Machine learning in python: Main developments and technology trends in data science, machine learning, and artificial intelligence
Smarter applications are making better use of the insights gleaned from data, having an
impact on every industry and research discipline. At the core of this revolution lies the tools …
impact on every industry and research discipline. At the core of this revolution lies the tools …
Deep convolutional neural networks for image classification: A comprehensive review
Convolutional neural networks (CNNs) have been applied to visual tasks since the late
1980s. However, despite a few scattered applications, they were dormant until the mid …
1980s. However, despite a few scattered applications, they were dormant until the mid …
Glaze: Protecting artists from style mimicry by {Text-to-Image} models
Recent text-to-image diffusion models such as MidJourney and Stable Diffusion threaten to
displace many in the professional artist community. In particular, models can learn to mimic …
displace many in the professional artist community. In particular, models can learn to mimic …
On adaptive attacks to adversarial example defenses
Adaptive attacks have (rightfully) become the de facto standard for evaluating defenses to
adversarial examples. We find, however, that typical adaptive evaluations are incomplete …
adversarial examples. We find, however, that typical adaptive evaluations are incomplete …
Explainable deep learning: A field guide for the uninitiated
Deep neural networks (DNNs) are an indispensable machine learning tool despite the
difficulty of diagnosing what aspects of a model's input drive its decisions. In countless real …
difficulty of diagnosing what aspects of a model's input drive its decisions. In countless real …
Hidden trigger backdoor attacks
With the success of deep learning algorithms in various domains, studying adversarial
attacks to secure deep models in real world applications has become an important research …
attacks to secure deep models in real world applications has become an important research …
An abstract domain for certifying neural networks
We present a novel method for scalable and precise certification of deep neural networks.
The key technical insight behind our approach is a new abstract domain which combines …
The key technical insight behind our approach is a new abstract domain which combines …
Frequency-driven imperceptible adversarial attack on semantic similarity
Current adversarial attack research reveals the vulnerability of learning-based classifiers
against carefully crafted perturbations. However, most existing attack methods have inherent …
against carefully crafted perturbations. However, most existing attack methods have inherent …
Adversarial examples: Attacks and defenses for deep learning
With rapid progress and significant successes in a wide spectrum of applications, deep
learning is being applied in many safety-critical environments. However, deep neural …
learning is being applied in many safety-critical environments. However, deep neural …
Ai2: Safety and robustness certification of neural networks with abstract interpretation
We present AI 2, the first sound and scalable analyzer for deep neural networks. Based on
overapproximation, AI 2 can automatically prove safety properties (eg, robustness) of …
overapproximation, AI 2 can automatically prove safety properties (eg, robustness) of …