Academia

The document was issued by academy or academy organization.
file

Visible to the public Decentralized Optimization of Vehicle Route Planning

file

Visible to the public AICW - The Dangers of the Subconscious Mind (of Cyber Reasoning Systems)

ABSTRACT: Humans have goals, hopes, dreams, and fears. Humans are brilliant. They make incredible intuitive inferences. They conceptualize amazing algorithms to augment cybersecurity. But they can be misled; tricked; fooled into carrying out actions counter to their own best-interests.

file

Visible to the public Security Against Adversarial Examples

ABSTRACT
Recent research suggests that modern machine learning methods are fragile and easily attacked, which raises concerns about their use in security-critical settings. I will survey several attacks on machine learning and directions for making machine learning more robust against attack. I will also briefly mention my own research in this area.

file

Visible to the public End-to-end correctness theorems spanning software and hardware

Presented as part of the 2019 HCSS conference.