Alert button
Picture for Alexey Kurakin

Alexey Kurakin

Alert button

Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming

Oct 22, 2020
Sumanth Dathathri, Krishnamurthy Dvijotham, Alexey Kurakin, Aditi Raghunathan, Jonathan Uesato, Rudy Bunel, Shreya Shankar, Jacob Steinhardt, Ian Goodfellow, Percy Liang, Pushmeet Kohli

Figure 1 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 2 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 3 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 4 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Viaarxiv icon

On Evaluating Adversarial Robustness

Feb 20, 2019
Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin

Viaarxiv icon

Adversarial Vision Challenge

Aug 06, 2018
Wieland Brendel, Jonas Rauber, Alexey Kurakin, Nicolas Papernot, Behar Veliqi, Marcel Salathé, Sharada P. Mohanty, Matthias Bethge

Viaarxiv icon

Ensemble Adversarial Training: Attacks and Defenses

Jul 22, 2018
Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

Figure 1 for Ensemble Adversarial Training: Attacks and Defenses
Figure 2 for Ensemble Adversarial Training: Attacks and Defenses
Figure 3 for Ensemble Adversarial Training: Attacks and Defenses
Figure 4 for Ensemble Adversarial Training: Attacks and Defenses
Viaarxiv icon

Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

Jun 27, 2018
Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long, Patrick McDaniel

Viaarxiv icon

Adversarial Attacks and Defences Competition

Mar 31, 2018
Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe

Figure 1 for Adversarial Attacks and Defences Competition
Figure 2 for Adversarial Attacks and Defences Competition
Figure 3 for Adversarial Attacks and Defences Competition
Figure 4 for Adversarial Attacks and Defences Competition
Viaarxiv icon

Adversarial Logit Pairing

Mar 16, 2018
Harini Kannan, Alexey Kurakin, Ian Goodfellow

Figure 1 for Adversarial Logit Pairing
Figure 2 for Adversarial Logit Pairing
Figure 3 for Adversarial Logit Pairing
Figure 4 for Adversarial Logit Pairing
Viaarxiv icon

Adversarial examples in the physical world

Feb 11, 2017
Alexey Kurakin, Ian Goodfellow, Samy Bengio

Figure 1 for Adversarial examples in the physical world
Figure 2 for Adversarial examples in the physical world
Figure 3 for Adversarial examples in the physical world
Figure 4 for Adversarial examples in the physical world
Viaarxiv icon

Adversarial Machine Learning at Scale

Feb 11, 2017
Alexey Kurakin, Ian Goodfellow, Samy Bengio

Figure 1 for Adversarial Machine Learning at Scale
Figure 2 for Adversarial Machine Learning at Scale
Figure 3 for Adversarial Machine Learning at Scale
Figure 4 for Adversarial Machine Learning at Scale
Viaarxiv icon