Alert button
Picture for Blaine Nelson

Blaine Nelson

Alert button

University of Tuebingen

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Add code
Bookmark button
Alert button
Dec 04, 2023
Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi

Viaarxiv icon

Support Vector Machines under Adversarial Label Contamination

Add code
Bookmark button
Alert button
Jun 01, 2022
Huang Xiao, Battista Biggio, Blaine Nelson, Han Xiao, Claudia Eckert, Fabio Roli

Figure 1 for Support Vector Machines under Adversarial Label Contamination
Figure 2 for Support Vector Machines under Adversarial Label Contamination
Figure 3 for Support Vector Machines under Adversarial Label Contamination
Viaarxiv icon

Evasion Attacks against Machine Learning at Test Time

Add code
Bookmark button
Alert button
Aug 21, 2017
Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio Roli

Figure 1 for Evasion Attacks against Machine Learning at Test Time
Figure 2 for Evasion Attacks against Machine Learning at Test Time
Figure 3 for Evasion Attacks against Machine Learning at Test Time
Figure 4 for Evasion Attacks against Machine Learning at Test Time
Viaarxiv icon

Bayesian Differential Privacy through Posterior Sampling

Add code
Bookmark button
Alert button
Dec 23, 2016
Christos Dimitrakakis, Blaine Nelson, and Zuhe Zhang, Aikaterini Mitrokotsa, Benjamin Rubinstein

Figure 1 for Bayesian Differential Privacy through Posterior Sampling
Viaarxiv icon

Security Evaluation of Support Vector Machines in Adversarial Environments

Add code
Bookmark button
Alert button
Jan 30, 2014
Battista Biggio, Igino Corona, Blaine Nelson, Benjamin I. P. Rubinstein, Davide Maiorca, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli

Figure 1 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 2 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 3 for Security Evaluation of Support Vector Machines in Adversarial Environments
Figure 4 for Security Evaluation of Support Vector Machines in Adversarial Environments
Viaarxiv icon

Poisoning Attacks against Support Vector Machines

Add code
Bookmark button
Alert button
Mar 25, 2013
Battista Biggio, Blaine Nelson, Pavel Laskov

Figure 1 for Poisoning Attacks against Support Vector Machines
Figure 2 for Poisoning Attacks against Support Vector Machines
Figure 3 for Poisoning Attacks against Support Vector Machines
Viaarxiv icon

Query Strategies for Evading Convex-Inducing Classifiers

Add code
Bookmark button
Alert button
Jul 03, 2010
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Steven J. Lee, Satish Rao, J. D. Tygar

Figure 1 for Query Strategies for Evading Convex-Inducing Classifiers
Figure 2 for Query Strategies for Evading Convex-Inducing Classifiers
Figure 3 for Query Strategies for Evading Convex-Inducing Classifiers
Figure 4 for Query Strategies for Evading Convex-Inducing Classifiers
Viaarxiv icon

Near-Optimal Evasion of Convex-Inducing Classifiers

Add code
Bookmark button
Alert button
Mar 14, 2010
Blaine Nelson, Benjamin I. P. Rubinstein, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Steven J. Lee, Satish Rao, Anthony Tran, J. D. Tygar

Viaarxiv icon