Picture for Tegjyot Singh Sethi

Tegjyot Singh Sethi

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Add code
Mar 24, 2018
Figure 1 for Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Figure 2 for Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Figure 3 for Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Figure 4 for Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks
Viaarxiv icon

A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

Add code
Mar 24, 2018
Figure 1 for A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Figure 2 for A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Figure 3 for A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Figure 4 for A Dynamic-Adversarial Mining Approach to the Security of Machine Learning
Viaarxiv icon

Handling Adversarial Concept Drift in Streaming Data

Add code
Mar 24, 2018
Figure 1 for Handling Adversarial Concept Drift in Streaming Data
Figure 2 for Handling Adversarial Concept Drift in Streaming Data
Figure 3 for Handling Adversarial Concept Drift in Streaming Data
Figure 4 for Handling Adversarial Concept Drift in Streaming Data
Viaarxiv icon

On the Reliable Detection of Concept Drift from Streaming Unlabeled Data

Add code
Mar 31, 2017
Figure 1 for On the Reliable Detection of Concept Drift from Streaming Unlabeled Data
Figure 2 for On the Reliable Detection of Concept Drift from Streaming Unlabeled Data
Figure 3 for On the Reliable Detection of Concept Drift from Streaming Unlabeled Data
Figure 4 for On the Reliable Detection of Concept Drift from Streaming Unlabeled Data
Viaarxiv icon

Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

Add code
Mar 23, 2017
Figure 1 for Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains
Viaarxiv icon