Alert button
Picture for Kathrin Grosse

Kathrin Grosse

Alert button

Manipulating Trajectory Prediction with Backdoors

Add code
Bookmark button
Alert button
Jan 03, 2024
Kaouther Messaoud, Kathrin Grosse, Mickael Chen, Matthieu Cord, Patrick Pérez, Alexandre Alahi

Viaarxiv icon

Towards more Practical Threat Models in Artificial Intelligence Security

Add code
Bookmark button
Alert button
Nov 16, 2023
Kathrin Grosse, Lukas Bieringer, Tarek Richard Besold, Alexandre Alahi

Viaarxiv icon

A Survey on Reinforcement Learning Security with Application to Autonomous Driving

Add code
Bookmark button
Alert button
Dec 12, 2022
Ambra Demontis, Maura Pintor, Luca Demetrio, Kathrin Grosse, Hsiao-Ying Lin, Chengfang Fang, Battista Biggio, Fabio Roli

Figure 1 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 2 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 3 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Figure 4 for A Survey on Reinforcement Learning Security with Application to Autonomous Driving
Viaarxiv icon

"Why do so?" -- A Practical Perspective on Machine Learning Security

Add code
Bookmark button
Alert button
Jul 11, 2022
Kathrin Grosse, Lukas Bieringer, Tarek Richard Besold, Battista Biggio, Katharina Krombholz

Figure 1 for "Why do so?" -- A Practical Perspective on Machine Learning Security
Figure 2 for "Why do so?" -- A Practical Perspective on Machine Learning Security
Figure 3 for "Why do so?" -- A Practical Perspective on Machine Learning Security
Figure 4 for "Why do so?" -- A Practical Perspective on Machine Learning Security
Viaarxiv icon

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning

Add code
Bookmark button
Alert button
May 04, 2022
Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Sebastiano Vascon, Werner Zellinger, Bernhard A. Moser, Alina Oprea, Battista Biggio, Marcello Pelillo, Fabio Roli

Figure 1 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 2 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 3 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Figure 4 for Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning
Viaarxiv icon

Machine Learning Security against Data Poisoning: Are We There Yet?

Add code
Bookmark button
Alert button
Apr 12, 2022
Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo

Figure 1 for Machine Learning Security against Data Poisoning: Are We There Yet?
Figure 2 for Machine Learning Security against Data Poisoning: Are We There Yet?
Figure 3 for Machine Learning Security against Data Poisoning: Are We There Yet?
Viaarxiv icon

Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions

Add code
Bookmark button
Alert button
Jun 14, 2021
Antonio Emanuele Cinà, Kathrin Grosse, Sebastiano Vascon, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo

Figure 1 for Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions
Figure 2 for Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions
Figure 3 for Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions
Figure 4 for Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions
Viaarxiv icon

Mental Models of Adversarial Machine Learning

Add code
Bookmark button
Alert button
May 08, 2021
Lukas Bieringer, Kathrin Grosse, Michael Backes, Katharina Krombholz

Figure 1 for Mental Models of Adversarial Machine Learning
Figure 2 for Mental Models of Adversarial Machine Learning
Figure 3 for Mental Models of Adversarial Machine Learning
Figure 4 for Mental Models of Adversarial Machine Learning
Viaarxiv icon

Adversarial Examples and Metrics

Add code
Bookmark button
Alert button
Jul 15, 2020
Nico Döttling, Kathrin Grosse, Michael Backes, Ian Molloy

Figure 1 for Adversarial Examples and Metrics
Viaarxiv icon