Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Anish Athalye
@inproceedings{DBLP:conf/kisv/AthalyeKZT23, author = {Anish Athalye and M. Frans Kaashoek and Nickolai Zeldovich and Joseph Tassarotti}, title = {The {K2} Architecture for Trustworthy Hardware Security Modules}, booktitle = {Proceedings of the 1st Workshop on Kernel Isolation, Safety and Verification, {KISV} 2023, Koblenz, Germany, 23 October 2023}, pages = {26--32}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3625275.3625402}, doi = {10.1145/3625275.3625402}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kisv/AthalyeKZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/AthalyeKZ22, author = {Anish Athalye and M. Frans Kaashoek and Nickolai Zeldovich}, editor = {Marcos K. Aguilera and Hakim Weatherspoon}, title = {Verifying Hardware Security Modules with Information-Preserving Refinement}, booktitle = {16th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2022, Carlsbad, CA, USA, July 11-13, 2022}, pages = {503--519}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/osdi22/presentation/athalye}, timestamp = {Tue, 11 Oct 2022 16:51:12 +0200}, biburl = {https://dblp.org/rec/conf/osdi/AthalyeKZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/NorthcuttAM21, author = {Curtis G. Northcutt and Anish Athalye and Jonas Mueller}, editor = {Joaquin Vanschoren and Sai{-}Kit Yeung}, title = {Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks}, booktitle = {Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, NeurIPS Datasets and Benchmarks 2021, December 2021, virtual}, year = {2021}, url = {https://datasets-benchmarks-proceedings.neurips.cc/paper/2021/hash/f2217062e9a397a1dca429e7d70bc6ca-Abstract-round1.html}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/NorthcuttAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14749, author = {Curtis G. Northcutt and Anish Athalye and Jonas Mueller}, title = {Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks}, journal = {CoRR}, volume = {abs/2103.14749}, year = {2021}, url = {https://arxiv.org/abs/2103.14749}, eprinttype = {arXiv}, eprint = {2103.14749}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmobile/AthalyeBKMZ20, author = {Anish Athalye and Adam Belay and M. Frans Kaashoek and Robert Tappan Morris and Nickolai Zeldovich}, title = {Notary: {A} Device for Secure Transaction Approval}, journal = {GetMobile Mob. Comput. Commun.}, volume = {24}, number = {2}, pages = {34--38}, year = {2020}, url = {https://doi.org/10.1145/3427384.3427395}, doi = {10.1145/3427384.3427395}, timestamp = {Wed, 04 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmobile/AthalyeBKMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/AthalyeBKMZ20, author = {Anish Athalye and Adam Belay and M. Frans Kaashoek and Robert Tappan Morris and Nickolai Zeldovich}, title = {Notary: {A} Device for Secure Transaction Approval}, journal = {login Usenix Mag.}, volume = {45}, number = {1}, year = {2020}, url = {https://www.usenix.org/publications/login/mar20/athalye}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/AthalyeBKMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/AthalyeBKMZ19, author = {Anish Athalye and Adam Belay and M. Frans Kaashoek and Robert Tappan Morris and Nickolai Zeldovich}, editor = {Tim Brecht and Carey Williamson}, title = {Notary: a device for secure transaction approval}, booktitle = {Proceedings of the 27th {ACM} Symposium on Operating Systems Principles, {SOSP} 2019, Huntsville, ON, Canada, October 27-30, 2019}, pages = {97--113}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3341301.3359661}, doi = {10.1145/3341301.3359661}, timestamp = {Tue, 19 Nov 2019 12:45:13 +0100}, biburl = {https://dblp.org/rec/conf/sosp/AthalyeBKMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-06705, author = {Nicholas Carlini and Anish Athalye and Nicolas Papernot and Wieland Brendel and Jonas Rauber and Dimitris Tsipras and Ian J. Goodfellow and Aleksander Madry and Alexey Kurakin}, title = {On Evaluating Adversarial Robustness}, journal = {CoRR}, volume = {abs/1902.06705}, year = {2019}, url = {http://arxiv.org/abs/1902.06705}, eprinttype = {arXiv}, eprint = {1902.06705}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-06705.