Skip to main content

Showing 1–7 of 7 results for author: Izmailov, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2002.01256  [pdf, other

    cs.LG cs.GT stat.ML

    Minimax Defense against Gradient-based Adversarial Attacks

    Authors: Blerta Lindqvist, Rauf Izmailov

    Abstract: State-of-the-art adversarial attacks are aimed at neural network classifiers. By default, neural networks use gradient descent to minimize their loss function. The gradient of a classifier's loss function is used by gradient-based adversarial attacks to generate adversarially perturbed images. We pose the question whether another type of optimization could give neural network classifiers an edge.… ▽ More

    Submitted 4 February, 2020; originally announced February 2020.

  2. arXiv:1911.07921  [pdf, other

    cs.LG cs.CR stat.ML

    Privacy Leakage Avoidance with Switching Ensembles

    Authors: Rauf Izmailov, Peter Lin, Chris Mesterharm, Samyadeep Basu

    Abstract: We consider membership inference attacks, one of the main privacy issues in machine learning. These recently developed attacks have been proven successful in determining, with confidence better than a random guess, whether a given sample belongs to the dataset on which the attacked machine learning model was trained. Several approaches have been developed to mitigate this privacy leakage but the t… ▽ More

    Submitted 18 November, 2019; originally announced November 2019.

  3. arXiv:1910.04257  [pdf, other

    cs.LG stat.ML

    Membership Model Inversion Attacks for Deep Networks

    Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm

    Abstract: With the increasing adoption of AI, inherent security and privacy vulnerabilities formachine learning systems are being discovered. One such vulnerability makes itpossible for an adversary to obtain private information about the types of instancesused to train the targeted machine learning model. This so-called model inversionattack is based on sequential leveraging of classification scores toward… ▽ More

    Submitted 9 October, 2019; originally announced October 2019.

    Comments: NeurIPS 2019, Workshop on Privacy in Machine Learning

  4. arXiv:1902.07280  [pdf, other

    cs.LG cs.AI stat.ML

    Subspace Methods That Are Resistant to a Limited Number of Features Corrupted by an Adversary

    Authors: Chris Mesterharm, Rauf Izmailov, Scott Alexander, Simon Tsang

    Abstract: In this paper, we consider batch supervised learning where an adversary is allowed to corrupt instances with arbitrarily large noise. The adversary is allowed to corrupt any $l$ features in each instance and the adversary can change their values in any way. This noise is introduced on test instances and the algorithm receives no label feedback for these instances. We provide several subspace votin… ▽ More

    Submitted 29 July, 2019; v1 submitted 19 February, 2019; originally announced February 2019.

  5. arXiv:1812.03405  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    AutoGAN: Robust Classifier Against Adversarial Attacks

    Authors: Blerta Lindqvist, Shridatt Sugrim, Rauf Izmailov

    Abstract: Classifiers fail to classify correctly input images that have been purposefully and imperceptibly perturbed to cause misclassification. This susceptability has been shown to be consistent across classifiers, regardless of their type, architecture or parameters. Common defenses against adversarial attacks modify the classifer boundary by training on additional adversarial examples created in variou… ▽ More

    Submitted 8 December, 2018; originally announced December 2018.

  6. arXiv:1603.09638  [pdf, other

    cs.CR cs.LG stat.ML

    Detection under Privileged Information

    Authors: Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami

    Abstract: For well over a quarter century, detection systems have been driven by models learned from input features collected from real or simulated environments. An artifact (e.g., network event, potential malware sample, suspicious email) is deemed malicious or non-malicious based on its similarity to the learned model at runtime. However, the training of the models has been historically limited to only t… ▽ More

    Submitted 30 March, 2018; v1 submitted 31 March, 2016; originally announced March 2016.

    Comments: A short version of this paper is accepted to ASIACCS 2018

  7. arXiv:1410.3169  [pdf, other

    cs.CG cs.LG math.AT stat.ML

    Multi-Scale Local Shape Analysis and Feature Selection in Machine Learning Applications

    Authors: Paul Bendich, Ellen Gasparovic, John Harer, Rauf Izmailov, Linda Ness

    Abstract: We introduce a method called multi-scale local shape analysis, or MLSA, for extracting features that describe the local structure of points within a dataset. The method uses both geometric and topological features at multiple levels of granularity to capture diverse types of local information for subsequent machine learning algorithms operating on the dataset. Using synthetic and real dataset exam… ▽ More

    Submitted 12 October, 2014; originally announced October 2014.

    Comments: 15 pages, 6 figures, 8 tables