Követés
Aleksander Mądry
Aleksander Mądry
E-mail megerősítve itt: mit.edu - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Towards deep learning models resistant to adversarial attacks
A Madry, A Makelov, L Schmidt, D Tsipras, A Vladu
Proceedings of the International Conference on Representation Learning (ICLR …, 2018
146032018
How does batch normalization help optimization?
S Santurkar, D Tsipras, A Ilyas, A Madry
Advances in neural information processing systems 31, 2018
23512018
Adversarial examples are not bugs, they are features
A Ilyas, S Santurkar, D Tsipras, L Engstrom, B Tran, A Madry
Advances in neural information processing systems 32, 2019
22672019
Robustness may be at odds with accuracy
D Tsipras, S Santurkar, L Engstrom, A Turner, A Madry
Proceedings of the International Conference on Representation Learning (ICLR …, 2019
21212019
On evaluating adversarial robustness
N Carlini, A Athalye, N Papernot, W Brendel, J Rauber, D Tsipras, ...
arXiv preprint arXiv:1902.06705, 2019
10852019
On adaptive attacks to adversarial example defenses
F Tramer, N Carlini, W Brendel, A Madry
Advances in neural information processing systems 33, 1633-1645, 2020
9532020
Spectral signatures in backdoor attacks
B Tran, J Li, A Madry
Advances in neural information processing systems 31, 2018
9402018
Adversarially robust generalization requires more data
L Schmidt, S Santurkar, D Tsipras, K Talwar, A Madry
Advances in neural information processing systems 31, 2018
9382018
Exploring the landscape of spatial robustness
L Engstrom, B Tran, D Tsipras, L Schmidt, A Madry
International conference on machine learning, 1802-1811, 2019
918*2019
Do adversarially robust imagenet models transfer better?
H Salman, A Ilyas, L Engstrom, A Kapoor, A Madry
Advances in Neural Information Processing Systems 33, 3533-3545, 2020
4932020
Implementation matters in deep policy gradients: A case study on ppo and trpo
L Engstrom, A Ilyas, S Santurkar, D Tsipras, F Janoos, L Rudolph, ...
arXiv preprint arXiv:2005.12729, 2020
4642020
Prior convictions: Black-box adversarial attacks with bandits and priors
A Ilyas, L Engstrom, A Madry
arXiv preprint arXiv:1807.07978, 2018
4582018
Label-consistent backdoor attacks
A Turner, D Tsipras, A Madry
arXiv preprint arXiv:1912.02771, 2019
4362019
Electrical flows, laplacian systems, and faster approximation of maximum flow in undirected graphs
P Christiano, JA Kelner, A Madry, DA Spielman, SH Teng
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
4352011
Noise or signal: The role of image backgrounds in object recognition
K Xiao, L Engstrom, A Ilyas, A Madry
arXiv preprint arXiv:2006.09994, 2020
4252020
Navigating central path with electrical flows: From flows to matchings, and back
A Madry
2013 IEEE 54th Annual Symposium on Foundations of Computer Science, 253-262, 2013
3062013
Gpt-4o system card
A Hurst, A Lerer, AP Goucher, A Perelman, A Ramesh, A Clark, AJ Ostrow, ...
arXiv preprint arXiv:2410.21276, 2024
2932024
Adversarial robustness as a prior for learned representations
L Engstrom, A Ilyas, S Santurkar, D Tsipras, B Tran, A Madry
arXiv preprint arXiv:1906.00945, 2019
275*2019
Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses
M Goldblum, D Tsipras, C Xie, X Chen, A Schwarzschild, D Song, ...
IEEE Transactions on Pattern Analysis and Machine Intelligence 45 (2), 1563-1580, 2022
2712022
An O(log n/log log n)-Approximation Algorithm for the Asymmetric Traveling Salesman Problem
A Asadpour, MX Goemans, A Mądry, SO Gharan, A Saberi
Operations Research 65 (4), 1043-1061, 2017
2692017
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20