Alert button
Picture for Jonathan Uesato

Jonathan Uesato

Alert button

Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles

Add code
Bookmark button
Alert button
Nov 22, 2018
Edward Grefenstette, Robert Stanforth, Brendan O'Donoghue, Jonathan Uesato, Grzegorz Swirszcz, Pushmeet Kohli

Figure 1 for Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Figure 2 for Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Figure 3 for Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Figure 4 for Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Viaarxiv icon

On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models

Add code
Bookmark button
Alert button
Nov 05, 2018
Sven Gowal, Krishnamurthy Dvijotham, Robert Stanforth, Rudy Bunel, Chongli Qin, Jonathan Uesato, Relja Arandjelovic, Timothy Mann, Pushmeet Kohli

Figure 1 for On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Figure 2 for On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Figure 3 for On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Figure 4 for On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Viaarxiv icon

Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

Add code
Bookmark button
Alert button
Jun 27, 2018
Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long, Patrick McDaniel

Viaarxiv icon

Adversarial Risk and the Dangers of Evaluating Against Weak Attacks

Add code
Bookmark button
Alert button
Jun 12, 2018
Jonathan Uesato, Brendan O'Donoghue, Aaron van den Oord, Pushmeet Kohli

Figure 1 for Adversarial Risk and the Dangers of Evaluating Against Weak Attacks
Figure 2 for Adversarial Risk and the Dangers of Evaluating Against Weak Attacks
Figure 3 for Adversarial Risk and the Dangers of Evaluating Against Weak Attacks
Figure 4 for Adversarial Risk and the Dangers of Evaluating Against Weak Attacks
Viaarxiv icon

Training verified learners with learned verifiers

Add code
Bookmark button
Alert button
May 29, 2018
Krishnamurthy Dvijotham, Sven Gowal, Robert Stanforth, Relja Arandjelovic, Brendan O'Donoghue, Jonathan Uesato, Pushmeet Kohli

Figure 1 for Training verified learners with learned verifiers
Figure 2 for Training verified learners with learned verifiers
Figure 3 for Training verified learners with learned verifiers
Figure 4 for Training verified learners with learned verifiers
Viaarxiv icon

Semantic Code Repair using Neuro-Symbolic Transformation Networks

Add code
Bookmark button
Alert button
Oct 30, 2017
Jacob Devlin, Jonathan Uesato, Rishabh Singh, Pushmeet Kohli

Figure 1 for Semantic Code Repair using Neuro-Symbolic Transformation Networks
Figure 2 for Semantic Code Repair using Neuro-Symbolic Transformation Networks
Figure 3 for Semantic Code Repair using Neuro-Symbolic Transformation Networks
Figure 4 for Semantic Code Repair using Neuro-Symbolic Transformation Networks
Viaarxiv icon

RobustFill: Neural Program Learning under Noisy I/O

Add code
Bookmark button
Alert button
Mar 21, 2017
Jacob Devlin, Jonathan Uesato, Surya Bhupatiraju, Rishabh Singh, Abdel-rahman Mohamed, Pushmeet Kohli

Figure 1 for RobustFill: Neural Program Learning under Noisy I/O
Figure 2 for RobustFill: Neural Program Learning under Noisy I/O
Figure 3 for RobustFill: Neural Program Learning under Noisy I/O
Figure 4 for RobustFill: Neural Program Learning under Noisy I/O
Viaarxiv icon