Offense - Adversarial Threats/Attacks

From
Revision as of 16:07, 5 July 2018 by BPeat (talk | contribs)
Jump to: navigation, search

Youtube search...

______________________________________________________


Adversarial examples are inputs to machine learning models that an attacker has intentionally designed to cause the model to make a mistake; they’re like optical illusions for machines. Myth: An attacker must have access to the model to generate adversarial examples. Fact: Adversarial examples generalize across models trained to perform the same task, even if those models have different architectures and were trained on a different training set. This means an attacker can train their own model, generate adversarial examples against it, and then deploy those adversarial examples against a model they do not have access to. -Deep Learning Adversarial Examples – Clarifying Misconceptions | Goodfellow et al.

Weaponizing Machine Learning

Youtube search...

Boolean Satisfiability (SAT) Problem/Satisfiability Modulo Theories (SMT): Z3 and Reluplex Solvers

Youtube search...