Skip to main content

Showing 1–50 of 66 results for author: Goodfellow, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2010.11645  [pdf, other

    cs.LG cs.AI

    Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming

    Authors: Sumanth Dathathri, Krishnamurthy Dvijotham, Alexey Kurakin, Aditi Raghunathan, Jonathan Uesato, Rudy Bunel, Shreya Shankar, Jacob Steinhardt, Ian Goodfellow, Percy Liang, Pushmeet Kohli

    Abstract: Convex relaxations have emerged as a promising approach for verifying desirable properties of neural networks like robustness to adversarial perturbations. Widely used Linear Programming (LP) relaxations only work well when networks are trained to facilitate verification. This precludes applications that involve verification-agnostic networks, i.e., networks not specially trained for verification.… ▽ More

    Submitted 3 November, 2020; v1 submitted 22 October, 2020; originally announced October 2020.

  2. arXiv:2003.02365  [pdf, other

    cs.CV eess.IV stat.ML

    Creating High Resolution Images with a Latent Adversarial Generator

    Authors: David Berthelot, Peyman Milanfar, Ian Goodfellow

    Abstract: Generating realistic images is difficult, and many formulations for this task have been proposed recently. If we restrict the task to that of generating a particular class of images, however, the task becomes more tractable. That is to say, instead of generating an arbitrary image as a sample from the manifold of natural images, we propose to sample images from a particular "subspace" of natural i… ▽ More

    Submitted 4 March, 2020; originally announced March 2020.

  3. arXiv:1905.02249  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    MixMatch: A Holistic Approach to Semi-Supervised Learning

    Authors: David Berthelot, Nicholas Carlini, Ian Goodfellow, Nicolas Papernot, Avital Oliver, Colin Raffel

    Abstract: Semi-supervised learning has proven to be a powerful paradigm for leveraging unlabeled data to mitigate the reliance on large labeled datasets. In this work, we unify the current dominant approaches for semi-supervised learning to produce a new algorithm, MixMatch, that works by guessing low-entropy labels for data-augmented unlabeled examples and mixing labeled and unlabeled data using MixUp. We… ▽ More

    Submitted 23 October, 2019; v1 submitted 6 May, 2019; originally announced May 2019.

  4. arXiv:1903.10346  [pdf, other

    eess.AS cs.LG cs.SD stat.ML

    Imperceptible, Robust, and Targeted Adversarial Examples for Automatic Speech Recognition

    Authors: Yao Qin, Nicholas Carlini, Ian Goodfellow, Garrison Cottrell, Colin Raffel

    Abstract: Adversarial examples are inputs to machine learning models designed by an adversary to cause an incorrect output. So far, adversarial examples have been studied most extensively in the image domain. In this domain, adversarial examples can be constructed by imperceptibly modifying images to cause misclassification, and are practical in the physical world. In contrast, current targeted adversarial… ▽ More

    Submitted 7 June, 2019; v1 submitted 22 March, 2019; originally announced March 2019.

    Comments: International Conference on Machine Learning (ICML), 2019

  5. arXiv:1903.06293  [pdf, ps, other

    cs.LG stat.ML

    A Research Agenda: Dynamic Models to Defend Against Correlated Attacks

    Authors: Ian Goodfellow

    Abstract: In this article I describe a research agenda for securing machine learning models against adversarial inputs at test time. This article does not present results but instead shares some of my thoughts about where I think that the field needs to go. Modern machine learning works very well on I.I.D. data: data for which each example is drawn {\em independently} and for which the distribution generati… ▽ More

    Submitted 14 March, 2019; originally announced March 2019.

  6. arXiv:1902.06705  [pdf, ps, other

    cs.LG cs.CR stat.ML

    On Evaluating Adversarial Robustness

    Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin

    Abstract: Correctly evaluating defenses against adversarial examples has proven to be extremely difficult. Despite the significant amount of recent work attempting to design defenses that withstand adaptive attacks, few have succeeded; most papers that propose defenses are quickly shown to be incorrect. We believe a large contributing factor is the difficulty of performing security evaluations. In this pa… ▽ More

    Submitted 20 February, 2019; v1 submitted 18 February, 2019; originally announced February 2019.

