BibTeX records: Anish Athalye

download as .bib file

@inproceedings{DBLP:conf/kisv/AthalyeKZT23,
  author       = {Anish Athalye and
                  M. Frans Kaashoek and
                  Nickolai Zeldovich and
                  Joseph Tassarotti},
  title        = {The {K2} Architecture for Trustworthy Hardware Security Modules},
  booktitle    = {Proceedings of the 1st Workshop on Kernel Isolation, Safety and Verification,
                  {KISV} 2023, Koblenz, Germany, 23 October 2023},
  pages        = {26--32},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3625275.3625402},
  doi          = {10.1145/3625275.3625402},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kisv/AthalyeKZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/AthalyeKZ22,
  author       = {Anish Athalye and
                  M. Frans Kaashoek and
                  Nickolai Zeldovich},
  editor       = {Marcos K. Aguilera and
                  Hakim Weatherspoon},
  title        = {Verifying Hardware Security Modules with Information-Preserving Refinement},
  booktitle    = {16th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2022, Carlsbad, CA, USA, July 11-13, 2022},
  pages        = {503--519},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/osdi22/presentation/athalye},
  timestamp    = {Tue, 11 Oct 2022 16:51:12 +0200},
  biburl       = {https://dblp.org/rec/conf/osdi/AthalyeKZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/NorthcuttAM21,
  author       = {Curtis G. Northcutt and
                  Anish Athalye and
                  Jonas Mueller},
  editor       = {Joaquin Vanschoren and
                  Sai{-}Kit Yeung},
  title        = {Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks},
  booktitle    = {Proceedings of the Neural Information Processing Systems Track on
                  Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December
                  2021, virtual},
  year         = {2021},
  url          = {https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/f2217062e9a397a1dca429e7d70bc6ca-Abstract-round1.html},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/NorthcuttAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-14749,
  author       = {Curtis G. Northcutt and
                  Anish Athalye and
                  Jonas Mueller},
  title        = {Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks},
  journal      = {CoRR},
  volume       = {abs/2103.14749},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.14749},
  eprinttype    = {arXiv},
  eprint       = {2103.14749},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-14749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/AthalyeBKMZ20,
  author       = {Anish Athalye and
                  Adam Belay and
                  M. Frans Kaashoek and
                  Robert Tappan Morris and
                  Nickolai Zeldovich},
  title        = {Notary: {A} Device for Secure Transaction Approval},
  journal      = {GetMobile Mob. Comput. Commun.},
  volume       = {24},
  number       = {2},
  pages        = {34--38},
  year         = {2020},
  url          = {https://doi.org/10.1145/3427384.3427395},
  doi          = {10.1145/3427384.3427395},
  timestamp    = {Wed, 04 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmobile/AthalyeBKMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/AthalyeBKMZ20,
  author       = {Anish Athalye and
                  Adam Belay and
                  M. Frans Kaashoek and
                  Robert Tappan Morris and
                  Nickolai Zeldovich},
  title        = {Notary: {A} Device for Secure Transaction Approval},
  journal      = {login Usenix Mag.},
  volume       = {45},
  number       = {1},
  year         = {2020},
  url          = {https://www.usenix.org/publications/login/mar20/athalye},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/AthalyeBKMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/AthalyeBKMZ19,
  author       = {Anish Athalye and
                  Adam Belay and
                  M. Frans Kaashoek and
                  Robert Tappan Morris and
                  Nickolai Zeldovich},
  editor       = {Tim Brecht and
                  Carey Williamson},
  title        = {Notary: a device for secure transaction approval},
  booktitle    = {Proceedings of the 27th {ACM} Symposium on Operating Systems Principles,
                  {SOSP} 2019, Huntsville, ON, Canada, October 27-30, 2019},
  pages        = {97--113},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3341301.3359661},
  doi          = {10.1145/3341301.3359661},
  timestamp    = {Tue, 19 Nov 2019 12:45:13 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/AthalyeBKMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-06705,
  author       = {Nicholas Carlini and
                  Anish Athalye and
                  Nicolas Papernot and
                  Wieland Brendel and
                  Jonas Rauber and
                  Dimitris Tsipras and
                  Ian J. Goodfellow and
                  Aleksander Madry and
                  Alexey Kurakin},
  title        = {On Evaluating Adversarial Robustness},
  journal      = {CoRR},
  volume       = {abs/1902.06705},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.06705},
  eprinttype    = {arXiv},
  eprint       = {1902.06705},
  timestamp    = {Tue, 21 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-06705.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/AthalyeC018,
