Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–8 of 8 results for author: Brunner, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.06311  [pdf, other

    hep-ex cs.LG physics.ins-det

    Generative Adversarial Networks for Scintillation Signal Simulation in EXO-200

    Authors: S. Li, I. Ostrovskiy, Z. Li, L. Yang, S. Al Kharusi, G. Anton, I. Badhrees, P. S. Barbeau, D. Beck, V. Belov, T. Bhatta, M. Breidenbach, T. Brunner, G. F. Cao, W. R. Cen, C. Chambers, B. Cleveland, M. Coon, A. Craycraft, T. Daniels, L. Darroch, S. J. Daugherty, J. Davis, S. Delaquis, A. Der Mesrobian-Kabakian , et al. (65 additional authors not shown)

    Abstract: Generative Adversarial Networks trained on samples of simulated or actual events have been proposed as a way of generating large simulated datasets at a reduced computational cost. In this work, a novel approach to perform the simulation of photodetector signals from the time projection chamber of the EXO-200 experiment is demonstrated. The method is based on a Wasserstein Generative Adversarial N… ▽ More

    Submitted 8 May, 2023; v1 submitted 11 March, 2023; originally announced March 2023.

    Comments: As accepted by JINST

    Journal ref: JINST 18 P06005 2023

  2. arXiv:2202.13711  [pdf, other

    cs.LG cs.CR cs.CV

    Evaluating the Adversarial Robustness of Adaptive Test-time Defenses

    Authors: Francesco Croce, Sven Gowal, Thomas Brunner, Evan Shelhamer, Matthias Hein, Taylan Cemgil

    Abstract: Adaptive defenses, which optimize at test time, promise to improve adversarial robustness. We categorize such adaptive test-time defenses, explain their potential benefits and drawbacks, and evaluate a representative variety of the latest adaptive defenses for image classification. Unfortunately, none significantly improve upon static defenses when subjected to our careful case study evaluation. S… ▽ More

    Submitted 13 July, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

    Comments: ICML'22

  3. arXiv:1906.06086  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks

    Authors: Thomas Brunner, Frederik Diehl, Alois Knoll

    Abstract: Many optimization methods for generating black-box adversarial examples have been proposed, but the aspect of initializing said optimizers has not been considered in much detail. We show that the choice of starting points is indeed crucial, and that the performance of state-of-the-art attacks depends on it. First, we discuss desirable properties of starting points for attacking image classifiers,… ▽ More

    Submitted 29 December, 2019; v1 submitted 14 June, 2019; originally announced June 2019.

    Comments: Presented at CVPR 2019 Workshop on Adversarial Machine Learning in Real-World Computer Vision Systems

  4. arXiv:1905.07733  [pdf, other

    stat.ML cs.CV cs.LG

    Leveraging Semantic Embeddings for Safety-Critical Applications

    Authors: Thomas Brunner, Frederik Diehl, Michael Truong Le, Alois Knoll

    Abstract: Semantic Embeddings are a popular way to represent knowledge in the field of zero-shot learning. We observe their interpretability and discuss their potential utility in a safety-critical context. Concretely, we propose to use them to add introspection and error detection capabilities to neural network classifiers. First, we show how to create embeddings from symbolic domain knowledge. We discuss… ▽ More

    Submitted 19 May, 2019; originally announced May 2019.

    Comments: Accepted at CVPR 2019 Workshop: Safe Artificial Intelligence for Automated Driving

  5. Bridging the Gap between Open Source Software and Vehicle Hardware for Autonomous Driving

    Authors: Tobias Kessler, Julian Bernhard, Martin Buechel, Klemens Esterle, Patrick Hart, Daniel Malovetz, Michael Truong Le, Frederik Diehl, Thomas Brunner, Alois Knoll

    Abstract: Although many research vehicle platforms for autonomous driving have been built in the past, hardware design, source code and lessons learned have not been made available for the next generation of demonstrators. This raises the efforts for the research community to contribute results based on real-world evaluations as engineering knowledge of building and maintaining a research vehicle is lost. I… ▽ More

    Submitted 29 November, 2019; v1 submitted 8 May, 2019; originally announced May 2019.

    Comments: Published at IEEE Intelligent Vehicles Symposium (IV), 2019

  6. arXiv:1904.04706  [pdf, other

    cs.SE cs.LG

    Towards Safety Verification of Direct Perception Neural Networks

    Authors: Chih-Hong Cheng, Chung-Hao Huang, Thomas Brunner, Vahid Hashemi

    Abstract: We study the problem of safety verification of direct perception neural networks, where camera images are used as inputs to produce high-level features for autonomous vehicles to make control decisions. Formal verification of direct perception neural networks is extremely challenging, as it is difficult to formulate the specification that requires characterizing input as constraints, while the num… ▽ More

    Submitted 21 November, 2019; v1 submitted 9 April, 2019; originally announced April 2019.

    Comments: Revised text (2nd version). The research work is conducted during the first author's service at the fortiss research institute and is supported by the following projects: "Audi Verifiable AI" from Audi AG, Germany and "Dependable AI for automotive systems" from DENSO Corporation, Japan

  7. arXiv:1903.01254  [pdf, other

    cs.LG stat.ML

    Graph Neural Networks for Modelling Traffic Participant Interaction

    Authors: Frederik Diehl, Thomas Brunner, Michael Truong Le, Alois Knoll

    Abstract: By interpreting a traffic scene as a graph of interacting vehicles, we gain a flexible abstract representation which allows us to apply Graph Neural Network (GNN) models for traffic prediction. These naturally take interaction between traffic participants into account while being computationally efficient and providing large model capacity. We evaluate two state-of-the art GNN architectures and in… ▽ More

    Submitted 7 May, 2019; v1 submitted 4 March, 2019; originally announced March 2019.

    Comments: To be published at IEEE Intelligent Vehicles Symposium 2019

  8. arXiv:1812.09803  [pdf, other

    stat.ML cs.CR cs.CV cs.LG

    Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks

    Authors: Thomas Brunner, Frederik Diehl, Michael Truong Le, Alois Knoll

    Abstract: We consider adversarial examples for image classification in the black-box decision-based setting. Here, an attacker cannot access confidence scores, but only the final label. Most attacks for this scenario are either unreliable or inefficient. Focusing on the latter, we show that a specific class of attacks, Boundary Attacks, can be reinterpreted as a biased sampling framework that gains efficien… ▽ More

    Submitted 5 May, 2019; v1 submitted 23 December, 2018; originally announced December 2018.

    Comments: For source code and videos, see https://github.com/ttbrunner/biased_boundary_attack