no code implementations • 9 Sep 2022 • Ryan Sheatsley, Blaine Hoak, Eric Pauley, Patrick McDaniel
From our evaluation we find that attack performance to be highly contextual: the domain, model robustness, and threat model can have a profound influence on attack efficacy.
no code implementations • 1 May 2022 • Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin Chan, Trent Jaeger, Patrick McDaniel
We evaluate the performance of the algorithms against two dominant planning algorithms used in commercial applications (D* Lite and Fast Downward) and show both are vulnerable to extremely limited adversarial action.
no code implementations • 4 Apr 2022 • Kyle Domico, Ryan Sheatsley, Yohan Beugin, Quinn Burke, Patrick McDaniel
They result from high sun activity, which are induced from cool areas on the Sun known as sunspots.
no code implementations • 21 Feb 2022 • Ahmed Abdou, Ryan Sheatsley, Yohan Beugin, Tyler Shipp, Patrick McDaniel
To harden these systems the ever-growing field of Adversarial Machine Learning has proposed new attack and defense mechanisms.
no code implementations • 21 Feb 2022 • Ryan Sheatsley, Matthew Durbin, Azaree Lintereur, Patrick McDaniel
With four and eight detector arrays, we collect counts of gamma-rays as features for a suite of machine learning models to localize radioactive material.
no code implementations • 18 May 2021 • Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel
Machine learning is vulnerable to adversarial examples-inputs designed to cause models to perform poorly.
no code implementations • 2 Nov 2020 • Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel
To assess how these algorithms perform, we evaluate them in constrained (e. g., network intrusion detection) and unconstrained (e. g., image recognition) domains.
13 code implementations • 3 Oct 2016 • Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long, Patrick McDaniel
An adversarial example library for constructing attacks, building defenses, and benchmarking both
no code implementations • 31 Mar 2016 • Z. Berkay Celik, Patrick McDaniel, Rauf Izmailov, Nicolas Papernot, Ryan Sheatsley, Raquel Alvarez, Ananthram Swami
In this paper, we consider an alternate learning approach that trains models using "privileged" information--features available at training time but not at runtime--to improve the accuracy and resilience of detection systems.