Skip to content

Commit 3526e53

Browse files
committed
add references
1 parent f6e5497 commit 3526e53

File tree

1 file changed

+22
-34
lines changed

1 file changed

+22
-34
lines changed

‎index.html‎

Lines changed: 22 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -164,6 +164,20 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
164164
</div>
165165
</form> -->
166166

167+
<tableborder="0" cellpadding="0" cellspacing="15" width="100%">
168+
<tbody><tr>
169+
<tdwidth="200"><imgsrc="imgs/secretSharer.png" border="1"width="210"></a></td>
170+
<tdwidth="20"></td>
171+
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1802.08232"><strong>The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets</strong></a></p>
172+
<pclass="content">Nicholas Carlini, Chang Liu, Jernej Kos, Úlfar Erlingsson, Dawn Song.</p>
173+
<pclass="content">USENIX Security. August, 2019.</p>
174+
<pclass="margin-small">&nbsp;</p>
175+
<pclass="content">
176+
Press: <ahref="https://www.theregister.co.uk/2018/03/02/secrets_fed_into_ai_models_as_training_data_can_be_stolen/">The Register</a> | <ahref="https://www.schneier.com/blog/archives/2018/03/extracting_secr.html">Schneier on Security</a>
177+
</p>
178+
</tr>
179+
</tbody></table>
180+
167181
<tableborder="0" cellpadding="0" cellspacing="15" width="100%">
168182
<tbody><tr>
169183
<tdwidth="200"><imgsrc="imgs/RL_privacy.png" border="1"width="210"></a></td>
@@ -192,7 +206,7 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
192206
<tdwidth="20"></td>
193207
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1810.05162"><strong>Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation</strong></a></p>
194208
<pclass="content">Chaowei Xiao, Ruizhi Deng, Bo Li, Fisher Yu, Mingyan Liu, Dawn Song.</p>
195-
<pclass="content">The European Conference on Computer Vision (ECCV), September, 2018.</p>
209+
<pclass="content">The European Conference on Computer Vision (ECCV). September, 2018.</p>
196210
<pclass="margin-small">&nbsp;</p>
197211
</tr>
198212
</tbody></table>
@@ -203,7 +217,7 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
203217
<tdwidth="20"></td>
204218
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1712.09491"><strong>Exploring the Space of Black-box Attacks on Deep Neural Networks</strong></a></p>
205219
<pclass="content">Arjun Nitin Bhagoji, Warren He, Bo Li, Dawn Song.</p>
206-
<pclass="content">The European Conference on Computer Vision (ECCV), September, 2018.</p>
220+
<pclass="content">The European Conference on Computer Vision (ECCV). September, 2018.</p>
207221
<pclass="margin-small">&nbsp;</p>
208222
</tr>
209223
</tbody></table>
@@ -214,7 +228,7 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
214228
<tdwidth="20"></td>
215229
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1801.02610"><strong>Generating Adversarial Examples with Adversarial Networks</strong></a></p>
216230
<pclass="content">Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song.</p>
217-
<pclass="content">The International Joint Conference on Artificial Intelligence (IJCAI), July, 2018.</p>
231+
<pclass="content">The International Joint Conference on Artificial Intelligence (IJCAI). July, 2018.</p>
218232
<pclass="margin-small">&nbsp;</p>
219233
</tr>
220234
</tbody></table>
@@ -225,7 +239,7 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
225239
<tdwidth="20"></td>
226240
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1805.04807"><strong>Curriculum Adversarial Training</strong></a></p>
227241
<pclass="content">Qizhi Cai, (Min Du), Chang Liu, Dawn Song.</p>
228-
<pclass="content">The International Joint Conference on Artificial Intelligence (IJCAI), July, 2018.</p>
242+
<pclass="content">The International Joint Conference on Artificial Intelligence (IJCAI). July, 2018.</p>
229243
<pclass="margin-small">&nbsp;</p>
230244
</tr>
231245
</tbody></table>
@@ -291,15 +305,12 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
291305

292306
<tableborder="0" cellpadding="0" cellspacing="15" width="100%">
293307
<tbody><tr>
294-
<tdwidth="200"><imgsrc="imgs/secretSharer.png" border="1"width="210"></a></td>
308+
<tdwidth="200"><imgsrc="imgs/GANAdv.png" border="1"width="210"></a></td>
295309
<tdwidth="20"></td>
296-
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1802.08232"><strong>The Secret Sharer: Measuring Unintended Neural Network Memorization & Extracting Secrets</strong></a></p>
297-
<pclass="content">Nicholas Carlini, Chang Liu, Jernej Kos, Úlfar Erlingsson, Dawn Song.</p>
298-
<pclass="content">February, 2018.</p>
310+
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1702.06832"><strong>Adversarial examples for generative models</strong></a></p>
311+
<pclass="content">Jernej Kos, Ian Fischer, Dawn Song.</p>
312+
<pclass="content">IEEE S&P Workshop on Deep Learning and Security. May, 2018.</p>
299313
<pclass="margin-small">&nbsp;</p>
300-
<pclass="content">
301-
Press: <ahref="https://www.theregister.co.uk/2018/03/02/secrets_fed_into_ai_models_as_training_data_can_be_stolen/">The Register</a> | <ahref="https://www.schneier.com/blog/archives/2018/03/extracting_secr.html">Schneier on Security</a>
302-
</p>
303314
</tr>
304315
</tbody></table>
305316

@@ -317,17 +328,6 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
317328
</tr>
318329
</tbody></table>
319330

320-
<tableborder="0" cellpadding="0" cellspacing="15" width="100%">
321-
<tbody><tr>
322-
<tdwidth="200"><imgsrc="imgs/queryAdv.png" border="1"width="210"></a></td>
323-
<tdwidth="20"></td>
324-
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1712.09491"><strong>Exploring the Space of Black-box Attacks on Deep Neural Networks</strong></a></p>
325-
<pclass="content">Arjun Nitin Bhagoji, Warren He, Bo Li, Dawn Song.</p>
326-
<pclass="content">December, 2017.</p>
327-
<pclass="margin-small">&nbsp;</p>
328-
</tr>
329-
</tbody></table>
330-
331331
<tableborder="0" cellpadding="0" cellspacing="15" width="100%">
332332
<tbody><tr>
333333
<tdwidth="200"><imgsrc="imgs/ensembleDefense.png" border="1"width="210"></a></td>
@@ -360,18 +360,6 @@ <h2 class="label"><a name="publications"><span >Recent Publications</span></a></
360360
<pclass="margin-small">&nbsp;</p>
361361
</tr>
362362
</tbody></table>
363-
364-
<tableborder="0" cellpadding="0" cellspacing="15" width="100%">
365-
<tbody><tr>
366-
<tdwidth="200"><imgsrc="imgs/GANAdv.png" border="1"width="210"></a></td>
367-
<tdwidth="20"></td>
368-
<tdvalign="middle" width="800"><pclass="content"><ahref="https://arxiv.org/abs/1702.06832"><strong>Adversarial examples for generative models</strong></a></p>
369-
<pclass="content">Jernej Kos, Ian Fischer, Dawn Song.</p>
370-
<pclass="content">February, 2017.</p>
371-
<pclass="margin-small">&nbsp;</p>
372-
</tr>
373-
</tbody></table>
374-
375363
<hr>
376364

377365

0 commit comments

Comments
(0)