Picture for Ross Anderson

Ross Anderson

Nudge Attacks on Point-Cloud DNNs

Add code
Nov 22, 2020
Figure 1 for Nudge Attacks on Point-Cloud DNNs
Figure 2 for Nudge Attacks on Point-Cloud DNNs
Figure 3 for Nudge Attacks on Point-Cloud DNNs
Figure 4 for Nudge Attacks on Point-Cloud DNNs
Viaarxiv icon

Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing

Add code
Oct 22, 2020
Figure 1 for Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing
Figure 2 for Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing
Figure 3 for Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing
Figure 4 for Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing
Viaarxiv icon

The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification

Add code
Jun 24, 2020
Figure 1 for The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification
Figure 2 for The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification
Figure 3 for The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification
Viaarxiv icon

Sponge Examples: Energy-Latency Attacks on Neural Networks

Add code
Jun 05, 2020
Figure 1 for Sponge Examples: Energy-Latency Attacks on Neural Networks
Figure 2 for Sponge Examples: Energy-Latency Attacks on Neural Networks
Figure 3 for Sponge Examples: Energy-Latency Attacks on Neural Networks
Figure 4 for Sponge Examples: Energy-Latency Attacks on Neural Networks
Viaarxiv icon

Towards Certifiable Adversarial Sample Detection

Add code
Feb 20, 2020
Figure 1 for Towards Certifiable Adversarial Sample Detection
Figure 2 for Towards Certifiable Adversarial Sample Detection
Figure 3 for Towards Certifiable Adversarial Sample Detection
Figure 4 for Towards Certifiable Adversarial Sample Detection
Viaarxiv icon

CAQL: Continuous Action Q-Learning

Add code
Oct 09, 2019
Figure 1 for CAQL: Continuous Action Q-Learning
Figure 2 for CAQL: Continuous Action Q-Learning
Figure 3 for CAQL: Continuous Action Q-Learning
Figure 4 for CAQL: Continuous Action Q-Learning
Viaarxiv icon

Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information

Add code
Sep 06, 2019
Figure 1 for Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Figure 2 for Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Figure 3 for Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Figure 4 for Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Viaarxiv icon

Hearing your touch: A new acoustic side channel on smartphones

Add code
Mar 26, 2019
Figure 1 for Hearing your touch: A new acoustic side channel on smartphones
Viaarxiv icon

Sitatapatra: Blocking the Transfer of Adversarial Samples

Add code
Jan 23, 2019
Figure 1 for Sitatapatra: Blocking the Transfer of Adversarial Samples
Figure 2 for Sitatapatra: Blocking the Transfer of Adversarial Samples
Figure 3 for Sitatapatra: Blocking the Transfer of Adversarial Samples
Figure 4 for Sitatapatra: Blocking the Transfer of Adversarial Samples
Viaarxiv icon

Strong mixed-integer programming formulations for trained neural networks

Add code
Nov 20, 2018
Figure 1 for Strong mixed-integer programming formulations for trained neural networks
Figure 2 for Strong mixed-integer programming formulations for trained neural networks
Figure 3 for Strong mixed-integer programming formulations for trained neural networks
Figure 4 for Strong mixed-integer programming formulations for trained neural networks
Viaarxiv icon