  author       = {Anish Athalye and
                  Nicholas Carlini and
                  David A. Wagner},
  editor       = {Jennifer G. Dy and
                  Andreas Krause},
  title        = {Obfuscated Gradients Give a False Sense of Security: Circumventing
                  Defenses to Adversarial Examples},
  booktitle    = {Proceedings of the 35th International Conference on Machine Learning,
                  {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
                  10-15, 2018},
  series       = {Proceedings of Machine Learning Research},
  volume       = {80},
  pages        = {274--283},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v80/athalye18a.html},
  timestamp    = {Wed, 03 Apr 2019 18:17:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/AthalyeC018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/AthalyeEIK18,
  author       = {Anish Athalye and
                  Logan Engstrom and
                  Andrew Ilyas and
                  Kevin Kwok},
  editor       = {Jennifer G. Dy and
                  Andreas Krause},
  title        = {Synthesizing Robust Adversarial Examples},
  booktitle    = {Proceedings of the 35th International Conference on Machine Learning,
                  {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
                  10-15, 2018},
  series       = {Proceedings of Machine Learning Research},
  volume       = {80},
  pages        = {284--293},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v80/athalye18b.html},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/AthalyeEIK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/IlyasEAL18,
  author       = {Andrew Ilyas and
                  Logan Engstrom and
                  Anish Athalye and
                  Jessy Lin},
  editor       = {Jennifer G. Dy and
                  Andreas Krause},
  title        = {Black-box Adversarial Attacks with Limited Queries and Information},
  booktitle    = {Proceedings of the 35th International Conference on Machine Learning,
                  {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
                  10-15, 2018},
  series       = {Proceedings of Machine Learning Research},
  volume       = {80},
  pages        = {2142--2151},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v80/ilyas18a.html},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/IlyasEAL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-00420,
  author       = {Anish Athalye and
                  Nicholas Carlini and
                  David A. Wagner},
  title        = {Obfuscated Gradients Give a False Sense of Security: Circumventing
                  Defenses to Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1802.00420},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.00420},
  eprinttype    = {arXiv},
  eprint       = {1802.00420},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-00420.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-03286,
  author       = {Anish Athalye and
                  Nicholas Carlini},
  title        = {On the Robustness of the {CVPR} 2018 White-Box Adversarial Example
                  Defenses},
  journal      = {CoRR},
  volume       = {abs/1804.03286},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.03286},
  eprinttype    = {arXiv},
  eprint       = {1804.03286},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-03286.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-08598,
  author       = {Andrew Ilyas and
                  Logan Engstrom and
                  Anish Athalye and
                  Jessy Lin},
  title        = {Black-box Adversarial Attacks with Limited Queries and Information},
  journal      = {CoRR},
  volume       = {abs/1804.08598},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.08598},
  eprinttype    = {arXiv},
  eprint       = {1804.08598},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-08598.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1807-10272,
  author       = {Logan Engstrom and
                  Andrew Ilyas and
                  Anish Athalye},
  title        = {Evaluating and Understanding the Robustness of Adversarial Logit Pairing},
  journal      = {CoRR},
  volume       = {abs/1807.10272},
  year         = {2018},
  url          = {http://arxiv.org/abs/1807.10272},
  eprinttype    = {arXiv},
  eprint       = {1807.10272},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1807-10272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AthalyeS17,
  author       = {Anish Athalye and
                  Logan Engstrom and
                  Andrew Ilyas and
                  Kevin Kwok},
  title        = {Synthesizing Robust Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1707.07397},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.07397},
  eprinttype    = {arXiv},
  eprint       = {1707.07397},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AthalyeS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1712-07113,
  author       = {Andrew Ilyas and
                  Logan Engstrom and
                  Anish Athalye and
                  Jessy Lin},
  title        = {Query-Efficient Black-box Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1712.07113},
  year         = {2017},
  url          = {http://arxiv.org/abs/1712.07113},
  eprinttype    = {arXiv},
  eprint       = {1712.07113},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1712-07113.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics