Certified Defenses for Data Poisoning Attacks. Steinhardt, J., Koh, P. W. W, & Liang, P. S In Guyon, I., Luxburg, U. V., Bengio, S., Wallach, H., Fergus, R., Vishwanathan, S., & Garnett, R., editors, Advances in Neural Information Processing Systems 30, pages 3517–3529. Curran Associates, Inc., 2017. Paper bibtex @incollection{steinhardt_certified_2017,
title = {Certified {Defenses} for {Data} {Poisoning} {Attacks}},
url = {http://papers.nips.cc/paper/6943-certified-defenses-for-data-poisoning-attacks.pdf},
urldate = {2019-07-22},
booktitle = {Advances in {Neural} {Information} {Processing} {Systems} 30},
publisher = {Curran Associates, Inc.},
author = {Steinhardt, Jacob and Koh, Pang Wei W and Liang, Percy S},
editor = {Guyon, I. and Luxburg, U. V. and Bengio, S. and Wallach, H. and Fergus, R. and Vishwanathan, S. and Garnett, R.},
year = {2017},
pages = {3517--3529},
}
Downloads: 0
{"_id":"LhoDHhiJAqr37gt7f","bibbaseid":"steinhardt-koh-liang-certifieddefensesfordatapoisoningattacks-2017","authorIDs":[],"author_short":["Steinhardt, J.","Koh, P. W. W","Liang, P. S"],"bibdata":{"bibtype":"incollection","type":"incollection","title":"Certified Defenses for Data Poisoning Attacks","url":"http://papers.nips.cc/paper/6943-certified-defenses-for-data-poisoning-attacks.pdf","urldate":"2019-07-22","booktitle":"Advances in Neural Information Processing Systems 30","publisher":"Curran Associates, Inc.","author":[{"propositions":[],"lastnames":["Steinhardt"],"firstnames":["Jacob"],"suffixes":[]},{"propositions":[],"lastnames":["Koh"],"firstnames":["Pang","Wei","W"],"suffixes":[]},{"propositions":[],"lastnames":["Liang"],"firstnames":["Percy","S"],"suffixes":[]}],"editor":[{"propositions":[],"lastnames":["Guyon"],"firstnames":["I."],"suffixes":[]},{"propositions":[],"lastnames":["Luxburg"],"firstnames":["U.","V."],"suffixes":[]},{"propositions":[],"lastnames":["Bengio"],"firstnames":["S."],"suffixes":[]},{"propositions":[],"lastnames":["Wallach"],"firstnames":["H."],"suffixes":[]},{"propositions":[],"lastnames":["Fergus"],"firstnames":["R."],"suffixes":[]},{"propositions":[],"lastnames":["Vishwanathan"],"firstnames":["S."],"suffixes":[]},{"propositions":[],"lastnames":["Garnett"],"firstnames":["R."],"suffixes":[]}],"year":"2017","pages":"3517–3529","bibtex":"@incollection{steinhardt_certified_2017,\n\ttitle = {Certified {Defenses} for {Data} {Poisoning} {Attacks}},\n\turl = {http://papers.nips.cc/paper/6943-certified-defenses-for-data-poisoning-attacks.pdf},\n\turldate = {2019-07-22},\n\tbooktitle = {Advances in {Neural} {Information} {Processing} {Systems} 30},\n\tpublisher = {Curran Associates, Inc.},\n\tauthor = {Steinhardt, Jacob and Koh, Pang Wei W and Liang, Percy S},\n\teditor = {Guyon, I. and Luxburg, U. V. and Bengio, S. and Wallach, H. and Fergus, R. and Vishwanathan, S. and Garnett, R.},\n\tyear = {2017},\n\tpages = {3517--3529},\n}\n\n","author_short":["Steinhardt, J.","Koh, P. W. W","Liang, P. S"],"editor_short":["Guyon, I.","Luxburg, U. V.","Bengio, S.","Wallach, H.","Fergus, R.","Vishwanathan, S.","Garnett, R."],"key":"steinhardt_certified_2017","id":"steinhardt_certified_2017","bibbaseid":"steinhardt-koh-liang-certifieddefensesfordatapoisoningattacks-2017","role":"author","urls":{"Paper":"http://papers.nips.cc/paper/6943-certified-defenses-for-data-poisoning-attacks.pdf"},"metadata":{"authorlinks":{}},"downloads":0,"html":""},"bibtype":"incollection","biburl":"https://bibbase.org/zotero/bxt101","creationDate":"2020-01-27T02:13:34.098Z","downloads":0,"keywords":[],"search_terms":["certified","defenses","data","poisoning","attacks","steinhardt","koh","liang"],"title":"Certified Defenses for Data Poisoning Attacks","year":2017,"dataSources":["hEoKh4ygEAWbAZ5iy","Wsv2bQ4jPuc7qme8R"]}