Search Results for author: Ram Shankar Siva Kumar

Found 10 papers, 1 papers with code

Adversarial Machine Learning and Cybersecurity: Risks, Challenges, and Legal Implications

no code implementations23 May 2023 Micah Musser, Andrew Lohn, James X. Dempsey, Jonathan Spring, Ram Shankar Siva Kumar, Brenda Leong, Christina Liaghati, Cindy Martinez, Crystal D. Grant, Daniel Rohrer, Heather Frase, Jonathan Elliott, John Bansemer, Mikel Rodriguez, Mitt Regan, Rumman Chowdhury, Stefan Hermanek

In July 2022, the Center for Security and Emerging Technology (CSET) at Georgetown University and the Program on Geopolitics, Technology, and Governance at the Stanford Cyber Policy Center convened a workshop of experts to examine the relationship between vulnerabilities in artificial intelligence systems and more traditional types of software vulnerabilities.

Management

Adversarial for Good? How the Adversarial ML Community's Values Impede Socially Beneficial Uses of Attacks

no code implementations ICML Workshop AML 2021 Kendra Albert, Maggie Delano, Bogdan Kulynych, Ram Shankar Siva Kumar

In this paper, we review the broader impact statements that adversarial ML researchers wrote as part of their NeurIPS 2020 papers and assess the assumptions that authors have about the goals of their work.

Ethical Testing in the Real World: Evaluating Physical Testing of Adversarial Machine Learning

no code implementations3 Dec 2020 Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Rigot, Ram Shankar Siva Kumar

This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects.

Computers and Society

Legal Risks of Adversarial Machine Learning Research

no code implementations29 Jun 2020 Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

Adversarial Machine Learning is booming with ML researchers increasingly targeting commercial ML systems such as those used in Facebook, Tesla, Microsoft, IBM, Google to demonstrate vulnerabilities.

BIG-bench Machine Learning

Adversarial Machine Learning -- Industry Perspectives

no code implementations4 Feb 2020 Ram Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia

Based on interviews with 28 organizations, we found that industry practitioners are not equipped with tactical and strategic tools to protect, detect and respond to attacks on their Machine Learning (ML) systems.

BIG-bench Machine Learning

Politics of Adversarial Machine Learning

no code implementations1 Feb 2020 Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems.

BIG-bench Machine Learning

Failure Modes in Machine Learning Systems

2 code implementations25 Nov 2019 Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover

In the last two years, more than 200 papers have been written on how machine learning (ML) systems can fail because of adversarial attacks on the algorithms and data; this number balloons if we were to incorporate papers covering non-adversarial failure modes.

BIG-bench Machine Learning

Law and Adversarial Machine Learning

no code implementations25 Oct 2018 Ram Shankar Siva Kumar, David R. O'Brien, Kendra Albert, Salome Vilojen

When machine learning systems fail because of adversarial manipulation, how should society expect the law to respond?

BIG-bench Machine Learning

Hardening Quantum Machine Learning Against Adversaries

no code implementations17 Nov 2017 Nathan Wiebe, Ram Shankar Siva Kumar

Finally, we provide a private form of $k$--means clustering that can be used to prevent an all powerful adversary from learning more than a small fraction of a bit from any user.

BIG-bench Machine Learning Clustering +1

Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward

no code implementations20 Sep 2017 Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann

Operationalizing machine learning based security detections is extremely challenging, especially in a continuously evolving cloud environment.

Anomaly Detection BIG-bench Machine Learning +1

Cannot find the paper you are looking for? You can Submit a new open access paper.