in Machine Learning Nicholas Carlini University of California, - - PowerPoint PPT Presentation

in machine learning
SMART_READER_LITE
LIVE PREVIEW

in Machine Learning Nicholas Carlini University of California, - - PowerPoint PPT Presentation

Security (and Privacy) in Machine Learning Nicholas Carlini University of California, Berkeley (now Google Brain) This talk: neural networks Machine learning is amazing But there's a catch Understandability This talk: Discuss security


slide-1
SLIDE 1

Security (and Privacy)
 in Machine Learning

Nicholas Carlini

University of California, Berkeley (now Google Brain)

slide-2
SLIDE 2

This talk: neural networks

slide-3
SLIDE 3
slide-4
SLIDE 4
slide-5
SLIDE 5
slide-6
SLIDE 6
slide-7
SLIDE 7

Machine learning is amazing But there's a catch

slide-8
SLIDE 8

Understandability

slide-9
SLIDE 9

This talk:

Discuss security & privacy problems being studied in the research community

slide-10
SLIDE 10

What this talk is not

slide-11
SLIDE 11

What this talk is not

slide-12
SLIDE 12

What this talk is

slide-13
SLIDE 13
slide-14
SLIDE 14

What are the security problems in machine learning today?

slide-15
SLIDE 15
slide-16
SLIDE 16

French Bulldog (95%)

slide-17
SLIDE 17

Old English Sheepdog (83%)

slide-18
SLIDE 18

Greater Swiss Mountain Dog (78%)

slide-19
SLIDE 19

Siberian Husky (81%)

slide-20
SLIDE 20

Great Dane (67%)

slide-21
SLIDE 21

Beagle (96%)

slide-22
SLIDE 22

Guacamole (99.99%)

slide-23
SLIDE 23

Golden
 Retriever (96%)

slide-24
SLIDE 24

Guacamole (99.99%)

slide-25
SLIDE 25

These phenomena are known as adversarial examples

  • B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. Srndic, P. Laskov, G. Giacinto, and F. Roli. Evasion attacks against machine learning at test time. 2013.
  • C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing properties of neural networks. ICLR 2014.
  • I. Goodfellow, J. Shlens, and C. Szegedy. Explaining and harnessing adversarial examples. 2014.
slide-26
SLIDE 26
slide-27
SLIDE 27
slide-28
SLIDE 28

What does this have to do with voice?

slide-29
SLIDE 29

We use these same classification approaches for speech recognition.

slide-30
SLIDE 30
slide-31
SLIDE 31

Attacks on Android, circa 2015

slide-32
SLIDE 32
slide-33
SLIDE 33
slide-34
SLIDE 34
slide-35
SLIDE 35

State-of-the-art in 2015

slide-36
SLIDE 36

It's been three years. Can we do better?

slide-37
SLIDE 37

Feynman Algorithm

  • 1. Write down the problem.
  • 2. Think very hard.
  • 3. Write down the answer.
slide-38
SLIDE 38
slide-39
SLIDE 39
slide-40
SLIDE 40

Mozilla's DeepSpeech

slide-41
SLIDE 41

Mozilla's DeepSpeech transcribes this as "most of them were staring
 quietly at the big table"

slide-42
SLIDE 42

Mozilla's DeepSpeech transcribes this as "most of them were staring
 quietly at the big table"

slide-43
SLIDE 43

[adversarial]

slide-44
SLIDE 44

"It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity"

slide-45
SLIDE 45

Why is this so much stealthier?

slide-46
SLIDE 46
slide-47
SLIDE 47

It works on music, too

DeepSpeech transcribes "speech can be embedded in music"

slide-48
SLIDE 48

And can "hide" speech

DeepSpeech does not hear any speech in this audio sample

slide-49
SLIDE 49
slide-50
SLIDE 50

That's a lot of problems Do you have any solutions?

slide-51
SLIDE 51

Sorry, no. This is an active area of research. Ask me again in two years.

slide-52
SLIDE 52
slide-53
SLIDE 53

Yes, machine learning gives amazing results

slide-54
SLIDE 54

Guacamole (99%)

However, there are
 also significant 
 vulnerabilities

slide-55
SLIDE 55

More Details: https://nicholas.carlini.com

Questions?