Adversarial Attacks Courses
OWASP Foundation via YouTube Accessorize to a Crime - Real and Stealthy Attacks on State-Of-The-Art Face Recognition
Association for Computing Machinery (ACM) via YouTube Manifold Mixup: Better Representations by Interpolating Hidden States
Yannic Kilcher via YouTube Building Realistic Machine Learning Systems for Security
USENIX Enigma Conference via YouTube Classifiers Under Attack: Evasion Techniques and Defensive Strategies
USENIX Enigma Conference via YouTube Hacking Object Detectors Is Just Like Training Neural Networks
Hack In The Box Security Conference via YouTube Getting Robust - Securing Neural Networks Against Adversarial Attacks
University of Melbourne via YouTube Exploring Practical Vulnerabilities of Machine Learning-Based Wireless Systems
USENIX via YouTube Superman Powered by Kryptonite - Turn the Adversarial Attack into Your Defense Weapon
Black Hat via YouTube PeriScope - An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
Black Hat via YouTube