- Ilyas, A., Santurkar, S., Tsipras, D., Engstrom, L., Tran, B., and Madry, A. Adversarial Examples Are Not Bugs, They Are Features ArXiv preprint (2019): https://arxiv.org/abs/1905.02175.Google Scholar
- Wang, H., Wu, X., Yin, P., and Xing, E.P. High Frequency Component Helps Explain the Generalization of Convolutional Neural Networks ArXiv preprint (2019): https://arxiv.org/abs/1905.13545.Google Scholar
- Papernot, N., and McDaniel P. Deep k-Nearest Neighbors: Towards Confident, Interpretable and Robust Deep Learning ArXiv preprint (2018): https://arxiv.org/abs/1803.04765.Google Scholar
- Jacobsen, J.H., Behrmannn, J., Carlini N., Tramer, F., and Papernot, N. Exploiting Excessive Invariance caused by Norm-Bounded Adversarial Robustness ICLR 2019 Workshop on Safe ML, New Orleans, Louisiana. https://arxiv.org/abs/1903.10484.Google Scholar
Index Terms
- Malevolent machine learning
Recommendations
Machine Learning: The State of the Art
The two fundamental problems in machine learning (ML) are statistical analysis and algorithm design. The former tells us the principles of the mathematical models that we establish from the observation data. The latter defines the conditions on which ...
Comments