BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//LORIA - ECPv6.15.18//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:LORIA
X-ORIGINAL-URL:https://www.loria.fr
X-WR-CALDESC:Évènements pour LORIA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20190331T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20191027T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20200329T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20201025T010000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20210328T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20211031T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=Europe/Paris:20200206T133000
DTEND;TZID=Europe/Paris:20200206T153000
DTSTAMP:20260405T152826
CREATED:20200115T091902Z
LAST-MODIFIED:20200115T091902Z
UID:8873-1580995800-1581003000@www.loria.fr
SUMMARY:Séminaire SSL par Adi Shamir
DESCRIPTION:Le prochain séminaire sera un peu particulier puisqu’il s’agira de la projection de l’exposé invité donné en septembre par Adi Shamir dans le cadre de la conférence Esorics 2019. \nThe European Symposium on Research in Computer Security \nLa projection aura lieu le jeudi 6 février\, à 13h30\, dans l’amphithéâtre du Loria. \nTitre : The Insecurity of Machine Learning: Problems and Solutions \nAbstract : The development of deep neural networks in the last decade had revolutionized machine learning and led to major improvements in the precision with which we can perform many computational tasks. However\, the discovery five years ago of adversarial examples in which tiny changes in the input can fool well trained neural networks makes it difficult to trust such results when the input can be manipulated by an adversary. \nThis problem has many applications and implications in object recognition\, autonomous driving\, cyber security\, etc\, but it is still far from being understood. In particular\, there had been no convincing explanations why such adversarial examples exist\, and which parameters determine the number of input coordinates one has to change in order to mislead the network. \nIn this talk I will describe a simple mathematical framework which enables us to think about this problem from a fresh perspective\, turning the existence of adversarial examples in deep neural networks from a baffling phenomenon into an unavoidable consequence of the geometry of R^n under the Hamming distance\, which can be quantitatively analyzed.
URL:https://www.loria.fr/event/seminaire-ssl-par-adi-shamir/
CATEGORIES:Séminaire
END:VEVENT
END:VCALENDAR