in machine learning
play

in Machine Learning Nicholas Carlini University of California, - PowerPoint PPT Presentation

Security (and Privacy) in Machine Learning Nicholas Carlini University of California, Berkeley (now Google Brain) This talk: neural networks Machine learning is amazing But there's a catch Understandability This talk: Discuss security


  1. Security (and Privacy) 
 in Machine Learning Nicholas Carlini University of California, Berkeley (now Google Brain)

  2. This talk: neural networks

  3. Machine learning is amazing But there's a catch

  4. Understandability

  5. This talk: Discuss security & privacy problems being studied in the research community

  6. What this talk is not

  7. What this talk is not

  8. What this talk is

  9. What are the security problems in machine learning today?

  10. French Bulldog (95%)

  11. Old English Sheepdog (83%)

  12. Greater Swiss Mountain Dog (78%)

  13. Siberian Husky (81%)

  14. Great Dane (67%)

  15. Beagle (96%)

  16. Guacamole (99.99%)

  17. Golden 
 Retriever (96%)

  18. Guacamole (99.99%)

  19. These phenomena are known as adversarial examples B. Biggio, I. Corona, D. Maiorca, B. Nelson, N. Srndic, P. Laskov, G. Giacinto, and F. Roli. Evasion attacks against machine learning at test time. 2013. C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus. Intriguing properties of neural networks. ICLR 2014. I. Goodfellow, J. Shlens, and C. Szegedy. Explaining and harnessing adversarial examples. 2014.

  20. What does this have to do with voice?

  21. We use these same classification approaches for speech recognition.

  22. Attacks on Android, circa 2015

  23. State-of-the-art in 2015

  24. It's been three years. Can we do better?

  25. Feynman Algorithm 1. Write down the problem. 2. Think very hard. 3. Write down the answer.

  26. Mozilla's DeepSpeech

  27. Mozilla's DeepSpeech transcribes this as "most of them were staring 
 quietly at the big table"

  28. Mozilla's DeepSpeech transcribes this as "most of them were staring 
 quietly at the big table"

  29. [adversarial]

  30. "It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity"

  31. Why is this so much stealthier?

  32. It works on music, too DeepSpeech transcribes "speech can be embedded in music"

  33. And can "hide" speech DeepSpeech does not hear any speech in this audio sample

  34. That's a lot of problems Do you have any solutions?

  35. Sorry, no. This is an active area of research. Ask me again in two years.

  36. Yes, machine learning gives amazing results

  37. However, there are 
 also significant 
 vulnerabilities Guacamole (99%)

  38. Questions? More Details: https://nicholas.carlini.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend