Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nicholas Carlini is active.

Publication


Featured researches published by Nicholas Carlini.


arXiv: Learning | 2017

Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods

Nicholas Carlini; David A. Wagner

Neural networks are known to be vulnerable to adversarial examples: inputs that are close to natural inputs but classified incorrectly. In order to better understand the space of adversarial examples, we survey ten recent proposals that are designed for detection and compare their efficacy. We show that all can be defeated by constructing new loss functions. We conclude that adversarial examples are significantly harder to detect than previously appreciated, and the properties believed to be intrinsic to adversarial examples are in fact not. Finally, we propose several simple guidelines for evaluating future proposed defenses.


ieee symposium on security and privacy | 2017

Towards Evaluating the Robustness of Neural Networks

Nicholas Carlini; David A. Wagner


usenix security symposium | 2014

ROP is still dangerous: breaking modern defenses

Nicholas Carlini; David A. Wagner


usenix security symposium | 2015

Control-flow bending: on the effectiveness of control-flow integrity

Nicholas Carlini; Antonio Barresi; Mathias Payer; David A. Wagner; Thomas R. Gross


usenix security symposium | 2016

Hidden Voice Commands

Nicholas Carlini; Pratyush Mishra; Tavish Vaidya; Yuankai Zhang; Micah Sherr; Clay Shields; David A. Wagner; Wenchao Zhou


usenix security symposium | 2012

An evaluation of the Google Chrome extension security architecture

Nicholas Carlini; Adrienne Porter Felt; David A. Wagner


international conference on machine learning | 2018

Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples

Anish Athalye; Nicholas Carlini; David A. Wagner


arXiv: Cryptography and Security | 2016

Defensive Distillation is Not Robust to Adversarial Examples.

Nicholas Carlini; David A. Wagner


arXiv: Learning | 2017

Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong.

Warren He; James Wei; Xinyun Chen; Nicholas Carlini; Dawn Song


ieee symposium on security and privacy | 2018

Audio Adversarial Examples: Targeted Attacks on Speech-to-Text

Nicholas Carlini; David A. Wagner

Collaboration


Dive into the Nicholas Carlini's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anish Athalye

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dawn Song

University of California

View shared research outputs
Top Co-Authors

Avatar

Eric S. Kim

University of California

View shared research outputs
Top Co-Authors

Avatar

Kai Wang

University of California

View shared research outputs
Top Co-Authors

Avatar

Guy Katz

Weizmann Institute of Science

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge