Search Results for author: Abdullah Al-Dujaili

Found 13 papers, 6 papers with code

Min-Max Optimization without Gradients: Convergence and Applications to Black-Box Evasion and Poisoning Attacks

no code implementations ICML 2020 Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Mingyi Hong, Una-May O'Reilly

In this paper, we study the problem of constrained min-max optimization in a black-box setting, where the desired optimizer cannot access the gradients of the objective function but may query its values.

Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML

1 code implementation30 Sep 2019 Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Minyi Hong, Una-May O'Reilly

In this paper, we study the problem of constrained robust (min-max) optimization ina black-box setting, where the desired optimizer cannot access the gradients of the objective function but may query its values.

There are No Bit Parts for Sign Bits in Black-Box Attacks

no code implementations19 Feb 2019 Abdullah Al-Dujaili, Una-May O'Reilly

We present a black-box adversarial attack algorithm which sets new state-of-the-art model evasion rates for query efficiency in the $\ell_\infty$ and $\ell_2$ metrics, where only loss-oracle access to the model is available.

Adversarial Attack

AST-Based Deep Learning for Detecting Malicious PowerShell

no code implementations3 Oct 2018 Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly

With the celebrated success of deep learning, some attempts to develop effective methods for detecting malicious PowerShell programs employ neural nets in a traditional natural language processing setup while others employ convolutional neural nets to detect obfuscated malicious commands at a character level.

Towards Distributed Coevolutionary GANs

no code implementations21 Jul 2018 Abdullah Al-Dujaili, Tom Schmiedlechner, and Erik Hemberg, Una-May O'Reilly

Generative Adversarial Networks (GANs) have become one of the dominant methods for deep generative modeling.

On Visual Hallmarks of Robustness to Adversarial Malware

1 code implementation9 May 2018 Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

A central challenge of adversarial learning is to interpret the resulting hardened model.

Approximating Nash Equilibria for Black-Box Games: A Bayesian Optimization Approach

1 code implementation27 Apr 2018 Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly

Game theory has emerged as a powerful framework for modeling a large range of multi-agent scenarios.

Computer Science and Game Theory

Adversarial Deep Learning for Robust Detection of Binary Encoded Malware

2 code implementations9 Jan 2018 Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly

We are inspired by them to develop similar methods for the discrete, e. g. binary, domain which characterizes the features of malware.

Embedded Bandits for Large-Scale Black-Box Optimization

no code implementations27 Nov 2016 Abdullah Al-Dujaili, S. Suresh

In essence, the EmbeddedHunter algorithm expands optimistically a partitioning tree over a low-dimensional---equal to the effective dimension of the problem---search space based on a bounded number of random embeddings of sampled points from the low-dimensional space.

BMOBench: Black-Box Multi-Objective Optimization Benchmarking Platform

no code implementations23 May 2016 Abdullah Al-Dujaili, S. Suresh

This document briefly describes the Black-Box Multi-Objective Optimization Benchmarking (BMOBench) platform.

Benchmarking

Cannot find the paper you are looking for? You can Submit a new open access paper.