Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples A Athalye, N Carlini, D Wagner 35th International Conference on Machine Learning, 274-283, 2018 | 3623 | 2018 |
Synthesizing Robust Adversarial Examples A Athalye, L Engstrom, A Ilyas, K Kwok 35th International Conference on Machine Learning, 284-293, 2017 | 2009 | 2017 |
Black-box Adversarial Attacks with Limited Queries and Information A Ilyas, L Engstrom, A Athalye, J Lin 35th International Conference on Machine Learning, 2137-2146, 2018 | 1437 | 2018 |
On Evaluating Adversarial Robustness N Carlini, A Athalye, N Papernot, W Brendel, J Rauber, D Tsipras, ... arXiv preprint arXiv:1902.06705, 2019 | 1042 | 2019 |
Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks CG Northcutt, A Athalye, J Mueller 35th Conference on Neural Information Processing Systems Track on Datasets …, 2021 | 613 | 2021 |
On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses A Athalye, N Carlini The Bright and Dark Sides of Computer Vision: Challenges and Opportunities …, 2018 | 197 | 2018 |
Evaluating and Understanding the Robustness of Adversarial Logit Pairing L Engstrom, A Ilyas, A Athalye NeurIPS 2018 Workshop on Security in Machine Learning, 2018 | 147 | 2018 |
pASSWORD tYPOS and How to Correct Them Securely R Chatterjee, A Athalye, D Akhawe, A Juels, T Ristenpart 37th IEEE Symposium on Security and Privacy, 2016 | 72 | 2016 |
Notary: A Device for Secure Transaction Approval A Athalye, A Belay, MF Kaashoek, R Morris, N Zeldovich 27th ACM Symposium on Operating Systems Principles, 97-113, 2019 | 36 | 2019 |
Verifying Hardware Security Modules with Information-Preserving Refinement A Athalye, MF Kaashoek, N Zeldovich 16th USENIX Symposium on Operating Systems Design and Implementation, 503-519, 2022 | 25 | 2022 |
Inverting PhotoDNA A Athalye https://anishathalye.com/inverting-photodna/, 2021 | 10* | 2021 |
NeuralHash Collider A Athalye https://github.com/anishathalye/neural-hash-collider, 2021 | 8* | 2021 |
CoqIOA: A Formalization of IO Automata in the Coq Proof Assistant A Athalye Massachusetts Institute of Technology, 2017 | 5 | 2017 |
Porcupine: A fast linearizability checker in Go A Athalye https://github.com/anishathalye/porcupine, 2017 | 3 | 2017 |
Neural Style A Athalye https://github.com/anishathalye/neural-style, 2015 | 3 | 2015 |
Formally Verifying Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation A Athalye Massachusetts Institute of Technology, 2024 | 2 | 2024 |
Gavel A Athalye https://github.com/anishathalye/gavel, 2016 | 2 | 2016 |
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation A Athalye, H Corrigan-Gibbs, MF Kaashoek, J Tassarotti, N Zeldovich 30th ACM Symposium on Operating Systems Principles, 2024 | 1* | 2024 |
The K2 Architecture for Trustworthy Hardware Security Modules A Athalye, F Kaashoek, N Zeldovich, J Tassarotti 1st Workshop on Kernel Isolation, Safety and Verification, 26-32, 2023 | 1 | 2023 |
Leakage models are a leaky abstraction: the case for cycle-level verification of constant-time cryptography A Athalye, MF Kaashoek, N Zeldovich, J Tassarotti 1st Workshop on Programming Languages and Computer Architecture, 2023 | 1 | 2023 |