YoVDO

Defense Against the Dark Arts

Offered By: IEEE via YouTube

Tags

Adversarial Machine Learning Courses Cybersecurity Courses Deep Learning Courses Machine Learning Pipelines Courses

Course Description

Overview

Explore a comprehensive keynote address on adversarial example research in machine learning and cybersecurity. Delve into the intricacies of defending against attacks on the machine learning pipeline, including transfer attacks, gradient masking, and norm ball scenarios. Examine the concept of adversarial logit pairing (ALP) and investigate future research directions in indirect methods and improved attack models. Gain insights into non-security applications of adversarial examples and the fascinating "Clever Hans" phenomenon. Learn from Ian Goodfellow's expertise as he presents at the 1st Deep Learning and Security Workshop during the 2018 IEEE Symposium on Security & Privacy in San Francisco.

Syllabus

Intro
I.I.D. Machine Learning
Attacks on the machine learning pipeline
Define a game
Fifty Shades of Gray Box Attacks
Transfer Attack
Norm Balls: A Toy Game
Tradeoff
Gradient Masking
Pipeline of Defense Failures
Adversarial Logit Pairing (ALP)
Future Directions: Indirect Methods
Future Directions: Better Attack Models
Some Non-Security Reasons to Study Adversarial Examples
Clever Hans


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network