Follow
Anish Athalye
Title
Cited by
Cited by
Year
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
A Athalye, N Carlini, D Wagner
35th International Conference on Machine Learning, 274-283, 2018
36532018
Synthesizing Robust Adversarial Examples
A Athalye, L Engstrom, A Ilyas, K Kwok
35th International Conference on Machine Learning, 284-293, 2017
20462017
Black-box Adversarial Attacks with Limited Queries and Information
A Ilyas, L Engstrom, A Athalye, J Lin
35th International Conference on Machine Learning, 2137-2146, 2018
14522018
On Evaluating Adversarial Robustness
N Carlini, A Athalye, N Papernot, W Brendel, J Rauber, D Tsipras, ...
arXiv preprint arXiv:1902.06705, 2019
10542019
Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks
CG Northcutt, A Athalye, J Mueller
35th Conference on Neural Information Processing Systems Track on Datasets …, 2021
6302021
On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses
A Athalye, N Carlini
The Bright and Dark Sides of Computer Vision: Challenges and Opportunities …, 2018
1982018
Evaluating and Understanding the Robustness of Adversarial Logit Pairing
L Engstrom, A Ilyas, A Athalye
NeurIPS 2018 Workshop on Security in Machine Learning, 2018
1512018
pASSWORD tYPOS and How to Correct Them Securely
R Chatterjee, A Athalye, D Akhawe, A Juels, T Ristenpart
37th IEEE Symposium on Security and Privacy, 2016
732016
Notary: A Device for Secure Transaction Approval
A Athalye, A Belay, MF Kaashoek, R Morris, N Zeldovich
27th ACM Symposium on Operating Systems Principles, 97-113, 2019
362019
Verifying Hardware Security Modules with Information-Preserving Refinement
A Athalye, MF Kaashoek, N Zeldovich
16th USENIX Symposium on Operating Systems Design and Implementation, 503-519, 2022
262022
Inverting PhotoDNA
A Athalye
https://anishathalye.com/inverting-photodna/, 2021
11*2021
NeuralHash Collider
A Athalye
https://github.com/anishathalye/neural-hash-collider, 2021
8*2021
CoqIOA: A Formalization of IO Automata in the Coq Proof Assistant
A Athalye
Massachusetts Institute of Technology, 2017
52017
Porcupine: A fast linearizability checker in Go
A Athalye
https://github.com/anishathalye/porcupine, 2017
32017
Neural Style
A Athalye
https://github.com/anishathalye/neural-style, 2015
32015
Formally Verifying Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation
A Athalye
Massachusetts Institute of Technology, 2024
22024
Gavel
A Athalye
https://github.com/anishathalye/gavel, 2016
22016
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation
A Athalye, H Corrigan-Gibbs, MF Kaashoek, J Tassarotti, N Zeldovich
30th ACM Symposium on Operating Systems Principles, 655-672, 2024
12024
The K2 Architecture for Trustworthy Hardware Security Modules
A Athalye, F Kaashoek, N Zeldovich, J Tassarotti
1st Workshop on Kernel Isolation, Safety and Verification, 26-32, 2023
12023
Leakage models are a leaky abstraction: the case for cycle-level verification of constant-time cryptography
A Athalye, MF Kaashoek, N Zeldovich, J Tassarotti
1st Workshop on Programming Languages and Computer Architecture, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20