Alert button
Picture for Yevgeniy Vorobeychik

Yevgeniy Vorobeychik

Alert button

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models

Add code
Bookmark button
Alert button
Mar 12, 2019
Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang

Figure 1 for Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models
Figure 2 for Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models
Figure 3 for Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models
Figure 4 for Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models
Viaarxiv icon

An Online Decision-Theoretic Pipeline for Responder Dispatch

Add code
Bookmark button
Alert button
Feb 21, 2019
Ayan Mukhopadhyay, Geoffrey Pettet, Chinmaya Samal, Abhishek Dubey, Yevgeniy Vorobeychik

Figure 1 for An Online Decision-Theoretic Pipeline for Responder Dispatch
Figure 2 for An Online Decision-Theoretic Pipeline for Responder Dispatch
Figure 3 for An Online Decision-Theoretic Pipeline for Responder Dispatch
Figure 4 for An Online Decision-Theoretic Pipeline for Responder Dispatch
Viaarxiv icon

Distributionally Robust Removal of Malicious Nodes from Networks

Add code
Bookmark button
Alert button
Jan 31, 2019
Sixie Yu, Yevgeniy Vorobeychik

Figure 1 for Distributionally Robust Removal of Malicious Nodes from Networks
Figure 2 for Distributionally Robust Removal of Malicious Nodes from Networks
Figure 3 for Distributionally Robust Removal of Malicious Nodes from Networks
Figure 4 for Distributionally Robust Removal of Malicious Nodes from Networks
Viaarxiv icon

Removing Malicious Nodes from Networks

Add code
Bookmark button
Alert button
Jan 06, 2019
Sixie Yu, Yevgeniy Vorobeychik

Figure 1 for Removing Malicious Nodes from Networks
Figure 2 for Removing Malicious Nodes from Networks
Figure 3 for Removing Malicious Nodes from Networks
Figure 4 for Removing Malicious Nodes from Networks
Viaarxiv icon

Regularized Ensembles and Transferability in Adversarial Learning

Add code
Bookmark button
Alert button
Dec 05, 2018
Yifan Chen, Yevgeniy Vorobeychik

Figure 1 for Regularized Ensembles and Transferability in Adversarial Learning
Figure 2 for Regularized Ensembles and Transferability in Adversarial Learning
Figure 3 for Regularized Ensembles and Transferability in Adversarial Learning
Figure 4 for Regularized Ensembles and Transferability in Adversarial Learning
Viaarxiv icon

A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection

Add code
Bookmark button
Alert button
Jun 13, 2018
Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Yevgeniy Vorobeychik

Figure 1 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection
Figure 2 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection
Figure 3 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection
Figure 4 for A Framework for Validating Models of Evasion Attacks on Machine Learning, with Application to PDF Malware Detection
Viaarxiv icon

Adversarial Regression with Multiple Learners

Add code
Bookmark button
Alert button
Jun 06, 2018
Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik

Figure 1 for Adversarial Regression with Multiple Learners
Figure 2 for Adversarial Regression with Multiple Learners
Figure 3 for Adversarial Regression with Multiple Learners
Figure 4 for Adversarial Regression with Multiple Learners
Viaarxiv icon

Optical Neural Networks

Add code
Bookmark button
Alert button
May 29, 2018
Grant Fennessy, Yevgeniy Vorobeychik

Figure 1 for Optical Neural Networks
Figure 2 for Optical Neural Networks
Figure 3 for Optical Neural Networks
Figure 4 for Optical Neural Networks
Viaarxiv icon

Adversarial Regression for Detecting Attacks in Cyber-Physical Systems

Add code
Bookmark button
Alert button
Apr 30, 2018
Amin Ghafouri, Yevgeniy Vorobeychik, Xenofon Koutsoukos

Figure 1 for Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Figure 2 for Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Figure 3 for Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Figure 4 for Adversarial Regression for Detecting Attacks in Cyber-Physical Systems
Viaarxiv icon

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

Add code
Bookmark button
Alert button
Jan 22, 2018
Chao Yan, Bo Li, Yevgeniy Vorobeychik, Aron Laszka, Daniel Fabbri, Bradley Malin

Figure 1 for Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing
Figure 2 for Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing
Viaarxiv icon