    Comments: Living document; source available at https://github.com/evaluating-adversarial-robustness/adv-eval-paper/

  7. arXiv:1811.05512  [pdf, other

    cs.LG stat.ML

    A domain agnostic measure for monitoring and evaluating GANs

    Authors: Paulina Grnarova, Kfir Y Levy, Aurelien Lucchi, Nathanael Perraudin, Ian Goodfellow, Thomas Hofmann, Andreas Krause

    Abstract: Generative Adversarial Networks (GANs) have shown remarkable results in modeling complex distributions, but their evaluation remains an unsettled issue. Evaluations are essential for: (i) relative assessment of different models and (ii) monitoring the progress of a single model throughout training. The latter cannot be determined by simply inspecting the generator and discriminator loss curves as… ▽ More

    Submitted 15 July, 2020; v1 submitted 13 November, 2018; originally announced November 2018.

  8. arXiv:1811.03685  [pdf, other

    cs.CR cs.AI cs.LG

    New CleverHans Feature: Better Adversarial Robustness Evaluations with Attack Bundling

    Authors: Ian Goodfellow

    Abstract: This technical report describes a new feature of the CleverHans library called "attack bundling". Many papers about adversarial examples present lists of error rates corresponding to different attack algorithms. A common approach is to take the maximum across this list and compare defenses against that error rate. We argue that a better approach is to use attack bundling: the max should be taken a… ▽ More

    Submitted 8 November, 2018; originally announced November 2018.

  9. arXiv:1810.06758  [pdf, other

    stat.ML cs.LG

    Discriminator Rejection Sampling

    Authors: Samaneh Azadi, Catherine Olsson, Trevor Darrell, Ian Goodfellow, Augustus Odena

    Abstract: We propose a rejection sampling scheme using the discriminator of a GAN to approximately correct errors in the GAN generator distribution. We show that under quite strict assumptions, this will allow us to recover the data distribution exactly. We then examine where those strict assumptions break down and design a practical algorithm - called Discriminator Rejection Sampling (DRS) - that can be us… ▽ More

    Submitted 26 February, 2019; v1 submitted 15 October, 2018; originally announced October 2018.

    Comments: Published as a conference paper at ICLR 2019

  10. arXiv:1810.03307  [pdf, other

    cs.CV cs.LG stat.ML

    Local Explanation Methods for Deep Neural Networks Lack Sensitivity to Parameter Values

    Authors: Julius Adebayo, Justin Gilmer, Ian Goodfellow, Been Kim

    Abstract: Explaining the output of a complicated machine learning model like a deep neural network (DNN) is a central challenge in machine learning. Several proposed local explanation methods address this issue by identifying what dimensions of a single input are most responsible for a DNN's output. The goal of this work is to assess the sensitivity of local explanations to DNN parameter values. Somewhat su… ▽ More

    Submitted 8 October, 2018; originally announced October 2018.

    Comments: Workshop Track International Conference on Learning Representations (ICLR)

  11. arXiv:1810.03292  [pdf, other

    cs.CV cs.LG stat.ML

    Sanity Checks for Saliency Maps

    Authors: Julius Adebayo, Justin Gilmer, Michael Muelly, Ian Goodfellow, Moritz Hardt, Been Kim

    Abstract: Saliency methods have emerged as a popular tool to highlight features in an input deemed relevant for the prediction of a learned model. Several saliency methods have been proposed, often guided by visual appeal on image data. In this work, we propose an actionable methodology to evaluate what kinds of explanations a given method can and cannot provide. We find that reliance, solely, on visual ass… ▽ More

    Submitted 6 November, 2020; v1 submitted 8 October, 2018; originally announced October 2018.

    Comments: Updating Guided Backprop experiments due to bug. The results and conclusions remain the same

  12. arXiv:1809.08352  [pdf, other

    stat.ML cs.CV cs.LG

    Unrestricted Adversarial Examples

    Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow

    Abstract: We introduce a two-player contest for evaluating the safety and robustness of machine learning systems, with a large prize pool. Unlike most prior work in ML robustness, which studies norm-constrained adversaries, we shift our focus to unconstrained adversaries. Defenders submit machine learning models, and try to achieve high accuracy and coverage on non-adversarial data while making no confident… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

  13. arXiv:1808.04888  [pdf, other

    stat.ML cs.LG

    Skill Rating for Generative Models

    Authors: Catherine Olsson, Surya Bhupatiraju, Tom Brown, Augustus Odena, Ian Goodfellow

    Abstract: We explore a new way to evaluate generative models using insights from evaluation of competitive games between human players. We show experimentally that tournaments between generators and discriminators provide an effective way to evaluate generative models. We introduce two methods for summarizing tournament outcomes: tournament win rate and skill rating. Evaluations are useful in different cont… ▽ More

    Submitted 14 August, 2018; originally announced August 2018.