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/AthalyeC018, author = {Anish Athalye and Nicholas Carlini and David A. Wagner}, editor = {Jennifer G. Dy and Andreas Krause}, title = {Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples}, booktitle = {Proceedings of the 35th International Conference on Machine Learning, {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July 10-15, 2018}, series = {Proceedings of Machine Learning Research}, volume = {80}, pages = {274--283}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v80/athalye18a.html}, timestamp = {Wed, 03 Apr 2019 18:17:30 +0200}, biburl = {https://dblp.org/rec/conf/icml/AthalyeC018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/AthalyeEIK18, author = {Anish Athalye and Logan Engstrom and Andrew Ilyas and Kevin Kwok}, editor = {Jennifer G. Dy and Andreas Krause}, title = {Synthesizing Robust Adversarial Examples}, booktitle = {Proceedings of the 35th International Conference on Machine Learning, {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July 10-15, 2018}, series = {Proceedings of Machine Learning Research}, volume = {80}, pages = {284--293}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v80/athalye18b.html}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/AthalyeEIK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/IlyasEAL18, author = {Andrew Ilyas and Logan Engstrom and Anish Athalye and Jessy Lin}, editor = {Jennifer G. Dy and Andreas Krause}, title = {Black-box Adversarial Attacks with Limited Queries and Information}, booktitle = {Proceedings of the 35th International Conference on Machine Learning, {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July 10-15, 2018}, series = {Proceedings of Machine Learning Research}, volume = {80}, pages = {2142--2151}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v80/ilyas18a.html}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/IlyasEAL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-00420, author = {Anish Athalye and Nicholas Carlini and David A. Wagner}, title = {Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples}, journal = {CoRR}, volume = {abs/1802.00420}, year = {2018}, url = {http://arxiv.org/abs/1802.00420}, eprinttype = {arXiv}, eprint = {1802.00420}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-00420.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-03286, author = {Anish Athalye and Nicholas Carlini}, title = {On the Robustness of the {CVPR} 2018 White-Box Adversarial Example Defenses}, journal = {CoRR}, volume = {abs/1804.03286}, year = {2018}, url = {http://arxiv.org/abs/1804.03286}, eprinttype = {arXiv}, eprint = {1804.03286}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-03286.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-08598, author = {Andrew Ilyas and Logan Engstrom and Anish Athalye and Jessy Lin}, title = {Black-box Adversarial Attacks with Limited Queries and Information}, journal = {CoRR}, volume = {abs/1804.08598}, year = {2018}, url = {http://arxiv.org/abs/1804.08598}, eprinttype = {arXiv}, eprint = {1804.08598}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-08598.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-10272, author = {Logan Engstrom and Andrew Ilyas and Anish Athalye}, title = {Evaluating and Understanding the Robustness of Adversarial Logit Pairing}, journal = {CoRR}, volume = {abs/1807.10272}, year = {2018}, url = {http://arxiv.org/abs/1807.10272}, eprinttype = {arXiv}, eprint = {1807.10272}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-10272.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AthalyeS17, author = {Anish Athalye and Logan Engstrom and Andrew Ilyas and Kevin Kwok}, title = {Synthesizing Robust Adversarial Examples}, journal = {CoRR}, volume = {abs/1707.07397}, year = {2017}, url = {http://arxiv.org/abs/1707.07397}, eprinttype = {arXiv}, eprint = {1707.07397}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AthalyeS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-07113, author = {Andrew Ilyas and Logan Engstrom and Anish Athalye and Jessy Lin}, title = {Query-Efficient Black-box Adversarial Examples}, journal = {CoRR}, volume = {abs/1712.07113}, year = {2017}, url = {http://arxiv.org/abs/1712.07113}, eprinttype = {arXiv}, eprint = {1712.07113}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-07113.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.