Alert button
Picture for Ross Anderson

Ross Anderson

Alert button

Nudge Attacks on Point-Cloud DNNs

Add code
Bookmark button
Alert button
Nov 22, 2020
Yiren Zhao, Ilia Shumailov, Robert Mullins, Ross Anderson

Figure 1 for Nudge Attacks on Point-Cloud DNNs
Figure 2 for Nudge Attacks on Point-Cloud DNNs
Figure 3 for Nudge Attacks on Point-Cloud DNNs
Figure 4 for Nudge Attacks on Point-Cloud DNNs
Viaarxiv icon

Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing

Add code
Bookmark button
Alert button
Oct 22, 2020
Arthur Delarue, Ross Anderson, Christian Tjandraatmadja

Figure 1 for Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing
Figure 2 for Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing
Figure 3 for Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing
Figure 4 for Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing
Viaarxiv icon

The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification

Add code
Bookmark button
Alert button
Jun 24, 2020
Christian Tjandraatmadja, Ross Anderson, Joey Huchette, Will Ma, Krunal Patel, Juan Pablo Vielma

Figure 1 for The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification
Figure 2 for The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification
Figure 3 for The Convex Relaxation Barrier, Revisited: Tightened Single-Neuron Relaxations for Neural Network Verification
Viaarxiv icon

Sponge Examples: Energy-Latency Attacks on Neural Networks

Add code
Bookmark button
Alert button
Jun 05, 2020
Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson

Figure 1 for Sponge Examples: Energy-Latency Attacks on Neural Networks
Figure 2 for Sponge Examples: Energy-Latency Attacks on Neural Networks
Figure 3 for Sponge Examples: Energy-Latency Attacks on Neural Networks
Figure 4 for Sponge Examples: Energy-Latency Attacks on Neural Networks
Viaarxiv icon

Towards Certifiable Adversarial Sample Detection

Add code
Bookmark button
Alert button
Feb 20, 2020
Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson

Figure 1 for Towards Certifiable Adversarial Sample Detection
Figure 2 for Towards Certifiable Adversarial Sample Detection
Figure 3 for Towards Certifiable Adversarial Sample Detection
Figure 4 for Towards Certifiable Adversarial Sample Detection
Viaarxiv icon

CAQL: Continuous Action Q-Learning

Add code
Bookmark button
Alert button
Oct 09, 2019
Moonkyung Ryu, Yinlam Chow, Ross Anderson, Christian Tjandraatmadja, Craig Boutilier

Figure 1 for CAQL: Continuous Action Q-Learning
Figure 2 for CAQL: Continuous Action Q-Learning
Figure 3 for CAQL: Continuous Action Q-Learning
Figure 4 for CAQL: Continuous Action Q-Learning
Viaarxiv icon

Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information

Add code
Bookmark button
Alert button
Sep 06, 2019
Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert Mullins, Ross Anderson

Figure 1 for Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Figure 2 for Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Figure 3 for Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Figure 4 for Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information
Viaarxiv icon

Hearing your touch: A new acoustic side channel on smartphones

Add code
Bookmark button
Alert button
Mar 26, 2019
Ilia Shumailov, Laurent Simon, Jeff Yan, Ross Anderson

Figure 1 for Hearing your touch: A new acoustic side channel on smartphones
Viaarxiv icon

Sitatapatra: Blocking the Transfer of Adversarial Samples

Add code
Bookmark button
Alert button
Jan 23, 2019
Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert Mullins, Ross Anderson, Cheng-Zhong Xu

Figure 1 for Sitatapatra: Blocking the Transfer of Adversarial Samples
Figure 2 for Sitatapatra: Blocking the Transfer of Adversarial Samples
Figure 3 for Sitatapatra: Blocking the Transfer of Adversarial Samples
Figure 4 for Sitatapatra: Blocking the Transfer of Adversarial Samples
Viaarxiv icon