Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–30 of 30 results for author: Salman, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.02841  [pdf, other

    cs.SE

    AI-augmented Automation for Real Driving Prediction: an Industrial Use Case

    Authors: Romina Eramo, Hamzeh Eyal Salman, Matteo Spezialetti, Darko Stern, Pierre Quinton, Antonio Cicchetti

    Abstract: The risen complexity of automotive systems requires new development strategies and methods to master the upcoming challenges. Traditional methods need thus to be changed by an increased level of automation, and a faster continuous improvement cycle. In this context, current vehicle performance tests represent a very time-consuming and expensive task due to the need to perform the tests in real dri… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  2. arXiv:2312.06205  [pdf, other

    cs.CV cs.LG

    The Journey, Not the Destination: How Data Guides Diffusion Models

    Authors: Kristian Georgiev, Joshua Vendrow, Hadi Salman, Sung Min Park, Aleksander Madry

    Abstract: Diffusion models trained on large datasets can synthesize photo-realistic images of remarkable quality and diversity. However, attributing these images back to the training data-that is, identifying specific training examples which caused an image to be generated-remains a challenge. In this paper, we propose a framework that: (i) provides a formal notion of data attribution in the context of diff… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 29 pages, 17 figures

  3. arXiv:2311.03071  [pdf, other

    cs.CV

    OrthoNets: Orthogonal Channel Attention Networks

    Authors: Hadi Salman, Caleb Parks, Matthew Swan, John Gauch

    Abstract: Designing an effective channel attention mechanism implores one to find a lossy-compression method allowing for optimal feature representation. Despite recent progress in the area, it remains an open problem. FcaNet, the current state-of-the-art channel attention mechanism, attempted to find such an information-rich compression using Discrete Cosine Transforms (DCTs). One drawback of FcaNet is tha… ▽ More

    Submitted 6 November, 2023; v1 submitted 6 November, 2023; originally announced November 2023.

    Comments: IEEE BigData 2023

    Journal ref: IEEE BigData 2023

  4. arXiv:2307.10163  [pdf, other

    cs.CR cs.LG stat.ML

    Rethinking Backdoor Attacks

    Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry

    Abstract: In a backdoor attack, an adversary inserts maliciously constructed backdoor examples into a training set to make the resulting model vulnerable to manipulation. Defending against such attacks typically involves viewing these inserted examples as outliers in the training set and using techniques from robust statistics to detect and remove them. In this work, we present a different approach to the… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: ICML 2023

  5. arXiv:2306.12517  [pdf, other

    cs.LG cs.CV

    FFCV: Accelerating Training by Removing Data Bottlenecks

    Authors: Guillaume Leclerc, Andrew Ilyas, Logan Engstrom, Sung Min Park, Hadi Salman, Aleksander Madry

    Abstract: We present FFCV, a library for easy and fast machine learning model training. FFCV speeds up model training by eliminating (often subtle) data bottlenecks from the training process. In particular, we combine techniques such as an efficient file storage format, caching, data pre-loading, asynchronous data transfer, and just-in-time compilation to (a) make data loading and transfer significantly mor… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  6. arXiv:2302.06588  [pdf, other

    cs.LG

    Raising the Cost of Malicious AI-Powered Image Editing

    Authors: Hadi Salman, Alaa Khaddaj, Guillaume Leclerc, Andrew Ilyas, Aleksander Madry

    Abstract: We present an approach to mitigating the risks of malicious image editing posed by large diffusion models. The key idea is to immunize images so as to make them resistant to manipulation by these models. This immunization relies on injection of imperceptible adversarial perturbations designed to disrupt the operation of the targeted diffusion models, forcing them to generate unrealistic images. We… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

  7. WaveNets: Wavelet Channel Attention Networks

    Authors: Hadi Salman, Caleb Parks, Shi Yin Hong, Justin Zhan

    Abstract: Channel Attention reigns supreme as an effective technique in the field of computer vision. However, the proposed channel attention by SENet suffers from information loss in feature learning caused by the use of Global Average Pooling (GAP) to represent channels as scalars. Thus, designing effective channel attention mechanisms requires finding a solution to enhance features preservation in modeli… ▽ More

    Submitted 12 March, 2024; v1 submitted 4 November, 2022; originally announced November 2022.

    Comments: IEEE BigData2022 conference

  8. arXiv:2207.05739  [pdf, other

    cs.LG

    A Data-Based Perspective on Transfer Learning

    Authors: Saachi Jain, Hadi Salman, Alaa Khaddaj, Eric Wong, Sung Min Park, Aleksander Madry

    Abstract: It is commonly believed that in transfer learning including more pre-training data translates into better performance. However, recent evidence suggests that removing data from the source dataset can actually help too. In this work, we take a closer look at the role of the source dataset's composition in transfer learning and present a framework for probing its impact on downstream performance. Ou… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  9. arXiv:2207.02842  [pdf, other

    cs.LG

    When does Bias Transfer in Transfer Learning?

    Authors: Hadi Salman, Saachi Jain, Andrew Ilyas, Logan Engstrom, Eric Wong, Aleksander Madry

    Abstract: Using transfer learning to adapt a pre-trained "source model" to a downstream "target task" can dramatically increase performance with seemingly no downside. In this work, we demonstrate that there can exist a downside after all: bias transfer, or the tendency for biases of the source model to persist even after adapting the model to the target class. Through a combination of synthetic and natural… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

  10. Naming the Identified Feature Implementation Blocks from Software Source Code

    Authors: Ra'Fat Al-Msie'Deen, Hamzeh Eyal Salman, Anas H. Blasi, Mohammed A. Alsuwaiket

    Abstract: Identifying software identifiers that implement a particular feature of a software product is known as feature identification. Feature identification is one of the most critical and popular processes performed by software engineers during software maintenance activity. However, a meaningful name must be assigned to the Identified Feature Implementation Block (IFIB) to complete the feature identifi… ▽ More

    Submitted 24 April, 2022; originally announced April 2022.

    Comments: 10 pages, 8 figures, 9 tables

    Journal ref: Journal of Communications Software and Systems, vol. 18, no. 2, pp. 101-110, April 2022

  11. arXiv:2204.08945  [pdf, other

    cs.CV cs.AI cs.LG

    Missingness Bias in Model Debugging

    Authors: Saachi Jain, Hadi Salman, Eric Wong, Pengchuan Zhang, Vibhav Vineet, Sai Vemprala, Aleksander Madry

    Abstract: Missingness, or the absence of features from an input, is a concept fundamental to many model debugging tools. However, in computer vision, pixels cannot simply be removed from an image. One thus tends to resort to heuristics such as blacking out pixels, which may in turn introduce bias into the debugging process. We study such biases and, in particular, show how transformer-based architectures ca… ▽ More

    Submitted 13 June, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

    Comments: Published at ICLR 2022

  12. arXiv:2204.07862  [pdf, other

    eess.IV cs.CV

    GHM Wavelet Transform for Deep Image Super Resolution

    Authors: Ben Lowe, Hadi Salman, Justin Zhan

    Abstract: The GHM multi-level discrete wavelet transform is proposed as preprocessing for image super resolution with convolutional neural networks. Previous works perform analysis with the Haar wavelet only. In this work, 37 single-level wavelets are experimentally analyzed from Haar, Daubechies, Biorthogonal, Reverse Biorthogonal, Coiflets, and Symlets wavelet families. All single-level wavelets report si… ▽ More

    Submitted 16 April, 2022; originally announced April 2022.

    Comments: 13 pages

  13. arXiv:2203.00312  [pdf

    cs.SE

    Detecting commonality and variability in use-case diagram variants

    Authors: Ra'Fat AL-Msie'deen, Anas H. Blasi, Hamzeh Eyal Salman, Saqer S. Alja'afreh, Ahmad Abadleh, Mohammed A. Alsuwaiket, Awni Hammouri, Asmaa Jameel Al_Nawaiseh, Wafa Tarawneh, Suleyman A. Al-Showarah

    Abstract: The use-case diagram is a software artifact. Thus, as with any software artifact, the use-case diagrams change across time through the software development life cycle. Therefore, several versions of the same diagram are existed at distinct times. Thus, comparing all use-case diagram variants to detect common and variable use-cases becomes one of the main challenges in the product line reengineerin… ▽ More

    Submitted 1 March, 2022; originally announced March 2022.

    Comments: 14 pages, 10 figures, 6 tables

    Journal ref: Journal of Theoretical and Applied Information Technology, 28th February 2022, Vol. 100, No. 04, pp. 1113 - 1126, 2022

  14. arXiv:2110.07719  [pdf, other

    cs.CV cs.AI cs.LG

    Certified Patch Robustness via Smoothed Vision Transformers

    Authors: Hadi Salman, Saachi Jain, Eric Wong, Aleksander Mądry

    Abstract: Certified patch defenses can guarantee robustness of an image classifier to arbitrary changes within a bounded contiguous region. But, currently, this robustness comes at a cost of degraded standard accuracies and slower inference times. We demonstrate how using vision transformers enables significantly better certified patch robustness that is also more computationally efficient and does not incu… ▽ More

    Submitted 11 October, 2021; originally announced October 2021.

  15. arXiv:2106.13364  [pdf, other

    cs.AI cs.CV cs.LG

    CausalCity: Complex Simulations with Agency for Causal Discovery and Reasoning

    Authors: Daniel McDuff, Yale Song, Jiyoung Lee, Vibhav Vineet, Sai Vemprala, Nicholas Gyde, Hadi Salman, Shuang Ma, Kwanghoon Sohn, Ashish Kapoor

    Abstract: The ability to perform causal and counterfactual reasoning are central properties of human intelligence. Decision-making systems that can perform these types of reasoning have the potential to be more generalizable and interpretable. Simulations have helped advance the state-of-the-art in this domain, by providing the ability to systematically vary parameters (e.g., confounders) and generate examp… ▽ More

    Submitted 24 June, 2021; originally announced June 2021.

  16. arXiv:2106.03805  [pdf, other

    cs.CV cs.LG stat.ML

    3DB: A Framework for Debugging Computer Vision Models

    Authors: Guillaume Leclerc, Hadi Salman, Andrew Ilyas, Sai Vemprala, Logan Engstrom, Vibhav Vineet, Kai Xiao, Pengchuan Zhang, Shibani Santurkar, Greg Yang, Ashish Kapoor, Aleksander Madry

    Abstract: We introduce 3DB: an extendable, unified framework for testing and debugging vision models using photorealistic simulation. We demonstrate, through a wide range of use cases, that 3DB allows users to discover vulnerabilities in computer vision systems and gain insights into how models make decisions. 3DB captures and generalizes many robustness analyses from prior work, and enables one to study th… ▽ More

    Submitted 7 June, 2021; originally announced June 2021.

  17. arXiv:2012.12235  [pdf, other

    cs.CV cs.LG

    Unadversarial Examples: Designing Objects for Robust Vision

    Authors: Hadi Salman, Andrew Ilyas, Logan Engstrom, Sai Vemprala, Aleksander Madry, Ashish Kapoor

    Abstract: We study a class of realistic computer vision settings wherein one can influence the design of the objects being recognized. We develop a framework that leverages this capability to significantly improve vision models' performance and robustness. This framework exploits the sensitivity of modern machine learning algorithms to input perturbations in order to design "robust objects," i.e., objects t… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

  18. arXiv:2007.08489  [pdf, other

    cs.CV cs.LG stat.ML

    Do Adversarially Robust ImageNet Models Transfer Better?

    Authors: Hadi Salman, Andrew Ilyas, Logan Engstrom, Ashish Kapoor, Aleksander Madry

    Abstract: Transfer learning is a widely-used paradigm in deep learning, where models pre-trained on standard datasets can be efficiently adapted to downstream tasks. Typically, better pre-trained models yield better transfer results, suggesting that initial accuracy is a key aspect of transfer learning performance. In this work, we identify another such aspect: we find that adversarially robust models, whil… ▽ More

    Submitted 7 December, 2020; v1 submitted 16 July, 2020; originally announced July 2020.

