Picture for Tom Goldstein

Tom Goldstein

What Doesn't Kill You Makes You Robust: Adversarial Training against Poisons and Backdoors

Add code
Feb 26, 2021
Viaarxiv icon

Improving Robustness of Learning-based Autonomous Steering Using Adversarial Images

Add code
Feb 26, 2021
Figure 1 for Improving Robustness of Learning-based Autonomous Steering Using Adversarial Images
Figure 2 for Improving Robustness of Learning-based Autonomous Steering Using Adversarial Images
Figure 3 for Improving Robustness of Learning-based Autonomous Steering Using Adversarial Images
Figure 4 for Improving Robustness of Learning-based Autonomous Steering Using Adversarial Images
Viaarxiv icon

Center Smoothing for Certifiably Robust Vector-Valued Functions

Add code
Feb 19, 2021
Figure 1 for Center Smoothing for Certifiably Robust Vector-Valued Functions
Figure 2 for Center Smoothing for Certifiably Robust Vector-Valued Functions
Figure 3 for Center Smoothing for Certifiably Robust Vector-Valued Functions
Figure 4 for Center Smoothing for Certifiably Robust Vector-Valued Functions
Viaarxiv icon

GradInit: Learning to Initialize Neural Networks for Stable and Efficient Training

Add code
Feb 16, 2021
Figure 1 for GradInit: Learning to Initialize Neural Networks for Stable and Efficient Training
Figure 2 for GradInit: Learning to Initialize Neural Networks for Stable and Efficient Training
Figure 3 for GradInit: Learning to Initialize Neural Networks for Stable and Efficient Training
Figure 4 for GradInit: Learning to Initialize Neural Networks for Stable and Efficient Training
Viaarxiv icon

Technical Challenges for Training Fair Neural Networks

Add code
Feb 12, 2021
Figure 1 for Technical Challenges for Training Fair Neural Networks
Figure 2 for Technical Challenges for Training Fair Neural Networks
Figure 3 for Technical Challenges for Training Fair Neural Networks
Figure 4 for Technical Challenges for Training Fair Neural Networks
Viaarxiv icon

LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition

Add code
Jan 25, 2021
Figure 1 for LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition
Figure 2 for LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition
Figure 3 for LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition
Figure 4 for LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial Recognition
Viaarxiv icon

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Add code
Dec 30, 2020
Figure 1 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 2 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 3 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Figure 4 for Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses
Viaarxiv icon

Analyzing the Machine Learning Conference Review Process

Add code
Nov 26, 2020
Figure 1 for Analyzing the Machine Learning Conference Review Process
Figure 2 for Analyzing the Machine Learning Conference Review Process
Figure 3 for Analyzing the Machine Learning Conference Review Process
Figure 4 for Analyzing the Machine Learning Conference Review Process
Viaarxiv icon

Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff

Add code
Nov 18, 2020
Figure 1 for Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff
Figure 2 for Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff
Figure 3 for Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff
Figure 4 for Strong Data Augmentation Sanitizes Poisoning and Backdoor Attacks Without an Accuracy Tradeoff
Viaarxiv icon

An Open Review of OpenReview: A Critical Analysis of the Machine Learning Conference Review Process

Add code
Oct 26, 2020
Figure 1 for An Open Review of OpenReview: A Critical Analysis of the Machine Learning Conference Review Process
Figure 2 for An Open Review of OpenReview: A Critical Analysis of the Machine Learning Conference Review Process
Figure 3 for An Open Review of OpenReview: A Critical Analysis of the Machine Learning Conference Review Process
Figure 4 for An Open Review of OpenReview: A Critical Analysis of the Machine Learning Conference Review Process
Viaarxiv icon