SECURITY, ADVERSARIAL SECURITY, ADVERSARIAL LEARNING, AND PRIVACY LEARNING, AND PRIVACY
Christian Kaestner with slides from Eunsuk Kang
Required reading: Hulten, Geoff. "Building Intelligent Systems: A Guide to Machine Learning Engineering." (2018), Chapter 25 (Adversaries and Abuse) Agrawal, A., Gans, J., & Goldfarb, A. (2018). . Harvard Business Press. Chapter 19 (Managing AI Risk) Recommended reading: Goodfellow, I., McDaniel, P., & Papernot, N. (2018). . Communications of the ACM, 61(7), 56-66. Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B. I., & Tygar, J. D. (2011, October). . In Proceedings of the 4th ACM workshop on Security and artificial intelligence (pp. 43-58). Prediction machines: the simple economics of artificial intelligence Making machine learning robust against adversarial inputs Adversarial machine learning
1