    Comments: NeurIPS 2020

  19. arXiv:2004.12478  [pdf, other

    cs.LG cs.CR stat.ML

    Improved Image Wasserstein Attacks and Defenses

    Authors: Edward J. Hu, Adith Swaminathan, Hadi Salman, Greg Yang

    Abstract: Robustness against image perturbations bounded by a $\ell_p$ ball have been well-studied in recent literature. Perturbations in the real-world, however, rarely exhibit the pixel independence that $\ell_p$ threat models assume. A recently proposed Wasserstein distance-bounded threat model is a promising alternative that limits the perturbation to pixel mass movements. We point out and rectify flaws… ▽ More

    Submitted 9 May, 2023; v1 submitted 26 April, 2020; originally announced April 2020.

    Comments: Best paper award at ICLR Trustworthy ML Workshop 2020

  20. arXiv:2003.01908  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Denoised Smoothing: A Provable Defense for Pretrained Classifiers

    Authors: Hadi Salman, Mingjie Sun, Greg Yang, Ashish Kapoor, J. Zico Kolter

    Abstract: We present a method for provably defending any pretrained image classifier against $\ell_p$ adversarial attacks. This method, for instance, allows public vision API providers and users to seamlessly convert pretrained non-robust classification services into provably robust ones. By prepending a custom-trained denoiser to any off-the-shelf image classifier and using randomized smoothing, we effecti… ▽ More

    Submitted 20 September, 2020; v1 submitted 4 March, 2020; originally announced March 2020.

    Comments: 10 pages main text; 29 pages total

  21. arXiv:2002.08118  [pdf, other

    cs.LG cs.CV cs.NE stat.ML

    Randomized Smoothing of All Shapes and Sizes

    Authors: Greg Yang, Tony Duan, J. Edward Hu, Hadi Salman, Ilya Razenshteyn, Jerry Li

    Abstract: Randomized smoothing is the current state-of-the-art defense with provable robustness against $\ell_2$ adversarial attacks. Many works have devised new randomized smoothing schemes for other metrics, such as $\ell_1$ or $\ell_\infty$; however, substantial effort was needed to derive such new guarantees. This begs the question: can we find a general theory for randomized smoothing? We propose a n… ▽ More

    Submitted 23 July, 2020; v1 submitted 19 February, 2020; originally announced February 2020.

    Comments: 9 pages main text, 49 pages total

  22. arXiv:1907.10599  [pdf, other

    cs.LG cs.NE stat.ML

    A Fine-Grained Spectral Perspective on Neural Networks

    Authors: Greg Yang, Hadi Salman

    Abstract: Are neural networks biased toward simple functions? Does depth always help learn more complex features? Is training the last layer of a network as good as training all layers? How to set the range for learning rate tuning? These questions seem unrelated at face value, but in this work we give all of them a common treatment from the spectral perspective. We will study the spectra of the *Conjugate… ▽ More

    Submitted 9 April, 2020; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: 8 pages of main text, 19 figures, 51 pages including appendix

  23. arXiv:1906.04584  [pdf, other

    cs.LG cs.CR stat.ML

    Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers

    Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck

    Abstract: Recent works have shown the effectiveness of randomized smoothing as a scalable technique for building neural network-based classifiers that are provably robust to $\ell_2$-norm adversarial perturbations. In this paper, we employ adversarial training to improve the performance of randomized smoothing. We design an adapted attack for smoothed classifiers, and we show how this attack can be used in… ▽ More

    Submitted 9 January, 2020; v1 submitted 9 June, 2019; originally announced June 2019.

    Comments: Spotlight at the 33rd Conference on Neural Information Processing Systems (NeurIPS 2019), Vancouver, Canada; 9 pages main text; 31 pages total

  24. arXiv:1902.08722  [pdf, other

    cs.LG cs.AI cs.CR cs.CV stat.ML

    A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks

    Authors: Hadi Salman, Greg Yang, Huan Zhang, Cho-Jui Hsieh, Pengchuan Zhang

    Abstract: Verification of neural networks enables us to gauge their robustness against adversarial attacks. Verification algorithms fall into two categories: exact verifiers that run in exponential time and relaxed verifiers that are efficient but incomplete. In this paper, we unify all existing LP-relaxed verifiers, to the best of our knowledge, under a general convex relaxation framework. This framework w… ▽ More

    Submitted 9 January, 2020; v1 submitted 22 February, 2019; originally announced February 2019.

