Skip to content

Commit

Permalink
first draft of lecture 4
Browse files Browse the repository at this point in the history
  • Loading branch information
jphall663 committed Jun 2, 2020
1 parent b175247 commit 468b91c
Show file tree
Hide file tree
Showing 10 changed files with 523 additions and 0 deletions.
Binary file added img/adversary.PNG
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified img/blueprint.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added img/imperson.PNG
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added img/inversion.PNG
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added img/membership.PNG
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added img/poison.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added img/watermark.PNG
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
74 changes: 74 additions & 0 deletions tex/lecture_4.bib
Original file line number Diff line number Diff line change
@@ -0,0 +1,74 @@
@article{angwin16,
Author = {Julia Angwin and Jeff Larson and Surya Mattu and Lauren Kirchner},
Journal = {ProPublica},
Title = {{M}achine {B}ias: {T}here's {S}oftware {U}sed {A}cross the {C}ountry to {P}redict {F}uture {C}riminals. {A}nd {I}t's {B}iased {A}gainst {B}lacks.},
note = {URL: \url{https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing}},
Year = {2016}}

@article{security_of_ml,
title={The {S}ecurity of {M}achine {L}earning},
author={Barreno, Marco and Nelson, Blaine and Joseph, Anthony D and Tygar, J Doug},
journal={Machine Learning},
volume={81},
number={2},
pages={121--148},
year={2010},
publisher={Springer},
note={URL: \url{https://people.eecs.berkeley.edu/~adj/publications/paper-files/SecML-MLJ2010.pdf}}}

@article{flores2016false,
title={False {P}ositives, {F}alse {N}egatives, and {F}alse {A}nalyses: {A} {R}ejoinder to {M}achine {B}ias: {T}here's {S}oftware {U}sed across the {C}ountry to {P}redict {F}uture {C}riminals. {A}nd {I}t's {B}iased against {B}lacks},
author={Flores, Anthony W. and Bechtel, Kristin and Lowenkamp, Christopher T.},
journal={Fed. Probation},
volume={80},
pages={38},
year={2016},
publisher={HeinOnline},
note={URL: \url{https://bit.ly/2Gesf9Y}}}
@inproceedings{papernot2018marauder,
title={A {M}arauder's {M}ap of {S}ecurity and {P}rivacy in {M}achine {L}earning: {A}n overview of current and future research directions for making machine learning secure and private},
author={Papernot, Nicolas},
booktitle={Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security},
year={2018},
organization={ACM},
note={URL: \url{https://arxiv.org/pdf/1811.01134.pdf}}}

@article{pate,
title={Scalable {P}rivate {L}earning with {P}{A}{T}{E}},
author={Papernot, Nicolas and Song, Shuang and Mironov, Ilya and Raghunathan, Ananth and Talwar, Kunal and Erlingsson, {\'U}lfar},
journal={arXiv preprint arXiv:1802.08908},
year={2018},
note={URL: \url{https://arxiv.org/pdf/1802.08908.pdf}}}
@inproceedings{membership_inference,
title={Membership {I}nference {A}ttacks {A}gainst {M}achine {L}earning {M}odels},
author={Shokri, Reza and Stronati, Marco and Song, Congzheng and Shmatikov, Vitaly},
booktitle={2017 IEEE Symposium on Security and Privacy (SP)},
pages={3--18},
year={2017},
organization={IEEE},
note={URL: \url{https://arxiv.org/pdf/1610.05820.pdf}}}
@article{shokri2019privacy,
title={Privacy {R}isks of {E}xplaining {M}achine {L}earning {M}odels},
author={Shokri, Reza and Strobel, Martin and Zick, Yair},
journal={arXiv preprint arXiv:1907.00164},
year={2019},
note={URL: \url{https://arxiv.org/pdf/1907.00164.pdf}}}

@inproceedings{model_stealing,
title={Stealing {M}achine {L}earning {M}odels via {P}rediction {A}{P}{I}s},
author={Tram{\`e}r, Florian and Zhang, Fan and Juels, Ari and Reiter, Michael K and Ristenpart, Thomas},
booktitle={25th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 16)},
pages={601--618},
year={2016},
note={URL: \url{https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_tramer.pdf}}}

@inproceedings{lfr,
title={Learning {F}air {R}epresentations},
author={Zemel, Rich and Wu, Yu and Swersky, Kevin and Pitassi, Toni and Dwork, Cynthia},
booktitle={International Conference on Machine Learning},
pages={325--333},
year={2013},
note={URL: \url{http://proceedings.mlr.press/v28/zemel13.pdf}}}
Binary file added tex/lecture_4.pdf
Binary file not shown.
Loading

0 comments on commit 468b91c

Please sign in to comment.