Email: | aathalye@mit.edu |
Blog: | anishathalye.com |
GitHub: | @anishathalye |
Twitter: | @anishathalye |
I am CTO and co-founder at Cleanlab, where we’re building tools for data-centric AI. Previously, I completed my PhD at MIT CSAIL in the PDOS group. Before that, I was an undergrad at MIT, during which I co-founded Code for Good, helped run HackMIT, and interned at OpenAI, Dropbox, Google, and Oak Ridge National Lab.
Anish Athalye, Henry Corrigan-Gibbs, M. Frans Kaashoek, Joseph Tassarotti, and Nickolai Zeldovich.
30th ACM Symposium on Operating Systems Principles (SOSP 2024).
Code [IPR theory, HSMs], Poster
Verifying Hardware Security Modules with Information-Preserving Refinement
Anish Athalye, M. Frans Kaashoek, and Nickolai Zeldovich.
16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2022).
Code [Knox framework, HSMs], Talk, Slides [pdf, key], Poster
Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks
Curtis G. Northcutt, Anish Athalye, and Jonas Mueller.
Notary: A Device for Secure Transaction Approval
Anish Athalye, Adam Belay, M. Frans Kaashoek, Robert Morris, and Nickolai Zeldovich.
27th ACM Symposium on Operating Systems Principles (SOSP 2019).
Obfuscated Gradients Give a False Sense of Security: Circumventing Defenses to Adversarial Examples
Anish Athalye*, Nicholas Carlini*, and David Wagner.
35th International Conference on Machine Learning (ICML 2018).
(Best Paper Award)
Synthesizing Robust Adversarial Examples
Anish Athalye*, Logan Engstrom*, Andrew Ilyas*, and Kevin Kwok.
35th International Conference on Machine Learning (ICML 2018).
Blog Posts [1, 2], Slides [pdf, key], Poster, Press [1, 2, 3, ]
Black-box Adversarial Attacks with Limited Queries and Information
Andrew Ilyas*, Logan Engstrom*, Anish Athalye*, and Jessy Lin*.
35th International Conference on Machine Learning (ICML 2018).
pASSWORD tYPOS and How to Correct Them Securely
Rahul Chatterjee, Anish Athalye, Devdatta Akhawe, Ari Juels, and Thomas Ristenpart.
37th IEEE Symposium on Security and Privacy (SP 2016).
(Distinguished Student Paper Award)
The K2 Architecture for Trustworthy Hardware Security Modules
Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich, and Joseph Tassarotti.
1st Workshop on Kernel Isolation, Safety and Verification (KISV 2023).
Anish Athalye, M. Frans Kaashoek, Nickolai Zeldovich, and Joseph Tassarotti.
1st Workshop on Programming Languages and Computer Architecture (PLARCH 2023).
rtlv: push-button verification of software on hardware
Noah Moroze, Anish Athalye, M. Frans Kaashoek, and Nickolai Zeldovich.
5th Workshop on Computer Architecture Research with RISC-V (CARRV 2021).
Evaluating and Understanding the Robustness of Adversarial Logit Pairing
Logan Engstrom*, Andrew Ilyas*, and Anish Athalye*.
NeurIPS 2018 Workshop on Security in Machine Learning (SECML 2018).
On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses
Anish Athalye* and Nicholas Carlini*.
On Evaluating Adversarial Robustness
Nicholas Carlini, Anish Athalye, Nicolas Papernot, Wieland Brendel, Jonas Rauber, Dimitris Tsipras, Ian Goodfellow, Aleksander Madry, and Alexey Kurakin.