Picture for Octavian Suciu

Octavian Suciu

Exploring Adversarial Examples in Malware Detection

Add code
Oct 18, 2018
Figure 1 for Exploring Adversarial Examples in Malware Detection
Figure 2 for Exploring Adversarial Examples in Malware Detection
Figure 3 for Exploring Adversarial Examples in Malware Detection
Figure 4 for Exploring Adversarial Examples in Malware Detection
Viaarxiv icon

Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks

Add code
Apr 03, 2018
Figure 1 for Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Figure 2 for Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Figure 3 for Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Figure 4 for Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks
Viaarxiv icon

When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks

Add code
Mar 19, 2018
Figure 1 for When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Figure 2 for When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Figure 3 for When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Figure 4 for When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
Viaarxiv icon

Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

Add code
Jan 17, 2017
Figure 1 for Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
Figure 2 for Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
Figure 3 for Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
Figure 4 for Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
Viaarxiv icon