Roadmaps for risk mitigation
CtrlK
  • Risk mitigation roadmaps
  • Mitigation Roadmaps
    • Improving generalization through model validation
      • Step 1: Estimating generalization
      • Step 2: Model validation for hyperparameters tuning
      • Step 3: Performing algorithmic selection
      • Additional Material
    • Hyperparameter Optimisation
      • Step 1: Validation
      • Step 2: Hyperparameter Search
      • Additional Considerations
    • Handling dataset shift
      • Step 1: Understanding dataset shifts
      • Step 2: Detecting dataset shifts
      • Step 3: Handling dataset shifts
      • Additional Material
    • Adversarial training for robustness
      • Step 1: Understanding adversarial examples
      • Step 2: Finding adversarial examples
      • Step 3: Defending against adversarial examples
      • Additional Material
    • Data Minimization techniques
      • Step 1: Understanding the data minimization principle
      • Step 2: Data minimization techniques for Supervised Learning
        • Option 1: Reducing features
        • Option 2: Reducing data points
      • Step 3: Other privacy-preserving techniques
      • Additional Material
    • Measuring Bias and Discrimination
      • Step 1: Understanding bias
      • Step 2A: Measuring Bias for Classification tasks
        • Equality of Outcome metrics
        • Equality of Opportunity metrics
      • Step 2B: Measuring Bias in Regression tasks
        • Equality of Outcome metrics
        • Equality of Opportunity metrics
      • Additional Material
    • Mitigating Bias and Discrimination
      • Step 1: Understanding bias
      • Step 2: Mitigating Bias
        • Option 1: Pre-processing
        • Option 2: In-processing
        • Option 3: Post-Processing
      • Additional Material
    • Documentation for improved explainability of Machine Learning models
      • Step 1: Datasheets for Datasets
      • Step 2: Model Cards for Model Reporting
      • Additional Material
    • Extracting Explanations from Machine Learning Models
      • Step 1: Understanding algorithmic explainability
      • Step 2: In-processing methodologies for Explainability
      • Step 3: Post-processing methodologies for Explainability
      • Additional Material
Powered by GitBook
On this page
  • Reading
  • Tools
  1. Mitigation Roadmaps
  2. Adversarial training for robustness

Additional Material

Reading

Szegedy, Christian et al. "Intriguing properties of neural networks". ArXiv, 2018.

Bai, Tao et al. "Recent Advances in Adversarial Training for Adversarial Robustness". IJCAI, 2021.

Goodfellow, Ian et al. "Explaining and Harnessing Adversarial Examples". ICLR, 2015. (FGSM)

Madry, Aleksander et al. "Towards Deep Learning Models Resistant to Adversarial Attacks". ICLR, 2018. (PGD)

KDD tutorial on Adversarial Attacks and Defenses: Frontiers, Advances and Practice.

NuerIPS tutorial on Adversarial Robustness: Theory and Practice.

Tools

Adversarial Robustness Toolbox

CleverHans

DeepRobust

PreviousStep 3: Defending against adversarial examplesNextData Minimization techniques

Last updated 3 years ago