Arjun Nitin Bhagoji
TitleCited byYear
Enhancing Robustness of Machine Learning Systems via Data Transformations
AN Bhagoji, D Cullina, C Sitawarin, P Mittal
arXiv preprint arXiv:1704.02654, 2017
Practical black-box attacks on deep neural networks using efficient query mechanisms
AN Bhagoji, W He, B Li, D Song
European Conference on Computer Vision, 158-174, 2018
Darts: Deceiving autonomous cars with toxic signs
C Sitawarin, AN Bhagoji, A Mosenia, M Chiang, P Mittal
arXiv preprint arXiv:1802.06430, 2018
Rogue signs: Deceiving traffic sign recognition with malicious ads and logos
C Sitawarin, AN Bhagoji, A Mosenia, P Mittal, M Chiang
arXiv preprint arXiv:1801.02780, 2018
PAC-learning in the presence of evasion adversaries
D Cullina, AN Bhagoji, P Mittal
Advances in Neural Information Processing Systems, 228-239, 2018
Analyzing federated learning through an adversarial lens
AN Bhagoji, S Chakraborty, P Mittal, S Calo
arXiv preprint arXiv:1811.12470, 2018
Equivalence of 2D color codes (without translational symmetry) to surface codes
A Bhagoji, P Sarvepalli
2015 IEEE International Symposium on Information Theory (ISIT), 1109-1113, 2015
A Nano-satellite Mission to Study Charged Particle Precipitation from the Van Allen Radiation Belts caused due to Seismo-Electromagnetic Emissions
N Sivadas, A Gulati, D Kannapan, AS Yalamarthy, A Dhiman, A Bhagoji, ...
arXiv preprint arXiv:1411.6034, 2014
Black-box Attacks on Deep Neural Networks via Gradient Estimation
AN Bhagoji, W He, B Li, D Song
ICLR Workshop, 2018
On the Local Equivalence of 2D Color Codes and Surface Codes with Applications
AB Aloshious, AN Bhagoji, PK Sarvepalli
arXiv preprint arXiv:1804.00866, 2018
Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples
V Sehwag, AN Bhagoji, L Song, C Sitawarin, D Cullina, M Chiang, P Mittal
arXiv preprint arXiv:1905.01726, 2019
Not All Pixels are Born Equal: An Analysis of Evasion Attacks under Locality Constraints
V Sehwag, C Sitawarin, AN Bhagoji, A Mosenia, M Chiang, P Mittal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
The system can't perform the operation now. Try again later.
Articles 1–12