Alert button
Picture for Jonathan Uesato

Jonathan Uesato

Alert button

Dj

Avoiding Tampering Incentives in Deep RL via Decoupled Approval

Nov 17, 2020
Jonathan Uesato, Ramana Kumar, Victoria Krakovna, Tom Everitt, Richard Ngo, Shane Legg

Figure 1 for Avoiding Tampering Incentives in Deep RL via Decoupled Approval
Figure 2 for Avoiding Tampering Incentives in Deep RL via Decoupled Approval
Figure 3 for Avoiding Tampering Incentives in Deep RL via Decoupled Approval
Figure 4 for Avoiding Tampering Incentives in Deep RL via Decoupled Approval
Viaarxiv icon

REALab: An Embedded Perspective on Tampering

Nov 17, 2020
Ramana Kumar, Jonathan Uesato, Richard Ngo, Tom Everitt, Victoria Krakovna, Shane Legg

Figure 1 for REALab: An Embedded Perspective on Tampering
Figure 2 for REALab: An Embedded Perspective on Tampering
Figure 3 for REALab: An Embedded Perspective on Tampering
Figure 4 for REALab: An Embedded Perspective on Tampering
Viaarxiv icon

Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming

Nov 03, 2020
Sumanth Dathathri, Krishnamurthy Dvijotham, Alexey Kurakin, Aditi Raghunathan, Jonathan Uesato, Rudy Bunel, Shreya Shankar, Jacob Steinhardt, Ian Goodfellow, Percy Liang, Pushmeet Kohli

Figure 1 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 2 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 3 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Figure 4 for Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming
Viaarxiv icon

Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples

Oct 27, 2020
Sven Gowal, Chongli Qin, Jonathan Uesato, Timothy Mann, Pushmeet Kohli

Figure 1 for Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples
Figure 2 for Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples
Figure 3 for Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples
Figure 4 for Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples
Viaarxiv icon

An Alternative Surrogate Loss for PGD-based Adversarial Testing

Oct 21, 2019
Sven Gowal, Jonathan Uesato, Chongli Qin, Po-Sen Huang, Timothy Mann, Pushmeet Kohli

Figure 1 for An Alternative Surrogate Loss for PGD-based Adversarial Testing
Figure 2 for An Alternative Surrogate Loss for PGD-based Adversarial Testing
Figure 3 for An Alternative Surrogate Loss for PGD-based Adversarial Testing
Figure 4 for An Alternative Surrogate Loss for PGD-based Adversarial Testing
Viaarxiv icon

Verification of Non-Linear Specifications for Neural Networks

Feb 25, 2019
Chongli Qin, Krishnamurthy, Dvijotham, Brendan O'Donoghue, Rudy Bunel, Robert Stanforth, Sven Gowal, Jonathan Uesato, Grzegorz Swirszcz, Pushmeet Kohli

Figure 1 for Verification of Non-Linear Specifications for Neural Networks
Figure 2 for Verification of Non-Linear Specifications for Neural Networks
Figure 3 for Verification of Non-Linear Specifications for Neural Networks
Figure 4 for Verification of Non-Linear Specifications for Neural Networks
Viaarxiv icon

Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures

Dec 04, 2018
Jonathan Uesato, Ananya Kumar, Csaba Szepesvari, Tom Erez, Avraham Ruderman, Keith Anderson, Krishmamurthy, Dvijotham, Nicolas Heess, Pushmeet Kohli

Figure 1 for Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Figure 2 for Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Figure 3 for Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Figure 4 for Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Viaarxiv icon

Robustness via curvature regularization, and vice versa

Nov 23, 2018
Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Jonathan Uesato, Pascal Frossard

Figure 1 for Robustness via curvature regularization, and vice versa
Figure 2 for Robustness via curvature regularization, and vice versa
Figure 3 for Robustness via curvature regularization, and vice versa
Figure 4 for Robustness via curvature regularization, and vice versa
Viaarxiv icon