Picture for Ian Molloy

Ian Molloy

URET: Universal Robustness Evaluation Toolkit (for Evasion)

Add code
Aug 03, 2023
Viaarxiv icon

Adaptive Verifiable Training Using Pairwise Class Similarity

Add code
Dec 14, 2020
Figure 1 for Adaptive Verifiable Training Using Pairwise Class Similarity
Figure 2 for Adaptive Verifiable Training Using Pairwise Class Similarity
Figure 3 for Adaptive Verifiable Training Using Pairwise Class Similarity
Figure 4 for Adaptive Verifiable Training Using Pairwise Class Similarity
Viaarxiv icon

Adversarial Examples and Metrics

Add code
Jul 15, 2020
Figure 1 for Adversarial Examples and Metrics
Viaarxiv icon

A new measure for overfitting and its implications for backdooring of deep learning

Add code
Jun 18, 2020
Figure 1 for A new measure for overfitting and its implications for backdooring of deep learning
Figure 2 for A new measure for overfitting and its implications for backdooring of deep learning
Figure 3 for A new measure for overfitting and its implications for backdooring of deep learning
Figure 4 for A new measure for overfitting and its implications for backdooring of deep learning
Viaarxiv icon

Reaching Data Confidentiality and Model Accountability on the CalTrain

Add code
Dec 07, 2018
Figure 1 for Reaching Data Confidentiality and Model Accountability on the CalTrain
Figure 2 for Reaching Data Confidentiality and Model Accountability on the CalTrain
Figure 3 for Reaching Data Confidentiality and Model Accountability on the CalTrain
Figure 4 for Reaching Data Confidentiality and Model Accountability on the CalTrain
Viaarxiv icon

Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering

Add code
Nov 09, 2018
Figure 1 for Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
Figure 2 for Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
Figure 3 for Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
Figure 4 for Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering
Viaarxiv icon

Defending Against Model Stealing Attacks Using Deceptive Perturbations

Add code
Sep 19, 2018
Figure 1 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 2 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 3 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Figure 4 for Defending Against Model Stealing Attacks Using Deceptive Perturbations
Viaarxiv icon

DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements

Add code
Feb 01, 2014
Figure 1 for DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements
Figure 2 for DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements
Figure 3 for DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements
Figure 4 for DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements
Viaarxiv icon