@@ -164,6 +164,20 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
164164 </div>
165165</form> -->
166166
167+ < table border ="0 " cellpadding ="0 " cellspacing ="15 " width ="100% ">
168+ < tbody > < tr >
169+ < td width ="200 "> < img src ="imgs/secretSharer.png " border ="1 "width ="210 "> </ a > </ td >
170+ < td width ="20 "> </ td >
171+ < td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1802.08232 "> < strong > The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets</ strong > </ a > </ p >
172+ < p class ="content "> Nicholas Carlini, Chang Liu, Jernej Kos, Úlfar Erlingsson, Dawn Song.</ p >
173+ < p class ="content "> USENIX Security. August, 2019.</ p >
174+ < p class ="margin-small "> </ p >
175+ < p class ="content ">
176+ Press: < a href ="https://www.theregister.co.uk/2018/03/02/secrets_fed_into_ai_models_as_training_data_can_be_stolen/ "> The Register</ a > | < a href ="https://www.schneier.com/blog/archives/2018/03/extracting_secr.html "> Schneier on Security</ a >
177+ </ p >
178+ </ tr >
179+ </ tbody > </ table >
180+
167181< table border ="0 " cellpadding ="0 " cellspacing ="15 " width ="100% ">
168182< tbody > < tr >
169183< td width ="200 "> < img src ="imgs/RL_privacy.png " border ="1 "width ="210 "> </ a > </ td >
@@ -192,7 +206,7 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
192206< td width ="20 "> </ td >
193207< td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1810.05162 "> < strong > Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation</ strong > </ a > </ p >
194208< p class ="content "> Chaowei Xiao, Ruizhi Deng, Bo Li, Fisher Yu, Mingyan Liu, Dawn Song.</ p >
195- < p class ="content "> The European Conference on Computer Vision (ECCV), September, 2018.</ p >
209+ < p class ="content "> The European Conference on Computer Vision (ECCV). September, 2018.</ p >
196210< p class ="margin-small "> </ p >
197211</ tr >
198212</ tbody > </ table >
@@ -203,7 +217,7 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
203217< td width ="20 "> </ td >
204218< td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1712.09491 "> < strong > Exploring the Space of Black-box Attacks on Deep Neural Networks</ strong > </ a > </ p >
205219< p class ="content "> Arjun Nitin Bhagoji, Warren He, Bo Li, Dawn Song.</ p >
206- < p class ="content "> The European Conference on Computer Vision (ECCV), September, 2018.</ p >
220+ < p class ="content "> The European Conference on Computer Vision (ECCV). September, 2018.</ p >
207221< p class ="margin-small "> </ p >
208222</ tr >
209223</ tbody > </ table >
@@ -214,7 +228,7 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
214228< td width ="20 "> </ td >
215229< td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1801.02610 "> < strong > Generating Adversarial Examples with Adversarial Networks</ strong > </ a > </ p >
216230< p class ="content "> Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song.</ p >
217- < p class ="content "> The International Joint Conference on Artificial Intelligence (IJCAI), July, 2018.</ p >
231+ < p class ="content "> The International Joint Conference on Artificial Intelligence (IJCAI). July, 2018.</ p >
218232< p class ="margin-small "> </ p >
219233</ tr >
220234</ tbody > </ table >
@@ -225,7 +239,7 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
225239< td width ="20 "> </ td >
226240< td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1805.04807 "> < strong > Curriculum Adversarial Training</ strong > </ a > </ p >
227241< p class ="content "> Qizhi Cai, (Min Du), Chang Liu, Dawn Song.</ p >
228- < p class ="content "> The International Joint Conference on Artificial Intelligence (IJCAI), July, 2018.</ p >
242+ < p class ="content "> The International Joint Conference on Artificial Intelligence (IJCAI). July, 2018.</ p >
229243< p class ="margin-small "> </ p >
230244</ tr >
231245</ tbody > </ table >
@@ -291,15 +305,12 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
291305
292306< table border ="0 " cellpadding ="0 " cellspacing ="15 " width ="100% ">
293307< tbody > < tr >
294- < td width ="200 "> < img src ="imgs/secretSharer .png " border ="1 "width ="210 "> </ a > </ td >
308+ < td width ="200 "> < img src ="imgs/GANAdv .png " border ="1 "width ="210 "> </ a > </ td >
295309< td width ="20 "> </ td >
296- < td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1802.08232 "> < strong > The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets </ strong > </ a > </ p >
297- < p class ="content "> Nicholas Carlini, Chang Liu, Jernej Kos, Úlfar Erlingsson , Dawn Song.</ p >
298- < p class ="content "> February , 2018.</ p >
310+ < td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1702.06832 "> < strong > Adversarial examples for generative models </ strong > </ a > </ p >
311+ < p class ="content "> Jernej Kos, Ian Fischer , Dawn Song.</ p >
312+ < p class ="content "> IEEE S&P Workshop on Deep Learning and Security. May , 2018.</ p >
299313< p class ="margin-small "> </ p >
300- < p class ="content ">
301- Press: < a href ="https://www.theregister.co.uk/2018/03/02/secrets_fed_into_ai_models_as_training_data_can_be_stolen/ "> The Register</ a > | < a href ="https://www.schneier.com/blog/archives/2018/03/extracting_secr.html "> Schneier on Security</ a >
302- </ p >
303314</ tr >
304315</ tbody > </ table >
305316
@@ -317,17 +328,6 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
317328</ tr >
318329</ tbody > </ table >
319330
320- < table border ="0 " cellpadding ="0 " cellspacing ="15 " width ="100% ">
321- < tbody > < tr >
322- < td width ="200 "> < img src ="imgs/queryAdv.png " border ="1 "width ="210 "> </ a > </ td >
323- < td width ="20 "> </ td >
324- < td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1712.09491 "> < strong > Exploring the Space of Black-box Attacks on Deep Neural Networks</ strong > </ a > </ p >
325- < p class ="content "> Arjun Nitin Bhagoji, Warren He, Bo Li, Dawn Song.</ p >
326- < p class ="content "> December, 2017.</ p >
327- < p class ="margin-small "> </ p >
328- </ tr >
329- </ tbody > </ table >
330-
331331< table border ="0 " cellpadding ="0 " cellspacing ="15 " width ="100% ">
332332< tbody > < tr >
333333< td width ="200 "> < img src ="imgs/ensembleDefense.png " border ="1 "width ="210 "> </ a > </ td >
@@ -360,18 +360,6 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
360360< p class ="margin-small "> </ p >
361361</ tr >
362362</ tbody > </ table >
363-
364- < table border ="0 " cellpadding ="0 " cellspacing ="15 " width ="100% ">
365- < tbody > < tr >
366- < td width ="200 "> < img src ="imgs/GANAdv.png " border ="1 "width ="210 "> </ a > </ td >
367- < td width ="20 "> </ td >
368- < td valign ="middle " width ="800 "> < p class ="content "> < a href ="https://arxiv.org/abs/1702.06832 "> < strong > Adversarial examples for generative models</ strong > </ a > </ p >
369- < p class ="content "> Jernej Kos, Ian Fischer, Dawn Song.</ p >
370- < p class ="content "> February, 2017.</ p >
371- < p class ="margin-small "> </ p >
372- </ tr >
373- </ tbody > </ table >
374-
375363< hr >
376364
377365
0 commit comments