Alert button
Picture for Dawn Song

Dawn Song

Alert button

How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning

Add code
Bookmark button
Alert button
Apr 24, 2019
Xinlei Pan, Weiyao Wang, Xiaoshuai Zhang, Bo Li, Jinfeng Yi, Dawn Song

Figure 1 for How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning
Figure 2 for How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning
Figure 3 for How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning
Figure 4 for How You Act Tells a Lot: Privacy-Leakage Attack on Deep Reinforcement Learning
Viaarxiv icon

SysML: The New Frontier of Machine Learning Systems

Add code
Bookmark button
Alert button
Mar 29, 2019
Alexander Ratner, Dan Alistarh, Gustavo Alonso, Peter Bailis, Sarah Bird, Nicholas Carlini, Bryan Catanzaro, Eric Chung, Bill Dally, Jeff Dean, Inderjit S. Dhillon, Alexandros Dimakis, Pradeep Dubey, Charles Elkan, Grigori Fursin, Gregory R. Ganger, Lise Getoor, Phillip B. Gibbons, Garth A. Gibson, Joseph E. Gonzalez, Justin Gottschlich, Song Han, Kim Hazelwood, Furong Huang, Martin Jaggi, Kevin Jamieson, Michael I. Jordan, Gauri Joshi, Rania Khalaf, Jason Knight, Jakub Konečný, Tim Kraska, Arun Kumar, Anastasios Kyrillidis, Jing Li, Samuel Madden, H. Brendan McMahan, Erik Meijer, Ioannis Mitliagkas, Rajat Monga, Derek Murray, Dimitris Papailiopoulos, Gennady Pekhimenko, Theodoros Rekatsinas, Afshin Rostamizadeh, Christopher Ré, Christopher De Sa, Hanie Sedghi, Siddhartha Sen, Virginia Smith, Alex Smola, Dawn Song, Evan Sparks, Ion Stoica, Vivienne Sze, Madeleine Udell, Joaquin Vanschoren, Shivaram Venkataraman, Rashmi Vinayak, Markus Weimer, Andrew Gordon Wilson, Eric Xing, Matei Zaharia, Ce Zhang, Ameet Talwalkar

Viaarxiv icon

Towards Efficient Data Valuation Based on the Shapley Value

Add code
Bookmark button
Alert button
Feb 27, 2019
Ruoxi Jia, David Dao, Boxin Wang, Frances Ann Hubis, Nick Hynes, Nezihe Merve Gurel, Bo Li, Ce Zhang, Dawn Song, Costas Spanos

Figure 1 for Towards Efficient Data Valuation Based on the Shapley Value
Figure 2 for Towards Efficient Data Valuation Based on the Shapley Value
Figure 3 for Towards Efficient Data Valuation Based on the Shapley Value
Figure 4 for Towards Efficient Data Valuation Based on the Shapley Value
Viaarxiv icon

Data Poisoning Attack against Unsupervised Node Embedding Methods

Add code
Bookmark button
Alert button
Nov 01, 2018
Mingjie Sun, Jian Tang, Huichen Li, Bo Li, Chaowei Xiao, Yao Chen, Dawn Song

Figure 1 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 2 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 3 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Figure 4 for Data Poisoning Attack against Unsupervised Node Embedding Methods
Viaarxiv icon

Assessing Generalization in Deep Reinforcement Learning

Add code
Bookmark button
Alert button
Oct 29, 2018
Charles Packer, Katelyn Gao, Jernej Kos, Philipp Krähenbühl, Vladlen Koltun, Dawn Song

Figure 1 for Assessing Generalization in Deep Reinforcement Learning
Figure 2 for Assessing Generalization in Deep Reinforcement Learning
Figure 3 for Assessing Generalization in Deep Reinforcement Learning
Figure 4 for Assessing Generalization in Deep Reinforcement Learning
Viaarxiv icon

Tree-to-tree Neural Networks for Program Translation

Add code
Bookmark button
Alert button
Oct 26, 2018
Xinyun Chen, Chang Liu, Dawn Song

Figure 1 for Tree-to-tree Neural Networks for Program Translation
Figure 2 for Tree-to-tree Neural Networks for Program Translation
Figure 3 for Tree-to-tree Neural Networks for Program Translation
Figure 4 for Tree-to-tree Neural Networks for Program Translation
Viaarxiv icon

Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation

Add code
Bookmark button
Alert button
Oct 11, 2018
Chaowei Xiao, Ruizhi Deng, Bo Li, Fisher Yu, Mingyan Liu, Dawn Song

Figure 1 for Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation
Figure 2 for Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation
Figure 3 for Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation
Figure 4 for Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation
Viaarxiv icon

Physical Adversarial Examples for Object Detectors

Add code
Bookmark button
Alert button
Oct 05, 2018
Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, Tadayoshi Kohno, Dawn Song

Figure 1 for Physical Adversarial Examples for Object Detectors
Figure 2 for Physical Adversarial Examples for Object Detectors
Figure 3 for Physical Adversarial Examples for Object Detectors
Figure 4 for Physical Adversarial Examples for Object Detectors
Viaarxiv icon

Characterizing Audio Adversarial Examples Using Temporal Dependency

Add code
Bookmark button
Alert button
Sep 28, 2018
Zhuolin Yang, Bo Li, Pin-Yu Chen, Dawn Song

Figure 1 for Characterizing Audio Adversarial Examples Using Temporal Dependency
Figure 2 for Characterizing Audio Adversarial Examples Using Temporal Dependency
Figure 3 for Characterizing Audio Adversarial Examples Using Temporal Dependency
Figure 4 for Characterizing Audio Adversarial Examples Using Temporal Dependency
Viaarxiv icon

Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection

Add code
Bookmark button
Alert button
Jul 27, 2018
Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song

Figure 1 for Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Figure 2 for Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Figure 3 for Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Figure 4 for Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Viaarxiv icon