: Nicholas Carlini, Úlfar Erlingsson, Nicolas Papernot

    Abstract: We develop techniques to quantify the degree to which a given (training or testing) example is an outlier in the underlying distribution. We evaluate five methods to score examples in a dataset by how well-represented the examples are, for different plausible definitions of "well-represented", and apply these to four common datasets: MNIST, Fashion-MNIST, CIFAR-10, and ImageNet. Despite being inde… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

  12. arXiv:1909.01838  [pdf, other

    cs.LG cs.CR stat.ML

    High Accuracy and High Fidelity Extraction of Neural Networks

    Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot

    Abstract: In a model extraction attack, an adversary steals a copy of a remotely deployed machine learning model, given oracle prediction access. We taxonomize model extraction attacks around two objectives: *accuracy*, i.e., performing well on the underlying learning task, and *fidelity*, i.e., matching the predictions of the remote victim classifier on any input. To extract a high-accuracy model, we dev… ▽ More

    Submitted 3 March, 2020; v1 submitted 3 September, 2019; originally announced September 2019.

    Comments: USENIX Security 2020, 18 pages, 6 figures

  13. arXiv:1905.02249  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    MixMatch: A Holistic Approach to Semi-Supervised Learning

    Authors: David Berthelot, Nicholas Carlini, Ian Goodfellow, Nicolas Papernot, Avital Oliver, Colin Raffel

    Abstract: Semi-supervised learning has proven to be a powerful paradigm for leveraging unlabeled data to mitigate the reliance on large labeled datasets. In this work, we unify the current dominant approaches for semi-supervised learning to produce a new algorithm, MixMatch, that works by guessing low-entropy labels for data-augmented unlabeled examples and mixing labeled and unlabeled data using MixUp. We… ▽ More

    Submitted 23 October, 2019; v1 submitted 6 May, 2019; originally announced May 2019.

  14. arXiv:1904.03257  [pdf, ps, other

    cs.LG cs.DB cs.DC cs.SE stat.ML

    MLSys: The New Frontier of Machine Learning Systems

    Authors: Alexander Ratner, Dan Alistarh, Gustavo Alonso, David G. Andersen, Peter Bailis, Sarah Bird, Nicholas Carlini, Bryan Catanzaro, Jennifer Chayes, Eric Chung, Bill Dally, Jeff Dean, Inderjit S. Dhillon, Alexandros Dimakis, Pradeep Dubey, Charles Elkan, Grigori Fursin, Gregory R. Ganger, Lise Getoor, Phillip B. Gibbons, Garth A. Gibson, Joseph E. Gonzalez, Justin Gottschlich, Song Han, Kim Hazelwood , et al. (44 additional authors not shown)

    Abstract: Machine learning (ML) techniques are enjoying rapidly increasing adoption. However, designing and implementing the systems that support ML models in real-world deployments remains a significant obstacle, in large part due to the radically different development and deployment profile of modern ML methods, and the range of practical concerns that come with broader adoption. We propose to foster a ne… ▽ More

    Submitted 1 December, 2019; v1 submitted 29 March, 2019; originally announced April 2019.

  15. arXiv:1903.10484  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness

    Authors: Jörn-Henrik Jacobsen, Jens Behrmannn, Nicholas Carlini, Florian Tramèr, Nicolas Papernot

    Abstract: Adversarial examples are malicious inputs crafted to cause a model to misclassify them. Their most common instantiation, "perturbation-based" adversarial examples introduce changes to the input that leave its true label unchanged, yet result in a different model prediction. Conversely, "invariance-based" adversarial examples insert changes to the input that leave the model's prediction unaffected… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Comments: Accepted at the ICLR 2019 SafeML Workshop

  16. arXiv:1903.10346  [pdf, other

    eess.AS cs.LG cs.SD stat.ML

    Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition

    Authors: Yao Qin, Nicholas Carlini, Ian Goodfellow, Garrison Cottrell, Colin Raffel

    Abstract: Adversarial examples are inputs to machine learning models designed by an adversary to cause an incorrect output. So far, adversarial examples have been studied most extensively in the image domain. In this domain, adversarial examples can be constructed by imperceptibly modifying images to cause misclassification, and are practical in the physical world. In contrast, current targeted adversarial… ▽ More

    Submitted 7 June, 2019; v1 submitted 22 March, 2019; originally announced March 2019.

    Comments: International Conference on Machine Learning (ICML), 2019

  17. arXiv:1902.06705  [pdf, ps, other

    cs.LG cs.CR stat.ML

    On Evaluating Adversarial Robustness

    Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin

    Abstract: Correctly evaluating defenses against adversarial examples has proven to be extremely difficult. Despite the significant amount of recent work attempting to design defenses that withstand adaptive attacks, few have succeeded; most papers that propose defenses are quickly shown to be incorrect. We believe a large contributing factor is the difficulty of performing security evaluations. In this pa… ▽ More

    Submitted 20 February, 2019; v1 submitted 18 February, 2019; originally announced February 2019.

    Comments: Living document; source available at https://github.com/evaluating-adversarial-robustness/adv-eval-paper/

  18. arXiv:1902.02322  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Is AmI (Attacks Meet Interpretability) Robust to Adversarial Examples?

    Authors: Nicholas Carlini

    Abstract: No.

    Submitted 6 February, 2019; originally announced February 2019.

  19. arXiv:1901.10513  [pdf, other

    cs.LG cs.CV stat.ML

    Adversarial Examples Are a Natural Consequence of Test Error in Noise

    Authors: Nic Ford, Justin Gilmer, Nicolas Carlini, Dogus Cubuk

    Abstract: Over the last few years, the phenomenon of adversarial examples --- maliciously constructed inputs that fool trained machine learning models --- has captured the attention of the research community, especially when the adversary is restricted to small modifications of a correctly handled input. Less surprisingly, image classifiers also lack human-level performance on randomly corrupted images, suc… ▽ More

    Submitted 29 January, 2019; originally announced January 2019.

  20. arXiv:1809.08352  [pdf, other

    stat.ML cs.CV cs.LG

    Unrestricted Adversarial Examples

    Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow

    Abstract: We introduce a two-player contest for evaluating the safety and robustness of machine learning systems, with a large prize pool. Unlike most prior work in ML robustness, which studies norm-constrained adversaries, we shift our focus to unconstrained adversaries. Defenders submit machine learning models, and try to achieve high accuracy and coverage on non-adversarial data while making no confident… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

  21. arXiv:1804.03286  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

    Authors: Anish Athalye, Nicholas Carlini

    Abstract: Neural networks are known to be vulnerable to adversarial examples. In this note, we evaluate the two white-box defenses that appeared at CVPR 2018 and find they are ineffective: when applying existing techniques, we can reduce the accuracy of the defended models to 0%.

    Submitted 10 April, 2018; originally announced April 2018.

  22. arXiv:1610.00768  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

    Authors: Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long , et al. (1 additional authors not shown)

    Abstract: CleverHans is a software library that provides standardized reference implementations of adversarial example construction techniques and adversarial training. The library may be used to develop more robust machine learning models and to provide standardized benchmarks of models' performance in the adversarial setting. Benchmarks constructed without a standardized implementation of adversarial exam… ▽ More

    Submitted 27 June, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: Technical report for https://github.com/tensorflow/cleverhans