Загрузка страницы

ScAINet '20 - On Adaptive Attacks to Adversarial Example Defenses

On Adaptive Attacks to Adversarial Example Defenses

Florian Tramer, Stanford University

View the full ScAINet '20 program at: https://www.usenix.org/conference/scainet20/summit-program

Видео ScAINet '20 - On Adaptive Attacks to Adversarial Example Defenses канала USENIX
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
5 августа 2020 г. 9:15:23
00:20:20
Другие видео канала
LISA16 - Building a Billion User Load BalancerLISA16 - Building a Billion User Load BalancerUSENIX Security '21 - SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement LearningUSENIX Security '21 - SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement LearningOSDI '21 - Marius: Learning Massive Graph Embeddings on a Single MachineOSDI '21 - Marius: Learning Massive Graph Embeddings on a Single MachineUSENIX Security '22 - Under the Hood of DANE Mismanagement in SMTPUSENIX Security '22 - Under the Hood of DANE Mismanagement in SMTPSREcon19 Europe/Middle East/Africa - Building Resilience: How to Learn More from IncidentsSREcon19 Europe/Middle East/Africa - Building Resilience: How to Learn More from IncidentsNSDI '21 - When Cloud Storage Meets RDMANSDI '21 - When Cloud Storage Meets RDMALISA21 - Can Infrastructure as Code Apply to Bare Metal?LISA21 - Can Infrastructure as Code Apply to Bare Metal?NSDI '21 - Ownership: A Distributed Futures System for Fine-Grained TasksNSDI '21 - Ownership: A Distributed Futures System for Fine-Grained TasksUSENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over RemoteUSENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over RemoteNSDI '20 - Learning in situ: a randomized experiment in video streamingNSDI '20 - Learning in situ: a randomized experiment in video streamingNSDI '22 - Runtime Programmable SwitchesNSDI '22 - Runtime Programmable SwitchesLISA16 - Network-Based LUKS Volume Decryption with TangLISA16 - Network-Based LUKS Volume Decryption with TangSREcon20 Americas - The Evolution of Traffic Routing in a Streaming WorldSREcon20 Americas - The Evolution of Traffic Routing in a Streaming WorldNSDI '22 - MLaaS in the Wild: Workload Analysis and Scheduling in Large-Scale Heterogeneous GPU...NSDI '22 - MLaaS in the Wild: Workload Analysis and Scheduling in Large-Scale Heterogeneous GPU...USENIX ATC '20 - SplinterDB: Closing the Bandwidth Gap for NVMe Key-Value StoresUSENIX ATC '20 - SplinterDB: Closing the Bandwidth Gap for NVMe Key-Value StoresOSDI '22 - Alpa: Automating Inter- and Intra-Operator Parallelism for Distributed Deep LearningOSDI '22 - Alpa: Automating Inter- and Intra-Operator Parallelism for Distributed Deep LearningUSENIX Security '21 - PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDropUSENIX Security '21 - PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDropOSDI '21 - Polyjuice: High-Performance Transactions via Learned Concurrency ControlOSDI '21 - Polyjuice: High-Performance Transactions via Learned Concurrency ControlLISA21 - Lessons Learned from a Ransomware AttackLISA21 - Lessons Learned from a Ransomware AttackVault '20 - Crimson: A New Ceph OSD for the Age of Persistent Memory and Fast NVMe StorageVault '20 - Crimson: A New Ceph OSD for the Age of Persistent Memory and Fast NVMe StorageNSDI '22 - Packet Order Matters! Improving Application Performance by Deliberately Delaying PacketsNSDI '22 - Packet Order Matters! Improving Application Performance by Deliberately Delaying Packets
Яндекс.Метрика