  14. arXiv:1807.10875  [pdf, other

    stat.ML cs.LG

    TensorFuzz: Debugging Neural Networks with Coverage-Guided Fuzzing

    Authors: Augustus Odena, Ian Goodfellow

    Abstract: Machine learning models are notoriously difficult to interpret and debug. This is particularly true of neural networks. In this work, we introduce automated software testing techniques for neural networks that are well-suited to discovering errors which occur only for rare inputs. Specifically, we develop coverage-guided fuzzing (CGF) methods for neural networks. In CGF, random mutations of inputs… ▽ More

    Submitted 27 July, 2018; originally announced July 2018.

    Comments: Preprint - work in progress

  15. arXiv:1807.07543  [pdf, other

    cs.LG stat.ML

    Understanding and Improving Interpolation in Autoencoders via an Adversarial Regularizer

    Authors: David Berthelot, Colin Raffel, Aurko Roy, Ian Goodfellow

    Abstract: Autoencoders provide a powerful framework for learning compressed representations by encoding all of the information needed to reconstruct a data point in a latent code. In some cases, autoencoders can "interpolate": By decoding the convex combination of the latent codes for two datapoints, the autoencoder can produce an output which semantically mixes characteristics from the datapoints. In this… ▽ More

    Submitted 23 July, 2018; v1 submitted 19 July, 2018; originally announced July 2018.

  16. arXiv:1807.06732  [pdf, other

    cs.LG stat.ML

    Motivating the Rules of the Game for Adversarial Example Research

    Authors: Justin Gilmer, Ryan P. Adams, Ian Goodfellow, David Andersen, George E. Dahl

    Abstract: Advances in machine learning have led to broad deployment of systems with impressive performance on important problems. Nonetheless, these systems can be induced to make errors on data that are surprisingly similar to examples the learned system handles correctly. The existence of these errors raises a variety of questions about out-of-sample generalization and whether bad actors might use such ex… ▽ More

    Submitted 19 July, 2018; v1 submitted 17 July, 2018; originally announced July 2018.

  17. arXiv:1806.11146  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Adversarial Reprogramming of Neural Networks

    Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein

    Abstract: Deep neural networks are susceptible to \emph{adversarial} attacks. In computer vision, well-crafted perturbations to images can cause neural networks to make mistakes such as confusing a cat with a computer. Previous adversarial attacks have been designed to degrade performance of models or cause machine learning models to produce specific outputs chosen ahead of time by the attacker. We introduc… ▽ More

    Submitted 29 November, 2018; v1 submitted 28 June, 2018; originally announced June 2018.

    Journal ref: International Conference on Learning Representations 2019

  18. arXiv:1806.04169  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Defense Against the Dark Arts: An overview of adversarial example security research and future research directions

    Authors: Ian Goodfellow

    Abstract: This article presents a summary of a keynote lecture at the Deep Learning Security workshop at IEEE Security and Privacy 2018. This lecture summarizes the state of the art in defenses against adversarial examples and provides recommendations for future research directions on this topic.

    Submitted 11 June, 2018; originally announced June 2018.

  19. arXiv:1805.08318  [pdf, other

    stat.ML cs.LG

    Self-Attention Generative Adversarial Networks

    Authors: Han Zhang, Ian Goodfellow, Dimitris Metaxas, Augustus Odena

    Abstract: In this paper, we propose the Self-Attention Generative Adversarial Network (SAGAN) which allows attention-driven, long-range dependency modeling for image generation tasks. Traditional convolutional GANs generate high-resolution details as a function of only spatially local points in lower-resolution feature maps. In SAGAN, details can be generated using cues from all feature locations. Moreover,… ▽ More

    Submitted 14 June, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

  20. arXiv:1804.09170  [pdf, other

    cs.LG stat.ML

    Realistic Evaluation of Deep Semi-Supervised Learning Algorithms

    Authors: Avital Oliver, Augustus Odena, Colin Raffel, Ekin D. Cubuk, Ian J. Goodfellow

    Abstract: Semi-supervised learning (SSL) provides a powerful framework for leveraging unlabeled data when labels are limited or expensive to obtain. SSL algorithms based on deep neural networks have recently proven successful on standard benchmark tasks. However, we argue that these benchmarks fail to address many issues that these algorithms would face in real-world applications. After creating a unified r… ▽ More

    Submitted 17 June, 2019; v1 submitted 24 April, 2018; originally announced April 2018.

    Journal ref: NeurIPS 2018 Proceedings

  21. arXiv:1804.07870  [pdf, other

    cs.LG stat.ML

    Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size

    Authors: Ian Goodfellow

    Abstract: A key problem in research on adversarial examples is that vulnerability to adversarial examples is usually measured by running attack algorithms. Because the attack algorithms are not optimal, the attack algorithms are prone to overestimating the size of perturbation needed to fool the target model. In other words, the attack-based methodology provides an upper-bound on the size of a perturbation… ▽ More

    Submitted 20 April, 2018; originally announced April 2018.

  22. arXiv:1804.00097  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    Adversarial Attacks and Defences Competition

    Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe

    Abstract: To accelerate research on adversarial examples and robustness of machine learning classifiers, Google Brain organized a NIPS 2017 competition that encouraged researchers to develop new methods to generate adversarial examples as well as to develop new ways to defend against them. In this chapter, we describe the structure and organization of the competition and the solutions developed by several o… ▽ More

    Submitted 30 March, 2018; originally announced April 2018.

    Comments: 36 pages, 10 figures

  23. arXiv:1803.06373  [pdf, ps, other

    cs.LG stat.ML

    Adversarial Logit Pairing

    Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow

    Abstract: In this paper, we develop improved techniques for defending against adversarial examples at scale. First, we implement the state of the art version of adversarial training at unprecedented scale on ImageNet and investigate whether it remains effective in this setting - an important open scientific question (Athalye et al., 2018). Next, we introduce enhanced defenses using a technique we call logit… ▽ More

    Submitted 16 March, 2018; originally announced March 2018.

    Comments: 10 pages

  24. arXiv:1802.08768  [pdf, other

    stat.ML cs.LG

    Is Generator Conditioning Causally Related to GAN Performance?

    Authors: Augustus Odena, Jacob Buckman, Catherine Olsson, Tom B. Brown, Christopher Olah, Colin Raffel, Ian Goodfellow

    Abstract: Recent work (Pennington et al, 2017) suggests that controlling the entire distribution of Jacobian singular values is an important design consideration in deep learning. Motivated by this, we study the distribution of singular values of the Jacobian of the generator in Generative Adversarial Networks (GANs). We find that this Jacobian generally becomes ill-conditioned at the beginning of training.… ▽ More

    Submitted 18 June, 2018; v1 submitted 23 February, 2018; originally announced February 2018.

  25. arXiv:1802.08195  [pdf, other

    cs.LG cs.CV q-bio.NC stat.ML

    Adversarial Examples that Fool both Computer Vision and Time-Limited Humans

    Authors: Gamaleldin F. Elsayed, Shreya Shankar, Brian Cheung, Nicolas Papernot, Alex Kurakin, Ian Goodfellow, Jascha Sohl-Dickstein

    Abstract: Machine learning models are vulnerable to adversarial examples: small changes to images can cause computer vision models to make mistakes such as identifying a school bus as an ostrich. However, it is still an open question whether humans are prone to similar mistakes. Here, we address this question by leveraging recent techniques that transfer adversarial examples from computer vision models with… ▽ More

    Submitted 21 May, 2018; v1 submitted 22 February, 2018; originally announced February 2018.

    Journal ref: Advances in Neural Information Processing Systems, 2018

  26. arXiv:1801.07736  [pdf, other

    stat.ML cs.AI cs.LG

    MaskGAN: Better Text Generation via Filling in the______

    Authors: William Fedus, Ian Goodfellow, Andrew M. Dai

    Abstract: Neural text generation models are often autoregressive language models or seq2seq models. These models generate text by sampling words sequentially, with each word conditioned on the previous word, and are state-of-the-art for several machine translation and summarization benchmarks. These benchmarks are often defined by validation perplexity even though this is not a direct measure of the quality… ▽ More

    Submitted 1 March, 2018; v1 submitted 23 January, 2018; originally announced January 2018.

    Comments: 16 pages, ICLR 2018

  27. arXiv:1801.02774  [pdf, other

    cs.CV

    Adversarial Spheres

    Authors: Justin Gilmer, Luke Metz, Fartash Faghri, Samuel S. Schoenholz, Maithra Raghu, Martin Wattenberg, Ian Goodfellow

    Abstract: State of the art computer vision models have been shown to be vulnerable to small adversarial perturbations of the input. In other words, most images in the data distribution are both correctly classified by the model and are very close to a visually similar misclassified image. Despite substantial research interest, the cause of the phenomenon is still poorly understood and remains unsolved. We h… ▽ More

    Submitted 10 September, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

    MSC Class: 68T45 ACM Class: I.2.6

  28. arXiv:1710.08446  [pdf, other

    stat.ML cs.LG

    Many Paths to Equilibrium: GANs Do Not Need to Decrease a Divergence At Every Step

    Authors: William Fedus, Mihaela Rosca, Balaji Lakshminarayanan, Andrew M. Dai, Shakir Mohamed, Ian Goodfellow

    Abstract: Generative adversarial networks (GANs) are a family of generative models that do not minimize a single training criterion. Unlike other generative models, the data distribution is learned via a game between a generator (the generative model) and a discriminator (a teacher providing training signal) that each minimize their own cost. GANs are designed to reach a Nash equilibrium at which each playe… ▽ More

    Submitted 20 February, 2018; v1 submitted 23 October, 2017; originally announced October 2017.

    Comments: 18 pages

  29. arXiv:1708.08022  [pdf, ps, other

    stat.ML cs.CR cs.LG

    On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches

    Authors: Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang

    Abstract: The recent, remarkable growth of machine learning has led to intense interest in the privacy of the data on which machine learning relies, and to new techniques for preserving privacy. However, older ideas about privacy may well remain valid and useful. This note reviews two recent works on privacy in the light of the wisdom of some of the early literature, in particular the principles distilled b… ▽ More

    Submitted 26 August, 2017; originally announced August 2017.

    Journal ref: IEEE 30th Computer Security Foundations Symposium (CSF), pages 1--6, 2017

  30. arXiv:1705.07204  [pdf, other

    stat.ML cs.CR cs.LG

    Ensemble Adversarial Training: Attacks and Defenses

    Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are perturbed inputs designed to fool machine learning models. Adversarial training injects such examples into training data to increase robustness. To scale this technique to large datasets, perturbations are crafted using fast single-step methods that maximize a linear approximation of the model's loss. We show that this form of adversarial training converges to a degenerate… ▽ More

    Submitted 26 April, 2020; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: 22 pages, 5 figures, International Conference on Learning Representations (ICLR) 2018 (amended in April 2020 to include subsequent attacks that significantly reduced the robustness of our models)

  31. arXiv:1704.03453  [pdf, other

    stat.ML cs.CR cs.LG

    The Space of Transferable Adversarial Examples

    Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are maliciously perturbed inputs designed to mislead machine learning (ML) models at test-time. They often transfer: the same adversarial example fools more than one model. In this work, we propose novel methods for estimating the previously unknown dimensionality of the space of adversarial inputs. We find that adversarial examples span a contiguous subspace of large (~25)… ▽ More

    Submitted 23 May, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: 15 pages, 7 figures

  32. arXiv:1702.02284  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Attacks on Neural Network Policies

    Authors: Sandy Huang, Nicolas Papernot, Ian Goodfellow, Yan Duan, Pieter Abbeel

    Abstract: Machine learning classifiers are known to be vulnerable to inputs maliciously constructed by adversaries to force misclassification. Such adversarial examples have been extensively studied in the context of computer vision applications. In this work, we show adversarial attacks are also effective when targeting neural network policies in reinforcement learning. Specifically, we show existing adver… ▽ More

    Submitted 7 February, 2017; originally announced February 2017.

  33. arXiv:1701.00160  [pdf, other

    cs.LG

    NIPS 2016 Tutorial: Generative Adversarial Networks

    Authors: Ian Goodfellow

    Abstract: This report summarizes the tutorial presented by the author at NIPS 2016 on generative adversarial networks (GANs). The tutorial describes: (1) Why generative modeling is a topic worth studying, (2) how generative models work, and how GANs compare to other generative models, (3) the details of how GANs work, (4) research frontiers in GANs, and (5) state-of-the-art image models that combine GANs wi… ▽ More

    Submitted 3 April, 2017; v1 submitted 31 December, 2016; originally announced January 2017.

    Comments: v2-v4 are all typo fixes. No substantive changes relative to v1

  34. arXiv:1611.01236  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    Adversarial Machine Learning at Scale

    Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio

    Abstract: Adversarial examples are malicious inputs designed to fool machine learning models. They often transfer from one model to another, allowing attackers to mount black box attacks without knowledge of the target model's parameters. Adversarial training is the process of explicitly training a model on adversarial examples, in order to make it more robust to attack or to reduce its test error on clean… ▽ More

    Submitted 10 February, 2017; v1 submitted 3 November, 2016; originally announced November 2016.

    Comments: 17 pages, 5 figures

  35. arXiv:1610.05755  [pdf, other

    stat.ML cs.CR cs.LG

    Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data

    Authors: Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, Kunal Talwar

    Abstract: Some machine learning applications involve training data that is sensitive, such as the medical histories of patients in a clinical trial. A model may inadvertently and implicitly store some of its training data; careful analysis of the model may therefore reveal sensitive information. To address this problem, we demonstrate a generally applicable approach to providing strong privacy guarantees… ▽ More

    Submitted 3 March, 2017; v1 submitted 18 October, 2016; originally announced October 2016.

    Comments: Accepted to ICLR 17 as an oral

  36. arXiv:1610.00768  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Technical Report on the CleverHans v2.1.0 Adversarial Examples Library

    Authors: Nicolas Papernot, Fartash Faghri, Nicholas Carlini, Ian Goodfellow, Reuben Feinman, Alexey Kurakin, Cihang Xie, Yash Sharma, Tom Brown, Aurko Roy, Alexander Matyasko, Vahid Behzadan, Karen Hambardzumyan, Zhishuai Zhang, Yi-Lin Juang, Zhi Li, Ryan Sheatsley, Abhibhav Garg, Jonathan Uesato, Willi Gierke, Yinpeng Dong, David Berthelot, Paul Hendricks, Jonas Rauber, Rujun Long , et al. (1 additional authors not shown)

    Abstract: CleverHans is a software library that provides standardized reference implementations of adversarial example construction techniques and adversarial training. The library may be used to develop more robust machine learning models and to provide standardized benchmarks of models' performance in the adversarial setting. Benchmarks constructed without a standardized implementation of adversarial exam… ▽ More

    Submitted 27 June, 2018; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: Technical report for https://github.com/tensorflow/cleverhans

  37. arXiv:1607.02533  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    Adversarial examples in the physical world

    Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio

    Abstract: Most existing machine learning classifiers are highly vulnerable to adversarial examples. An adversarial example is a sample of input data which has been modified very slightly in a way that is intended to cause a machine learning classifier to misclassify it. In many cases, these modifications can be so subtle that a human observer does not even notice the modification at all, yet the classifier… ▽ More

    Submitted 10 February, 2017; v1 submitted 8 July, 2016; originally announced July 2016.

    Comments: 14 pages, 6 figures. Demo available at https://youtu.be/zQ_uMenoBCk

  38. arXiv:1607.00133  [pdf, other

    stat.ML cs.CR cs.LG

    Deep Learning with Differential Privacy

    Authors: Martín Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang

    Abstract: Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the training of models requires large, representative datasets, which may be crowdsourced and contain sensitive information. The models should not expose private information in these datasets. Addressing this goal, we develop new algorithmic techniques for learning and a refin… ▽ More

    Submitted 24 October, 2016; v1 submitted 1 July, 2016; originally announced July 2016.

