Picture for Jonathan Uesato

Jonathan Uesato

Tony

Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures

Add code
Dec 04, 2018
Figure 1 for Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Figure 2 for Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Figure 3 for Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Figure 4 for Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures
Viaarxiv icon

Robustness via curvature regularization, and vice versa

Add code
Nov 23, 2018
Figure 1 for Robustness via curvature regularization, and vice versa
Figure 2 for Robustness via curvature regularization, and vice versa
Figure 3 for Robustness via curvature regularization, and vice versa
Figure 4 for Robustness via curvature regularization, and vice versa
Viaarxiv icon

Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles

Add code
Nov 22, 2018
Figure 1 for Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Figure 2 for Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Figure 3 for Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Figure 4 for Strength in Numbers: Trading-off Robustness and Computation via Adversarially-Trained Ensembles
Viaarxiv icon

On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models

Add code
Nov 05, 2018
Figure 1 for On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Figure 2 for On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Figure 3 for On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Figure 4 for On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models
Viaarxiv icon

Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

Add code
Jun 27, 2018
Viaarxiv icon

Adversarial Risk and the Dangers of Evaluating Against Weak Attacks

Add code
Jun 12, 2018
Figure 1 for Adversarial Risk and the Dangers of Evaluating Against Weak Attacks
Figure 2 for Adversarial Risk and the Dangers of Evaluating Against Weak Attacks
Figure 3 for Adversarial Risk and the Dangers of Evaluating Against Weak Attacks
Figure 4 for Adversarial Risk and the Dangers of Evaluating Against Weak Attacks
Viaarxiv icon

Training verified learners with learned verifiers

Add code
May 29, 2018
Figure 1 for Training verified learners with learned verifiers
Figure 2 for Training verified learners with learned verifiers
Figure 3 for Training verified learners with learned verifiers
Figure 4 for Training verified learners with learned verifiers
Viaarxiv icon

Semantic Code Repair using Neuro-Symbolic Transformation Networks

Add code
Oct 30, 2017
Figure 1 for Semantic Code Repair using Neuro-Symbolic Transformation Networks
Figure 2 for Semantic Code Repair using Neuro-Symbolic Transformation Networks
Figure 3 for Semantic Code Repair using Neuro-Symbolic Transformation Networks
Figure 4 for Semantic Code Repair using Neuro-Symbolic Transformation Networks
Viaarxiv icon

RobustFill: Neural Program Learning under Noisy I/O

Add code
Mar 21, 2017
Figure 1 for RobustFill: Neural Program Learning under Noisy I/O
Figure 2 for RobustFill: Neural Program Learning under Noisy I/O
Figure 3 for RobustFill: Neural Program Learning under Noisy I/O
Figure 4 for RobustFill: Neural Program Learning under Noisy I/O
Viaarxiv icon