Opening Remarks of Research Forum Deep Learning and Security Workshop 2017 Chang Liu UC Berkeley.

Slides:



Advertisements
Similar presentations
Foreground Focus: Finding Meaningful Features in Unlabeled Images Yong Jae Lee and Kristen Grauman University of Texas at Austin.
Advertisements

MESA LAB Two papers in IFAC14 Guimei Zhang MESA LAB MESA (Mechatronics, Embedded Systems and Automation) LAB School of Engineering, University of California,
Deep Learning and Neural Nets Spring 2015
Yiming Zhang SUNY at Buffalo TRAFFIC SIGN RECOGNITION WITH COLOR IMAGE.
Graph Based Semi- Supervised Learning Fei Wang Department of Statistical Science Cornell University.
Multi-task Low-rank Affinity Pursuit for Image Segmentation Bin Cheng, Guangcan Liu, Jingdong Wang, Zhongyang Huang, Shuicheng Yan (ICCV’ 2011) Presented.
Traffic Sign Pattern Recognition Pilho Kim (ECE), Zhaohua Wang, Yichang (James) Tsai (CE)
Security Analytics Thrust Anthony D. Joseph (UCB) Rachel Greenstadt (Drexel), Ling Huang (Intel), Dawn Song (UCB), Doug Tygar (UCB)
PANDA: Pose Aligned Networks for Deep Attribute Modeling Ning Zhang 1,2 Manohar Paluri 1 Marć Aurelio Ranzato 1 Trevor Darrell 2 Lumbomir Boudev 1 1 Facebook.
Wildlife Census via LSH-based animal tracking APOORV PATWARDHAN 1.
Stealing Machine Learning Models via Prediction APIs
CS 4501: Introduction to Computer Vision Computer Vision + Natural Language Connelly Barnes Some slides from Fei-Fei Li / Andrej Karpathy / Justin Johnson.
Data Mining, Neural Network and Genetic Programming
Eick: Introduction Machine Learning
Convolutional Neural Fabrics by Shreyas Saxena, Jakob Verbeek
Adversarial Learning for Neural Dialogue Generation
References [1] - Y. LeCun, L. Bottou, Y. Bengio and P. Haffner, Gradient-Based Learning Applied to Document Recognition, Proceedings of the IEEE, 86(11): ,
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
Regularizing Face Verification Nets To Discrete-Valued Pain Regression
DeepXplore: Automated Whitebox Testing of Deep Learning Systems
Adversaries.
Combining CNN with RNN for scene labeling (segmentation)
Inaudible Voice Commands Ultrasound Modulation
CNN Demo LIU Pengpeng.
Poisoning Attacks with Back-Gradient Optimization
AV Autonomous Vehicles.
AI in Cyber-security: Examples of Algorithms & Techniques
R-CNN region By Ilia Iofedov 11/11/2018 BGU, DNN course 2016.
New horizons in the artificial vision
Deep Learning based Machine Translation
convolutional neural networkS
Normalized Cut Loss for Weakly-supervised CNN Segmentation
Computer Vision James Hays
Networking Specialization Overview
Jia-Bin Huang Virginia Tech ECE 6554 Advanced Computer Vision
convolutional neural networkS
Bolun Wang*, Yuanshun Yao, Bimal Viswanath§ Haitao Zheng, Ben Y. Zhao
ECE 599/692 – Deep Learning Lecture 1 - Introduction
The Combination of Supervised and Unsupervised Approach
Adversarial Evasion-Resilient Hardware Malware Detectors
MEgo2Vec: Embedding Matched Ego Networks for User Alignment Across Social Networks Jing Zhang+, Bo Chen+, Xianming Wang+, Fengmei Jin+, Hong Chen+, Cuiping.
Image recognition: Defense adversarial attacks
Stealing DNN models: Attacks and Defenses
Privacy-preserving and Secure AI
Semantic segmentation
Outline Background Motivation Proposed Model Experimental Results
Deep Cross-media Knowledge Transfer
Attack and defense on learning-based security system
Textual Video Prediction
Christoph F. Eick: A Gentle Introduction to Machine Learning
边缘检测年度进展概述 Ming-Ming Cheng Media Computing Lab, Nankai University
Adversarial Learning for Security System
Abnormally Detection
Neural Modular Networks
Attacks on Remote Face Classifiers
Adversarial Machine Learning in Julia
Feature Selective Anchor-Free Module for Single-Shot Object Detection
Topic: Semantic Text Mining
Recent Advances in Neural Architecture Search
Multi-Modal Multi-Scale Deep Learning for Large-Scale Image Annotation
Visual Grounding 专题报告 Lejian Ren 4.23.
Trusting Machine Learning Algorithms for Safeguards Applications
Deep Structured Scene Parsing by Learning with Image Descriptions
Peng Cui Tsinghua University
Exploiting Unintended Feature Leakage in Collaborative Learning
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems NDSS 2019 Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick.
IEEE S&P 2019 Presenter: Jason Xue Macquarie University 11 April 2019.
SDSEN: Self-Refining Deep Symmetry Enhanced Network
Developments in Adversarial Machine Learning
Presentation transcript:

Opening Remarks of Research Forum Deep Learning and Security Workshop 2017 Chang Liu UC Berkeley

Deep Learning and Security is a trending topic in academia in 2017 Best Papers in Security Conferences Towards Evaluating the Robustness of Neural Networks (Oakland 2017 Best Student Paper) DolphinAtack: Inaudible Voice Commands (CCS 2017 Best Paper) Best Paper in Other Top-Tier Conferences Understanding Black-box Predictions via Influence Functions (ICML 2017 Best Paper) DeepXplore: Automated Whitebox Testing of Deep Learning Systems (SOSP 2017 Best Paper) Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data (ICLR 2017 Best Paper)

Overview of Deep Learning and Security in 2017 Security of Deep Learning Applying deep learning to solve security challenges Remarks on our Research Forum

Adversarial examples in autonomous driving Stop Sign Yield Sign

Adversarial examples against a black-box system Ground truth: water buffalo Target label: rugby ball Yanpei Liu, Xinyun Chen, Chang Liu, Dawn Song. Delving into Transferable Adversarial Examples and Black-box Attacks. ICLR 2016

Robust Physically Implementable Attack Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song . "Robust Physical-World Attacks on Machine Learning Models". arXiv:1707.08945

A Race Between Attacks and Defenses JSMA → Defensive Distillation → Tuned JSMA [Papernot et al. ’15], [Papernot et al. ‘16], [Carlini et al. ‘17] FGSM → Feature Squeezing, Ensembles → Tuned Lagrange [Goodfellow et al. ‘15], [Abbasi et al. ‘17], [Xu et al. ‘17]; [He et al. ‘17]

Robust defenses against adversarial examples Madry et al’s MNIST Challenge https://github.com/MadryLab/mnist_challenge Empricially robust against MNIST adversarial examples Provably Robust Models by Construction J Zico Kolter and Eric Wong. Provable defenses against adversarial examples via the convex outer adversarial polytope. arXiv preprint arXiv:1711.00851 Anonymous. Certified defenses against adversarial examples. In Under review at ICLR 2018

Attacking non-Image Classification Models Text Processing [Jia and Liang EMNLP 2017] Reinforcement Learning [Lin et al. IJCAI 2017] [Huang et al. 2017] [Kos and Song 2017] Object Detection [Hendrik Metzen et al. CVPR 2017] [Xie et al. CVPR 2017] Semantic Segmentation [Fischer et al. 2017] [Xie et al. CVPR 2017] Etc.

Attacking DenseCap and VQA Xiaojun Xu, Xinyun Chen, Chang Liu,  Anna Rohrbach, Trevor Darrell, Dawn Song. Fooling Vision and Language Models Despite Localization and Attention Mechanisms

Attacking DenseCap and VQA Question: What color is the traffic light? Original answer: MCB - green, NMN - green. Target: red. Answer after attack: MCB - red, NMN - red. Benign Attack MCB Attack NMM

Beyond Adversarial Examples… Training Poisoning Attack Y. Liu, S. Ma, Y. Aafer, W.-C. Lee, J. Zhai, W. Wang, and X. Zhang, Trojaning attack on neural networks, to appear NDSS 2018 T. Gu, B. Dolan-Gavitt, and S. Garg, Badnets: Identifying vulnerabilities in the machine learning model supply chain L. Munoz-Gonzalez, B. Biggio, A. Demontis, A. Paudice, V. Wongrassamee, E. C. Lupu, and F. Roli, Towards poisoning of deep learning algorithms with back- gradient optimization, AISec 2018

Poisoned Face Recognition System Physical Key Poisoned Face Recognition System Alyson Hannigan Person 1 Wrong Keys Person 2 Xinyun Chen, Chang Liu, Bo Li, Dawn Song. Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning

Beyond Security… Privacy Membership Inference [Shokri et al. Oakland 2017] Secret Extraction Nicholas Carlini, Jernej Kos, Chang Liu, Dawn Song, Ulfar Erlingsson, The Secret Sharer: Extracting Secrets from Unintended Memorization in Neural Networks Differential Privacy [Papernot et al. ICLR 2017]

Application of Deep Learning to Security Problems Binary Code Analysis (Winners of the first Deep Learning and Security Innovation Hackathon) Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song, Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection, CCS 2017 Zheng Leong Chua, Shiqi Shen, Prateek Saxena, Zhenkai Liang, Neural Nets Can Learn Function Type Signatures From Binaries, USENIX Security 2017 Log Anomaly Detection [Du et al. CCS 2017]

Reseach Forum this year We have 17 presentations Authors from Singapore, China, India, US, Europe

Awards 1 x Best Research award --- Black Hat Asia 2018 pass 6 x Outstanding Research awards --- $250 vouchers each

The Best Research Talk Award Goes To … to be announced tomorrow 