Profile picture
Ram Shankar @ram_ssk
, 5 tweets, 3 min read Read on Twitter
How to make adversarial ML relevant in real world scenarios? That's what described in 25 pages of insightful commentary by Gilmer, @ryan_p_adams, @goodfellow_ian and all - arxiv.org/abs/1807.06732. Spoiler: They know that boxing matches are pirated! Cliff notes below:
Not all perturbations need to be imperceptible. This is the action space of the attacker along two axes, which leads to the following kinds of attack classes
Here is how to spot adversarial defenses that arent *really* defenses
Here are the authors recommendations to do adversarial example the right way
This might be the first adversarial paper that security practitioners may take more seriously - kudos for mentioning defense in depth (@dave_andersen - is that you?) and nice to look beyond that damn l2 ball!
cc: @halvarflake , @drhyrum
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Ram Shankar
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!