    Journal ref: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), pp. 308-318, 2016

  39. arXiv:1606.03498  [pdf, other

    cs.LG cs.CV cs.NE

    Improved Techniques for Training GANs

    Authors: Tim Salimans, Ian Goodfellow, Wojciech Zaremba, Vicki Cheung, Alec Radford, Xi Chen

    Abstract: We present a variety of new architectural features and training procedures that we apply to the generative adversarial networks (GANs) framework. We focus on two applications of GANs: semi-supervised learning, and the generation of images that humans find visually realistic. Unlike most work on generative models, our primary goal is not to train a model that assigns high likelihood to test data, n… ▽ More

    Submitted 10 June, 2016; originally announced June 2016.

  40. arXiv:1605.07725  [pdf, ps, other

    stat.ML cs.LG

    Adversarial Training Methods for Semi-Supervised Text Classification

    Authors: Takeru Miyato, Andrew M. Dai, Ian Goodfellow

    Abstract: Adversarial training provides a means of regularizing supervised learning algorithms while virtual adversarial training is able to extend supervised learning algorithms to the semi-supervised setting. However, both methods require making small perturbations to numerous entries of the input vector, which is inappropriate for sparse high-dimensional inputs such as one-hot word representations. We ex… ▽ More

    Submitted 16 November, 2021; v1 submitted 25 May, 2016; originally announced May 2016.

    Comments: Published as a conference paper at ICLR 2017

  41. arXiv:1605.07277  [pdf, other

    cs.CR cs.LG

    Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples

    Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow

    Abstract: Many machine learning models are vulnerable to adversarial examples: inputs that are specially crafted to cause a machine learning model to produce an incorrect output. Adversarial examples that affect one model often affect another model, even if the two models have different architectures or were trained on different training sets, so long as both models were trained to perform the same task. An… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

  42. arXiv:1605.07157  [pdf, other

    cs.LG cs.AI cs.CV cs.RO

    Unsupervised Learning for Physical Interaction through Video Prediction

    Authors: Chelsea Finn, Ian Goodfellow, Sergey Levine

    Abstract: A core challenge for an agent learning to interact with the world is to predict how its actions affect objects in its environment. Many existing methods for learning the dynamics of physical interactions require labeled object information. However, to scale real-world interaction learning to a variety of scenes and objects, acquiring labeled data becomes increasingly impractical. To learn about ph… ▽ More

    Submitted 17 October, 2016; v1 submitted 23 May, 2016; originally announced May 2016.

    Comments: To appear in NIPS '16; Video results, code, and data available at: http://www.sites.google.com/site/robotprediction

  43. arXiv:1605.02688  [pdf, other

    cs.SC cs.LG cs.MS

    Theano: A Python framework for fast computation of mathematical expressions

    Authors: The Theano Development Team, Rami Al-Rfou, Guillaume Alain, Amjad Almahairi, Christof Angermueller, Dzmitry Bahdanau, Nicolas Ballas, Frédéric Bastien, Justin Bayer, Anatoly Belikov, Alexander Belopolsky, Yoshua Bengio, Arnaud Bergeron, James Bergstra, Valentin Bisson, Josh Bleecher Snyder, Nicolas Bouchard, Nicolas Boulanger-Lewandowski, Xavier Bouthillier, Alexandre de Brébisson, Olivier Breuleux, Pierre-Luc Carrier, Kyunghyun Cho, Jan Chorowski, Paul Christiano , et al. (88 additional authors not shown)

    Abstract: Theano is a Python library that allows to define, optimize, and evaluate mathematical expressions involving multi-dimensional arrays efficiently. Since its introduction, it has been one of the most used CPU and GPU mathematical compilers - especially in the machine learning community - and has shown steady performance improvements. Theano is being actively and continuously developed since 2008, mu… ▽ More

    Submitted 9 May, 2016; originally announced May 2016.

    Comments: 19 pages, 5 figures

  44. arXiv:1604.04326  [pdf, other

    cs.CV cs.LG

    Improving the Robustness of Deep Neural Networks via Stability Training

    Authors: Stephan Zheng, Yang Song, Thomas Leung, Ian Goodfellow

    Abstract: In this paper we address the issue of output instability of deep neural networks: small perturbations in the visual input can significantly distort the feature embeddings and output of a neural network. Such instability affects many deep architectures with state-of-the-art performance on a wide range of computer vision tasks. We present a general stability training method to stabilize deep network… ▽ More

    Submitted 14 April, 2016; originally announced April 2016.

