Skip to main content

Showing 1–7 of 7 results for author: Boneh, D

Searching in archive stat. Search in all archives.
.
  1. arXiv:2011.11660  [pdf, other

    cs.LG cs.CR stat.ML

    Differentially Private Learning Needs Better Features (or Much More Data)

    Authors: Florian Tramèr, Dan Boneh

    Abstract: We demonstrate that differentially private machine learning has not yet reached its "AlexNet moment" on many canonical vision tasks: linear models trained on handcrafted features significantly outperform end-to-end deep neural networks for moderate privacy budgets. To exceed the performance of handcrafted features, we show that private learning requires either much more private data, or access to… ▽ More

    Submitted 17 February, 2021; v1 submitted 23 November, 2020; originally announced November 2020.

    Comments: ICLR 2021. Code available at https://github.com/ftramer/Handcrafted-DP

  2. arXiv:1909.00056  [pdf, ps, other

    cs.CY cs.CR stat.ML

    How Relevant is the Turing Test in the Age of Sophisbots?

    Authors: Dan Boneh, Andrew J. Grotto, Patrick McDaniel, Nicolas Papernot

    Abstract: Popular culture has contemplated societies of thinking machines for generations, envisioning futures from utopian to dystopian. These futures are, arguably, here now-we find ourselves at the doorstep of technology that can at least simulate the appearance of thinking, acting, and feeling. The real question is: now what?

    Submitted 30 August, 2019; originally announced September 2019.

  3. arXiv:1904.13000  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Adversarial Training and Robustness for Multiple Perturbations

    Authors: Florian Tramèr, Dan Boneh

    Abstract: Defenses against adversarial examples, such as adversarial training, are typically tailored to a single perturbation type (e.g., small $\ell_\infty$-noise). For other perturbations, these defenses offer no guarantees and, at times, even increase the model's vulnerability. Our aim is to understand the reasons underlying this robustness trade-off, and to train models that are simultaneously robust t… ▽ More

    Submitted 17 October, 2019; v1 submitted 29 April, 2019; originally announced April 2019.

    Comments: Accepted at NeurIPS 2019, 23 pages

  4. arXiv:1811.03194  [pdf, other

    cs.CR cs.LG stat.ML

    AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning

    Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh

    Abstract: Perceptual ad-blocking is a novel approach that detects online advertisements based on their visual content. Compared to traditional filter lists, the use of perceptual signals is believed to be less prone to an arms race with web publishers and ad networks. We demonstrate that this may not be the case. We describe attacks on multiple perceptual ad-blocking techniques, and unveil a new arms race t… ▽ More

    Submitted 26 August, 2019; v1 submitted 7 November, 2018; originally announced November 2018.

    Comments: 17 pages, 14 figures

    Journal ref: In 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19)

  5. arXiv:1806.03287  [pdf, other

    stat.ML cs.CR cs.LG

    Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

    Authors: Florian Tramèr, Dan Boneh

    Abstract: As Machine Learning (ML) gets applied to security-critical or sensitive domains, there is a growing need for integrity and privacy for outsourced ML computations. A pragmatic solution comes from Trusted Execution Environments (TEEs), which use hardware and software protections to isolate sensitive computations from the untrusted software stack. However, these isolation guarantees come at a price i… ▽ More

    Submitted 27 February, 2019; v1 submitted 8 June, 2018; originally announced June 2018.

    Comments: Accepted as an oral presentation at ICLR 2019. OpenReview available at https://openreview.net/forum?id=rJVorjCcKQ

  6. arXiv:1705.07204  [pdf, other

    stat.ML cs.CR cs.LG

    Ensemble Adversarial Training: Attacks and Defenses

    Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are perturbed inputs designed to fool machine learning models. Adversarial training injects such examples into training data to increase robustness. To scale this technique to large datasets, perturbations are crafted using fast single-step methods that maximize a linear approximation of the model's loss. We show that this form of adversarial training converges to a degenerate… ▽ More

    Submitted 26 April, 2020; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: 22 pages, 5 figures, International Conference on Learning Representations (ICLR) 2018 (amended in April 2020 to include subsequent attacks that significantly reduced the robustness of our models)

  7. arXiv:1704.03453  [pdf, other

    stat.ML cs.CR cs.LG

    The Space of Transferable Adversarial Examples

    Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are maliciously perturbed inputs designed to mislead machine learning (ML) models at test-time. They often transfer: the same adversarial example fools more than one model. In this work, we propose novel methods for estimating the previously unknown dimensionality of the space of adversarial inputs. We find that adversarial examples span a contiguous subspace of large (~25)… ▽ More

    Submitted 23 May, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: 15 pages, 7 figures