default search action
Logan Engstrom
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c18]Logan Engstrom, Axel Feldmann, Aleksander Madry:
DsDm: Model-Aware Dataset Selection with Datamodels. ICML 2024 - [i23]Logan Engstrom, Axel Feldmann, Aleksander Madry:
DsDm: Model-Aware Dataset Selection with Datamodels. CoRR abs/2401.12926 (2024) - 2023
- [c17]Guillaume Leclerc, Andrew Ilyas, Logan Engstrom, Sung Min Park, Hadi Salman, Aleksander Madry:
FFCV: Accelerating Training by Removing Data Bottlenecks. CVPR 2023: 12011-12020 - [i22]Joshua Vendrow, Saachi Jain, Logan Engstrom, Aleksander Madry:
Dataset Interfaces: Diagnosing Model Failures Using Controllable Counterfactual Generation. CoRR abs/2302.07865 (2023) - [i21]Guillaume Leclerc, Andrew Ilyas, Logan Engstrom, Sung Min Park, Hadi Salman, Aleksander Madry:
FFCV: Accelerating Training by Removing Data Bottlenecks. CoRR abs/2306.12517 (2023) - 2022
- [c16]Andrew Ilyas, Sung Min Park, Logan Engstrom, Guillaume Leclerc, Aleksander Madry:
Datamodels: Understanding Predictions with Data and Data with Predictions. ICML 2022: 9525-9587 - [c15]Guillaume Leclerc, Hadi Salman, Andrew Ilyas, Sai Vemprala, Logan Engstrom, Vibhav Vineet, Kai Yuanqing Xiao, Pengchuan Zhang, Shibani Santurkar, Greg Yang, Ashish Kapoor, Aleksander Madry:
3DB: A Framework for Debugging Computer Vision Models. NeurIPS 2022 - [i20]Andrew Ilyas, Sung Min Park, Logan Engstrom, Guillaume Leclerc, Aleksander Madry:
Datamodels: Predicting Predictions from Training Data. CoRR abs/2202.00622 (2022) - [i19]Hadi Salman, Saachi Jain, Andrew Ilyas, Logan Engstrom, Eric Wong, Aleksander Madry:
When does Bias Transfer in Transfer Learning? CoRR abs/2207.02842 (2022) - 2021
- [c14]Kai Yuanqing Xiao, Logan Engstrom, Andrew Ilyas, Aleksander Madry:
Noise or Signal: The Role of Image Backgrounds in Object Recognition. ICLR 2021 - [c13]Hadi Salman, Andrew Ilyas, Logan Engstrom, Sai Vemprala, Aleksander Madry, Ashish Kapoor:
Unadversarial Examples: Designing Objects for Robust Vision. NeurIPS 2021: 15270-15284 - [i18]Guillaume Leclerc, Hadi Salman, Andrew Ilyas, Sai Vemprala, Logan Engstrom, Vibhav Vineet, Kai Yuanqing Xiao, Pengchuan Zhang, Shibani Santurkar, Greg Yang, Ashish Kapoor, Aleksander Madry:
3DB: A Framework for Debugging Computer Vision Models. CoRR abs/2106.03805 (2021) - 2020
- [c12]Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Firdaus Janoos, Larry Rudolph, Aleksander Madry:
Implementation Matters in Deep RL: A Case Study on PPO and TRPO. ICLR 2020 - [c11]Andrew Ilyas, Logan Engstrom, Shibani Santurkar, Dimitris Tsipras, Firdaus Janoos, Larry Rudolph, Aleksander Madry:
A Closer Look at Deep Policy Gradients. ICLR 2020 - [c10]Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Jacob Steinhardt, Aleksander Madry:
Identifying Statistical Bias in Dataset Replication. ICML 2020: 2922-2932 - [c9]Dimitris Tsipras, Shibani Santurkar, Logan Engstrom, Andrew Ilyas, Aleksander Madry:
From ImageNet to Image Classification: Contextualizing Progress on Benchmarks. ICML 2020: 9625-9635 - [c8]Hadi Salman, Andrew Ilyas, Logan Engstrom, Ashish Kapoor, Aleksander Madry:
Do Adversarially Robust ImageNet Models Transfer Better? NeurIPS 2020 - [i17]Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Jacob Steinhardt, Aleksander Madry:
Identifying Statistical Bias in Dataset Replication. CoRR abs/2005.09619 (2020) - [i16]Dimitris Tsipras, Shibani Santurkar, Logan Engstrom, Andrew Ilyas, Aleksander Madry:
From ImageNet to Image Classification: Contextualizing Progress on Benchmarks. CoRR abs/2005.11295 (2020) - [i15]Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Firdaus Janoos, Larry Rudolph, Aleksander Madry:
Implementation Matters in Deep Policy Gradients: A Case Study on PPO and TRPO. CoRR abs/2005.12729 (2020) - [i14]Kai Yuanqing Xiao, Logan Engstrom, Andrew Ilyas, Aleksander Madry:
Noise or Signal: The Role of Image Backgrounds in Object Recognition. CoRR abs/2006.09994 (2020) - [i13]Hadi Salman, Andrew Ilyas, Logan Engstrom, Ashish Kapoor, Aleksander Madry:
Do Adversarially Robust ImageNet Models Transfer Better? CoRR abs/2007.08489 (2020) - [i12]Hadi Salman, Andrew Ilyas, Logan Engstrom, Sai Vemprala, Aleksander Madry, Ashish Kapoor:
Unadversarial Examples: Designing Objects for Robust Vision. CoRR abs/2012.12235 (2020)
2010 – 2019
- 2019
- [c7]Andrew Ilyas, Logan Engstrom, Aleksander Madry:
Prior Convictions: Black-box Adversarial Attacks with Bandits and Priors. ICLR (Poster) 2019 - [c6]Dimitris Tsipras, Shibani Santurkar, Logan Engstrom, Alexander Turner, Aleksander Madry:
Robustness May Be at Odds with Accuracy. ICLR (Poster) 2019 - [c5]Logan Engstrom, Brandon Tran, Dimitris Tsipras, Ludwig Schmidt, Aleksander Madry:
Exploring the Landscape of Spatial Robustness. ICML 2019: 1802-1811 - [c4]Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry:
Adversarial Examples Are Not Bugs, They Are Features. NeurIPS 2019: 125-136 - [c3]Shibani Santurkar, Andrew Ilyas, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry:
Image Synthesis with a Single (Robust) Classifier. NeurIPS 2019: 1260-1271 - [i11]Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry:
Adversarial Examples Are Not Bugs, They Are Features. CoRR abs/1905.02175 (2019) - [i10]Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Brandon Tran, Aleksander Madry:
Learning Perceptually-Aligned Representations via Adversarial Robustness. CoRR abs/1906.00945 (2019) - [i9]Shibani Santurkar, Dimitris Tsipras, Brandon Tran, Andrew Ilyas, Logan Engstrom, Aleksander Madry:
Computer Vision with a Single (Robust) Classifier. CoRR abs/1906.09453 (2019) - 2018
- [c2]Anish Athalye, Logan Engstrom, Andrew Ilyas, Kevin Kwok:
Synthesizing Robust Adversarial Examples. ICML 2018: 284-293 - [c1]Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin:
Black-box Adversarial Attacks with Limited Queries and Information. ICML 2018: 2142-2151 - [i8]Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin:
Black-box Adversarial Attacks with Limited Queries and Information. CoRR abs/1804.08598 (2018) - [i7]Dimitris Tsipras, Shibani Santurkar, Logan Engstrom, Alexander Turner, Aleksander Madry:
There Is No Free Lunch In Adversarial Robustness (But There Are Unexpected Benefits). CoRR abs/1805.12152 (2018) - [i6]Andrew Ilyas, Logan Engstrom, Aleksander Madry:
Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors. CoRR abs/1807.07978 (2018) - [i5]Logan Engstrom, Andrew Ilyas, Anish Athalye:
Evaluating and Understanding the Robustness of Adversarial Logit Pairing. CoRR abs/1807.10272 (2018) - [i4]Andrew Ilyas, Logan Engstrom, Shibani Santurkar, Dimitris Tsipras, Firdaus Janoos, Larry Rudolph, Aleksander Madry:
Are Deep Policy Gradient Algorithms Truly Policy Gradient Algorithms? CoRR abs/1811.02553 (2018) - 2017
- [i3]Anish Athalye, Logan Engstrom, Andrew Ilyas, Kevin Kwok:
Synthesizing Robust Adversarial Examples. CoRR abs/1707.07397 (2017) - [i2]Logan Engstrom, Dimitris Tsipras, Ludwig Schmidt, Aleksander Madry:
A Rotation and a Translation Suffice: Fooling CNNs with Simple Transformations. CoRR abs/1712.02779 (2017) - [i1]Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin:
Query-Efficient Black-box Adversarial Examples. CoRR abs/1712.07113 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint