Security and Privacy of Machine Learning

University of Virginia
cs6501 Seminar Course, Spring 2018
Coordinator: David Evans


— 1 Jan 0001

Teams

Responsibilities

For each week (except for project proposal and presentation weeks), one team will be responsible for Leading the class, one team for writing a Blog post on the class topic, and one team for arranging food. See the Schedule for team responsibilities.

Leading Team. The team responsible for leading a class should:

Blogging Team. The team responsible for blogging a class should:

Feeding Team. The team responsible for food should:


— 1 Jan 0001

This page collects some topic ideas and papers for future classes. These are just suggestions, not meant to be an exhaustive list or limit the scope of future topics or papers.

Certified Defenses, Formal Methods

Aditi Raghunathan, Jacob Steinhardt, Percy Liang. Certified Defenses against Adversarial Examples. PDF

Guy Katz, Clark Barrett, David Dill, Kyle Julian and Mykel Kochenderfer. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks. PDF

Nicholas Carlini, Guy Katz, Clark Barrett, and David L. Dill. Ground-Truth Adversarial Examples. PDF

J. Zico Kolter, Eric Wong. Provable defenses against adversarial examples via the convex outer adversarial polytope. PDF

Testing

Kexin Pei, Yinzhi Cao, Junfeng Yang, Suman Jana. DeepXplore: Automated Whitebox Testing of Deep Learning Systems. PDF

Defining Adversarial Examples

Mahmood Sharif, Lujo Bauer, Michael K. Reiter. On the Suitability of \(L_p\)-norms for Creating and Preventing Adversarial Examples. arxiv, Feb 2018. PDF

Gamaleldin F. Elsayed, Shreya Shankar, Brian Cheung, Nicolas Papernot, Alex Kurakin, Ian Goodfellow, Jascha Sohl-Dickstein. Adversarial Examples that Fool both Human and Computer Vision. arxiv, Feb 2018. PDF

Adversarial Training

Alex Kurakin, Dan Boneh, Florian Tramèr, Ian Goodfellow, Nicolas Papernot, Patrick McDaniel. Ensemble Adversarial Training: Attacks and Defenses. ICLR 2018. Web

Malware Detection and Evasion

Robin Sommer and Vern Paxson. Outside the Closed World: On Using Machine Learning For Network Intrusion Detection. PDF

Igino Corona and Giorgio Giacinto and Fabio Roli. Adversarial Attacks against Intrusion Detection Systems: Taxonomy, Solutions and Open Issues. PDF

Kyle Soska and Nicolas Christin. Automatically Detecting Vulnerable Websites Before They Turn Malicious. PDF

Roberto Jordaney, Kumar Sharad, Santanu K. Dash, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro. Transcend: Detecting Concept Drift in Malware Classification Models. Paper Site

Hung Dang, Yue Huang, and Ee-Chien Chang. Evading Classifiers by Morphing in the Dark. PDF

Fairness

Aylin Caliskan, Joanna J. Bryson, Arvind Narayanan. Semantics derived automatically from language corpora contain human-like biases. HTML

Jieyu Zhao, Tianlu Wang, Mark Yatskar, Vicente Ordonez, Kai-Wei Chang. Men Also Like Shopping: Reducing Gender Bias Amplification using Corpus-level Constraints. PDF

Conference on Fairness, Accountability, and Transparency

Assessing Risks

The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. February 2018 PDF

Poisoning

Battista Biggio, Igino Corona, Giorgio Fumera, Giorgio Giacinto, and Fabio Roli. Bagging Classifiers for Fighting Poisoning Attacks in Adversarial Classification Tasks. PDF

Scott Alfeld, Xiaojin Zhu, and Paul Barford. Data Poisoning Attacks against Autoregressive Models. PDF

Blogging Mechanics
David Evans — 1 Jan 0001

Here are some suggestions for how to create the class blog posts for your assigned classes. I believe each team has at least a few members with enough experience using git and web contruction tools that following these instructions won’t be a big burden, but if you have other ways you want to build your blog page for a topic let me know and we can discuss alternative options.