firstbacksecondback
8 Results
Affinity Workshop
|
Mon 8:35 |
Adversarial Examples Beyond Security Hadi Salman |
|
Poster
|
Thu 8:45 |
Adversarial Examples Are Not Real Features Ang Li · Yifei Wang · Yiwen Guo · Yisen Wang |
|
Poster
|
Tue 8:45 |
Adversarial Examples Exist in Two-Layer ReLU Networks for Low Dimensional Linear Subspaces Odelia Melamed · Gilad Yehudai · Gal Vardi |
|
Poster
|
Wed 8:45 |
Eliminating Catastrophic Overfitting Via Abnormal Adversarial Examples Regularization Runqi Lin · Chaojian Yu · Tongliang Liu |
|
Poster
|
Wed 8:45 |
Adversarial Examples Might be Avoidable: The Role of Data Concentration in Adversarial Robustness Ambar Pal · Jeremias Sulam · Rene Vidal |
|
Poster
|
Thu 15:00 |
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Shaokui Wei · Mingda Zhang · Hongyuan Zha · Baoyuan Wu |
|
Workshop
|
Fooling GPT with adversarial in-context examples for text classification Sudhanshu Ranjan · Chung-En Sun · Linbo Liu · Lily Weng |
||
Workshop
|
Tensor Trust: Interpretable Prompt Injection Attacks from an Online Game Sam Toyer · Olivia Watkins · Ethan Mendes · Justin Svegliato · Luke Bailey · Tiffany Wang · Isaac Ong · Karim Elmaaroufi · Pieter Abbeel · Trevor Darrell · Alan Ritter · Stuart J Russell |