Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–11 of 11 results for author: McDaniel, P

Searching in archive stat. Search in all archives.
.
  1. arXiv:1909.00056  [pdf, ps, other

    cs.CY cs.CR stat.ML

    How Relevant is the Turing Test in the Age of Sophisbots?

    Authors: Dan Boneh, Andrew J. Grotto, Patrick McDaniel, Nicolas Papernot

    Abstract: Popular culture has contemplated societies of thinking machines for generations, envisioning futures from utopian to dystopian. These futures are, arguably, here now-we find ourselves at the doorstep of technology that can at least simulate the appearance of thinking, acting, and feeling. The real question is: now what?

    Submitted 30 August, 2019; originally announced September 2019.

  2. arXiv:1803.04765  [pdf, other

    cs.LG stat.ML

    Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning

    Authors: Nicolas Papernot, Patrick McDaniel

    Abstract: Deep neural networks (DNNs) enable innovative applications of machine learning like image recognition, machine translation, or malware detection. However, deep learning is often criticized for its lack of robustness in adversarial settings (e.g., vulnerability to adversarial inputs) and general inability to rationalize its predictions. In this work, we exploit the structure of deep learning to ena… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

  3. arXiv:1705.07204  [pdf, other

    stat.ML cs.CR cs.LG

    Ensemble Adversarial Training: Attacks and Defenses

    Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are perturbed inputs designed to fool machine learning models. Adversarial training injects such examples into training data to increase robustness. To scale this technique to large datasets, perturbations are crafted using fast single-step methods that maximize a linear approximation of the model's loss. We show that this form of adversarial training converges to a degenerate… ▽ More

    Submitted 26 April, 2020; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: 22 pages, 5 figures, International Conference on Learning Representations (ICLR) 2018 (amended in April 2020 to include subsequent attacks that significantly reduced the robustness of our models)

  4. arXiv:1705.05264  [pdf, other

    cs.LG cs.CR stat.ML

    Extending Defensive Distillation

    Authors: Nicolas Papernot, Patrick McDaniel

    Abstract: Machine learning is vulnerable to adversarial examples: inputs carefully modified to force misclassification. Designing defenses against such inputs remains largely an open problem. In this work, we revisit defensive distillation---which is one of the mechanisms proposed to mitigate adversarial examples---to address its limitations. We view our results not only as an effective way of addressing so… ▽ More

    Submitted 15 May, 2017; originally announced May 2017.

  5. arXiv:1704.03453  [pdf, other

    stat.ML cs.CR cs.LG

    The Space of Transferable Adversarial Examples

    Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are maliciously perturbed inputs designed to mislead machine learning (ML) models at test-time. They often transfer: the same adversarial example fools more than one model. In this work, we propose novel methods for estimating the previously unknown dimensionality of the space of adversarial inputs. We find that adversarial examples span a contiguous subspace of large (~25)… ▽ More

    Submitted 23 May, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: 15 pages, 7 figures

  6. arXiv:1702.06280  [pdf, other

    cs.CR cs.LG stat.ML

    On the (Statistical) Detection of Adversarial Examples

    Authors: Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, Patrick McDaniel

    Abstract: Machine Learning (ML) models are applied in a variety of tasks such as network intrusion detection or Malware classification. Yet, these models are vulnerable to a class of malicious inputs known as adversarial examples. These are slightly perturbed inputs that are classified incorrectly by the ML model. The mitigation of these adversarial inputs remains an open problem. As a step towards understa… ▽ More

    Submitted 17 October, 2017; v1 submitted 21 February, 2017; originally announced February 2017.

    Comments: 13 pages, 4 figures, 5 tables. New version: improved writing, incorporating external feedback

  7. arXiv:1611.08648  [pdf, other

    cs.CR cs.CY cs.LG stat.ML

    Patient-Driven Privacy Control through Generalized Distillation

    Authors: Z. Berkay Celik, David Lopez-Paz, Patrick McDaniel

    Abstract: The introduction of data analytics into medicine has changed the nature of patient treatment. In this, patients are asked to disclose personal information such as genetic markers, lifestyle habits, and clinical history. This data is then used by statistical models to predict personalized treatments. However, due to privacy concerns, patients often desire to withhold sensitive information. This sel… ▽ More

    Submitted 13 October, 2017; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: IEEE Symposium on Privacy-Aware Computing (IEEE PAC), 2017

  8. arXiv:1610.00768  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

    Authors: Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long , et al. (1 additional authors not shown)

    Abstract: CleverHans is a software library that provides standardized reference implementations of adversarial example construction techniques and adversarial training. The library may be used to develop more robust machine learning models and to provide standardized benchmarks of models' performance in the adversarial setting. Benchmarks constructed without a standardized implementation of adversarial exam… ▽ More

    Submitted 27 June, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: Technical report for https://github.com/tensorflow/cleverhans

  9. arXiv:1603.09638  [pdf, other

    cs.CR cs.LG stat.ML

    Detection under Privileged Information

    Authors: Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami

    Abstract: For well over a quarter century, detection systems have been driven by models learned from input features collected from real or simulated environments. An artifact (e.g., network event, potential malware sample, suspicious email) is deemed malicious or non-malicious based on its similarity to the learned model at runtime. However, the training of the models has been historically limited to only t… ▽ More

    Submitted 30 March, 2018; v1 submitted 31 March, 2016; originally announced March 2016.

    Comments: A short version of this paper is accepted to ASIACCS 2018

  10. arXiv:1511.07528  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    The Limitations of Deep Learning in Adversarial Settings

    Authors: Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami

    Abstract: Deep learning takes advantage of large datasets and computationally efficient training algorithms to outperform other approaches at various machine learning tasks. However, imperfections in the training phase of deep neural networks make them vulnerable to adversarial samples: inputs crafted by adversaries with the intent of causing deep neural networks to misclassify. In this work, we formalize t… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.

    Comments: Accepted to the 1st IEEE European Symposium on Security & Privacy, IEEE 2016. Saarbrucken, Germany

  11. arXiv:1511.04508  [pdf, other

    cs.CR cs.LG cs.NE stat.ML

    Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks

    Authors: Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, Ananthram Swami

    Abstract: Deep learning algorithms have been shown to perform extremely well on many classical machine learning problems. However, recent studies have shown that deep learning, like other machine learning techniques, is vulnerable to adversarial samples: inputs crafted to force a deep neural network (DNN) to provide adversary-selected outputs. Such attacks can seriously undermine the security of the system… ▽ More

    Submitted 14 March, 2016; v1 submitted 13 November, 2015; originally announced November 2015.