Picture for Kathrin Grosse

Kathrin Grosse

A new measure for overfitting and its implications for backdooring of deep learning

Add code
Jun 18, 2020
Figure 1 for A new measure for overfitting and its implications for backdooring of deep learning
Figure 2 for A new measure for overfitting and its implications for backdooring of deep learning
Figure 3 for A new measure for overfitting and its implications for backdooring of deep learning
Figure 4 for A new measure for overfitting and its implications for backdooring of deep learning
Viaarxiv icon

How many winning tickets are there in one DNN?

Add code
Jun 12, 2020
Figure 1 for How many winning tickets are there in one DNN?
Figure 2 for How many winning tickets are there in one DNN?
Figure 3 for How many winning tickets are there in one DNN?
Figure 4 for How many winning tickets are there in one DNN?
Viaarxiv icon

Adversarial Vulnerability Bounds for Gaussian Process Classification

Add code
Sep 19, 2019
Figure 1 for Adversarial Vulnerability Bounds for Gaussian Process Classification
Figure 2 for Adversarial Vulnerability Bounds for Gaussian Process Classification
Figure 3 for Adversarial Vulnerability Bounds for Gaussian Process Classification
Figure 4 for Adversarial Vulnerability Bounds for Gaussian Process Classification
Viaarxiv icon

Adversarial Initialization -- when your network performs the way I want

Add code
Feb 08, 2019
Figure 1 for Adversarial Initialization -- when your network performs the way I want
Figure 2 for Adversarial Initialization -- when your network performs the way I want
Figure 3 for Adversarial Initialization -- when your network performs the way I want
Figure 4 for Adversarial Initialization -- when your network performs the way I want
Viaarxiv icon

The Limitations of Model Uncertainty in Adversarial Settings

Add code
Dec 06, 2018
Figure 1 for The Limitations of Model Uncertainty in Adversarial Settings
Figure 2 for The Limitations of Model Uncertainty in Adversarial Settings
Figure 3 for The Limitations of Model Uncertainty in Adversarial Settings
Figure 4 for The Limitations of Model Uncertainty in Adversarial Settings
Viaarxiv icon

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

Add code
Aug 01, 2018
Figure 1 for MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
Figure 2 for MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
Figure 3 for MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
Figure 4 for MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
Viaarxiv icon

Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification

Add code
Jun 06, 2018
Figure 1 for Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
Figure 2 for Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
Figure 3 for Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
Figure 4 for Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification
Viaarxiv icon

How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models

Add code
Feb 16, 2018
Figure 1 for How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models
Figure 2 for How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models
Figure 3 for How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models
Figure 4 for How Wrong Am I? - Studying Adversarial Examples and their Impact on Uncertainty in Gaussian Process Machine Learning Models
Viaarxiv icon

On the (Statistical) Detection of Adversarial Examples

Add code
Oct 17, 2017
Figure 1 for On the (Statistical) Detection of Adversarial Examples
Figure 2 for On the (Statistical) Detection of Adversarial Examples
Figure 3 for On the (Statistical) Detection of Adversarial Examples
Figure 4 for On the (Statistical) Detection of Adversarial Examples
Viaarxiv icon

Adversarial Perturbations Against Deep Neural Networks for Malware Classification

Add code
Jun 16, 2016
Figure 1 for Adversarial Perturbations Against Deep Neural Networks for Malware Classification
Figure 2 for Adversarial Perturbations Against Deep Neural Networks for Malware Classification
Figure 3 for Adversarial Perturbations Against Deep Neural Networks for Malware Classification
Figure 4 for Adversarial Perturbations Against Deep Neural Networks for Malware Classification
Viaarxiv icon