Skip to main content

Showing 1–10 of 10 results for author: Athalye, A

.
  1. arXiv:2501.00296  [pdf, ps, other

    cs.RO cs.AI cs.CV cs.LG

    From Pixels to Predicates: Learning Symbolic World Models via Pretrained Vision-Language Models

    Authors: Ashay Athalye, Nishanth Kumar, Tom Silver, Yichao Liang, Jiuguang Wang, Tomás Lozano-Pérez, Leslie Pack Kaelbling

    Abstract: Our aim is to learn to solve long-horizon decision-making problems in complex robotics domains given low-level skills and a handful of short-horizon demonstrations containing sequences of images. To this end, we focus on learning abstract symbolic world models that facilitate zero-shot generalization to novel goals via planning. A critical component of such models is the set of symbolic predicates… ▽ More

    Submitted 9 June, 2025; v1 submitted 31 December, 2024; originally announced January 2025.

  2. arXiv:2206.10680  [pdf, other

    cs.RO cs.AI cs.LG

    Learning Neuro-Symbolic Skills for Bilevel Planning

    Authors: Tom Silver, Ashay Athalye, Joshua B. Tenenbaum, Tomas Lozano-Perez, Leslie Pack Kaelbling

    Abstract: Decision-making is challenging in robotics environments with continuous object-centric states, continuous actions, long horizons, and sparse feedback. Hierarchical approaches, such as task and motion planning (TAMP), address these challenges by decomposing decision-making into two or more levels of abstraction. In a setting where demonstrations and symbolic predicates are given, prior work has sho… ▽ More

    Submitted 12 October, 2022; v1 submitted 21 June, 2022; originally announced June 2022.

    Comments: CoRL 2022

  3. arXiv:2103.14749  [pdf, other

    stat.ML cs.AI cs.LG

    Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks

    Authors: Curtis G. Northcutt, Anish Athalye, Jonas Mueller

    Abstract: We identify label errors in the test sets of 10 of the most commonly-used computer vision, natural language, and audio datasets, and subsequently study the potential for these label errors to affect benchmark results. Errors in test sets are numerous and widespread: we estimate an average of at least 3.3% errors across the 10 datasets, where for example label errors comprise at least 6% of the Ima… ▽ More

    Submitted 7 November, 2021; v1 submitted 26 March, 2021; originally announced March 2021.

    Comments: Demo available at https://labelerrors.com/ and source code available at https://github.com/cleanlab/label-errors

    Journal ref: 35th Conference on Neural Information Processing Systems (NeurIPS 2021) Track on Datasets and Benchmarks

  4. arXiv:1902.06705  [pdf, ps, other

    cs.LG cs.CR stat.ML

    On Evaluating Adversarial Robustness

    Authors: Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, Alexey Kurakin

    Abstract: Correctly evaluating defenses against adversarial examples has proven to be extremely difficult. Despite the significant amount of recent work attempting to design defenses that withstand adaptive attacks, few have succeeded; most papers that propose defenses are quickly shown to be incorrect. We believe a large contributing factor is the difficulty of performing security evaluations. In this pa… ▽ More

    Submitted 20 February, 2019; v1 submitted 18 February, 2019; originally announced February 2019.

    Comments: Living document; source available at https://github.com/evaluating-adversarial-robustness/adv-eval-paper/

  5. arXiv:1807.10272  [pdf, other

    stat.ML cs.CR cs.CV cs.LG

    Evaluating and Understanding the Robustness of Adversarial Logit Pairing

    Authors: Logan Engstrom, Andrew Ilyas, Anish Athalye

    Abstract: We evaluate the robustness of Adversarial Logit Pairing, a recently proposed defense against adversarial examples. We find that a network trained with Adversarial Logit Pairing achieves 0.6% accuracy in the threat model in which the defense is considered. We provide a brief overview of the defense and the threat models/claims considered, as well as a discussion of the methodology and results of ou… ▽ More

    Submitted 23 November, 2018; v1 submitted 26 July, 2018; originally announced July 2018.

    Comments: NeurIPS SECML 2018. Source code at https://github.com/labsix/adversarial-logit-pairing-analysis

  6. arXiv:1804.08598  [pdf, other

    cs.CV cs.CR stat.ML

    Black-box Adversarial Attacks with Limited Queries and Information

    Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin

    Abstract: Current neural network-based classifiers are susceptible to adversarial examples even in the black-box setting, where the attacker only has query access to the model. In practice, the threat model for real-world systems is often more restrictive than the typical black-box model where the adversary can observe the full output of the network on arbitrarily many chosen inputs. We define three realist… ▽ More

    Submitted 11 July, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: ICML 2018. This supercedes the previous paper "Query-efficient Black-box adversarial examples."

  7. arXiv:1804.03286  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

    Authors: Anish Athalye, Nicholas Carlini

    Abstract: Neural networks are known to be vulnerable to adversarial examples. In this note, we evaluate the two white-box defenses that appeared at CVPR 2018 and find they are ineffective: when applying existing techniques, we can reduce the accuracy of the defended models to 0%.

    Submitted 10 April, 2018; originally announced April 2018.

  8. arXiv:1802.00420  [pdf, other

    cs.LG cs.AI cs.CR

    Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples

    Authors: Anish Athalye, Nicholas Carlini, David Wagner

    Abstract: We identify obfuscated gradients, a kind of gradient masking, as a phenomenon that leads to a false sense of security in defenses against adversarial examples. While defenses that cause obfuscated gradients appear to defeat iterative optimization-based attacks, we find defenses relying on this effect can be circumvented. We describe characteristic behaviors of defenses exhibiting the effect, and f… ▽ More

    Submitted 30 July, 2018; v1 submitted 1 February, 2018; originally announced February 2018.

    Comments: ICML 2018. Source code at https://github.com/anishathalye/obfuscated-gradients

  9. arXiv:1712.07113  [pdf, other

    cs.CV cs.LG stat.ML

    Query-Efficient Black-box Adversarial Examples (superceded)

    Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin

    Abstract: Note that this paper is superceded by "Black-Box Adversarial Attacks with Limited Queries and Information." Current neural network-based image classifiers are susceptible to adversarial examples, even in the black-box setting, where the attacker is limited to query access without access to gradients. Previous methods --- substitute networks and coordinate-based finite-difference methods --- are… ▽ More

    Submitted 6 April, 2018; v1 submitted 19 December, 2017; originally announced December 2017.

    Comments: Superceded by "Black-Box Adversarial Attacks with Limited Queries and Information."

  10. arXiv:1707.07397  [pdf, other

    cs.CV

    Synthesizing Robust Adversarial Examples

    Authors: Anish Athalye, Logan Engstrom, Andrew Ilyas, Kevin Kwok

    Abstract: Standard methods for generating adversarial examples for neural networks do not consistently fool neural network classifiers in the physical world due to a combination of viewpoint shifts, camera noise, and other natural transformations, limiting their relevance to real-world systems. We demonstrate the existence of robust 3D adversarial objects, and we present the first algorithm for synthesizing… ▽ More

    Submitted 7 June, 2018; v1 submitted 24 July, 2017; originally announced July 2017.

    Comments: ICML 2018