Alert button
Picture for Dawn Song

Dawn Song

Alert button

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Add code
Bookmark button
Alert button
Dec 30, 2020
Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein

Figure 1 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 2 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 3 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 4 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Viaarxiv icon

Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Add code
Bookmark button
Alert button
Dec 18, 2020
Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein

Figure 1 for Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 2 for Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 3 for Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 4 for Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Viaarxiv icon

Extracting Training Data from Large Language Models

Add code
Bookmark button
Alert button
Dec 14, 2020
Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, Alina Oprea, Colin Raffel

Figure 1 for Extracting Training Data from Large Language Models
Figure 2 for Extracting Training Data from Large Language Models
Figure 3 for Extracting Training Data from Large Language Models
Figure 4 for Extracting Training Data from Large Language Models
Viaarxiv icon

Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization

Add code
Bookmark button
Alert button
Dec 03, 2020
Aishan Liu, Shiyu Tang, Xianglong Liu, Xinyun Chen, Lei Huang, Zhuozhuo Tu, Dawn Song, Dacheng Tao

Figure 1 for Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization
Figure 2 for Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization
Figure 3 for Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization
Figure 4 for Towards Defending Multiple Adversarial Perturbations via Gated Batch Normalization
Viaarxiv icon

Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams

Add code
Bookmark button
Alert button
Nov 19, 2020
Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner

Figure 1 for Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams
Figure 2 for Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams
Figure 3 for Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams
Figure 4 for Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams
Viaarxiv icon

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Add code
Bookmark button
Alert button
Oct 26, 2020
Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song

Figure 1 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 2 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 3 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 4 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Viaarxiv icon

Language Models are Open Knowledge Graphs

Add code
Bookmark button
Alert button
Oct 22, 2020
Chenguang Wang, Xiao Liu, Dawn Song

Figure 1 for Language Models are Open Knowledge Graphs
Figure 2 for Language Models are Open Knowledge Graphs
Figure 3 for Language Models are Open Knowledge Graphs
Figure 4 for Language Models are Open Knowledge Graphs
Viaarxiv icon

F2ED-Learning: Good Fences Make Good Neighbors

Add code
Bookmark button
Alert button
Oct 02, 2020
Lun Wang, Qi Pang, Shuai Wang, Dawn Song

Figure 1 for F2ED-Learning: Good Fences Make Good Neighbors
Figure 2 for F2ED-Learning: Good Fences Make Good Neighbors
Figure 3 for F2ED-Learning: Good Fences Make Good Neighbors
Viaarxiv icon

Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer

Add code
Bookmark button
Alert button
Oct 02, 2020
Qinbin Li, Bingsheng He, Dawn Song

Figure 1 for Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer
Figure 2 for Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer
Figure 3 for Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer
Figure 4 for Model-Agnostic Round-Optimal Federated Learning via Knowledge Transfer
Viaarxiv icon

Measuring Massive Multitask Language Understanding

Add code
Bookmark button
Alert button
Sep 21, 2020
Dan Hendrycks, Collin Burns, Steven Basart, Andy Zou, Mantas Mazeika, Dawn Song, Jacob Steinhardt

Figure 1 for Measuring Massive Multitask Language Understanding
Figure 2 for Measuring Massive Multitask Language Understanding
Figure 3 for Measuring Massive Multitask Language Understanding
Figure 4 for Measuring Massive Multitask Language Understanding
Viaarxiv icon