    Comments: Published in CVPR 2016

  45. arXiv:1603.04467  [pdf, other

    cs.DC cs.LG

    TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems

    Authors: Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mane, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah , et al. (15 additional authors not shown)

    Abstract: TensorFlow is an interface for expressing machine learning algorithms, and an implementation for executing such algorithms. A computation expressed using TensorFlow can be executed with little or no change on a wide variety of heterogeneous systems, ranging from mobile devices such as phones and tablets up to large-scale distributed systems of hundreds of machines and thousands of computational de… ▽ More

    Submitted 16 March, 2016; v1 submitted 14 March, 2016; originally announced March 2016.

    Comments: Version 2 updates only the metadata, to correct the formatting of Martín Abadi's name

  46. arXiv:1602.02697  [pdf, other

    cs.CR cs.LG

    Practical Black-Box Attacks against Machine Learning

    Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z. Berkay Celik, Ananthram Swami

    Abstract: Machine learning (ML) models, e.g., deep neural networks (DNNs), are vulnerable to adversarial examples: malicious inputs modified to yield erroneous model outputs, while appearing unmodified to human observers. Potential attacks include having malicious content like malware identified as legitimate or controlling vehicle behavior. Yet, all existing adversarial example attacks require knowledge of… ▽ More

    Submitted 19 March, 2017; v1 submitted 8 February, 2016; originally announced February 2016.

    Comments: Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE

  47. arXiv:1511.05644  [pdf, other

    cs.LG

    Adversarial Autoencoders

    Authors: Alireza Makhzani, Jonathon Shlens, Navdeep Jaitly, Ian Goodfellow, Brendan Frey

    Abstract: In this paper, we propose the "adversarial autoencoder" (AAE), which is a probabilistic autoencoder that uses the recently proposed generative adversarial networks (GAN) to perform variational inference by matching the aggregated posterior of the hidden code vector of the autoencoder with an arbitrary prior distribution. Matching the aggregated posterior to the prior ensures that generating from a… ▽ More

    Submitted 24 May, 2016; v1 submitted 17 November, 2015; originally announced November 2015.

  48. arXiv:1511.05641  [pdf, other

    cs.LG

    Net2Net: Accelerating Learning via Knowledge Transfer

    Authors: Tianqi Chen, Ian Goodfellow, Jonathon Shlens

    Abstract: We introduce techniques for rapidly transferring the information stored in one neural net into another neural net. The main purpose is to accelerate the training of a significantly larger neural net. During real-world workflows, one often trains very many different neural networks during the experimentation and design process. This is a wasteful process in which each new model is trained from scra… ▽ More

    Submitted 23 April, 2016; v1 submitted 17 November, 2015; originally announced November 2015.

    Comments: ICLR 2016 submission

  49. arXiv:1510.01799  [pdf, ps, other

    stat.ML cs.LG

    Efficient Per-Example Gradient Computations

    Authors: Ian Goodfellow

    Abstract: This technical report describes an efficient technique for computing the norm of the gradient of the loss function for a neural network with respect to its parameters. This gradient norm can be computed efficiently for every example.

    Submitted 9 October, 2015; v1 submitted 6 October, 2015; originally announced October 2015.

    Comments: This revision fixed some typos. Many thanks to Hugo Larochelle for reporting them!

  50. arXiv:1412.6572  [pdf, other

    stat.ML cs.LG

    Explaining and Harnessing Adversarial Examples

    Authors: Ian J. Goodfellow, Jonathon Shlens, Christian Szegedy

    Abstract: Several machine learning models, including neural networks, consistently misclassify adversarial examples---inputs formed by applying small but intentionally worst-case perturbations to examples from the dataset, such that the perturbed input results in the model outputting an incorrect answer with high confidence. Early attempts at explaining this phenomenon focused on nonlinearity and overfittin… ▽ More

    Submitted 20 March, 2015; v1 submitted 19 December, 2014; originally announced December 2014.