    Comments: Poster at the 33rd Conference on Neural Information Processing Systems (NeurIPS 2019), Vancouver, Canada

  25. arXiv:1810.03256  [pdf, other

    stat.ML cs.LG

    Deep Diffeomorphic Normalizing Flows

    Authors: Hadi Salman, Payman Yadollahpour, Tom Fletcher, Kayhan Batmanghelich

    Abstract: The Normalizing Flow (NF) models a general probability density by estimating an invertible transformation applied on samples drawn from a known distribution. We introduce a new type of NF, called Deep Diffeomorphic Normalizing Flow (DDNF). A diffeomorphic flow is an invertible function where both the function and its inverse are smooth. We construct the flow using an ordinary differential equation… ▽ More

    Submitted 22 November, 2018; v1 submitted 7 October, 2018; originally announced October 2018.

  26. arXiv:1803.01446  [pdf, other

    cs.RO

    Learning to Sequence Robot Behaviors for Visual Navigation

    Authors: Hadi Salman, Puneet Singhal, Tanmay Shankar, Peng Yin, Ali Salman, William Paivine, Guillaume Sartoretti, Matthew Travers, Howie Choset

    Abstract: Recent literature in the robotics community has focused on learning robot behaviors that abstract out lower-level details of robot control. To fully leverage the efficacy of such behaviors, it is necessary to select and sequence them to achieve a given task. In this paper, we present an approach to both learn and sequence robot behaviors, applied to the problem of visual navigation of mobile robot… ▽ More

    Submitted 25 March, 2018; v1 submitted 4 March, 2018; originally announced March 2018.

  27. arXiv:1711.08828  [pdf, other

    cs.RO

    A surgical system for automatic registration, stiffness mapping and dynamic image overlay

    Authors: Nicolas Zevallos, Rangaprasad Arun Srivatsan, Hadi Salman, Lu Li, Jianing Qian, Saumya Saxena, Mengyun Xu, Kartik Patath, Howie Choset

    Abstract: In this paper we develop a surgical system using the da Vinci research kit (dVRK) that is capable of autonomously searching for tumors and dynamically displaying the tumor location using augmented reality. Such a system has the potential to quickly reveal the location and shape of tumors and visually overlay that information to reduce the cognitive overload of the surgeon. We believe that our appr… ▽ More

    Submitted 23 November, 2017; originally announced November 2017.

    Comments: International Symposium on Medical Robotics (ISMR 2018)

  28. arXiv:1711.07063  [pdf, other

    cs.RO

    Trajectory-Optimized Sensing for Active Search of Tissue Abnormalities in Robotic Surgery

    Authors: Hadi Salman, Elif Ayvali, Rangaprasad Arun Srivatsan, Yifei Ma, Nicolas Zevallos, Rashid Yasin, Long Wang, Nabil Siman, Howie Choset

    Abstract: In this work, we develop an approach for guiding robots to automatically localize and find the shapes of tumors and other stiff inclusions present in the anatomy. Our approach uses Gaussian processes to model the stiffness distribution and active learning to direct the palpation path of the robot. The palpation paths are chosen such that they maximize an acquisition function provided by an active… ▽ More

    Submitted 16 May, 2018; v1 submitted 19 November, 2017; originally announced November 2017.

    Comments: 8 pages, ICRA 2018

  29. Distance and Similarity Measures Effect on the Performance of K-Nearest Neighbor Classifier -- A Review

    Authors: V. B. Surya Prasath, Haneen Arafat Abu Alfeilat, Ahmad B. A. Hassanat, Omar Lasassmeh, Ahmad S. Tarawneh, Mahmoud Bashir Alhasanat, Hamzeh S. Eyal Salman

    Abstract: The K-nearest neighbor (KNN) classifier is one of the simplest and most common classifiers, yet its performance competes with the most complex classifiers in the literature. The core of this classifier depends mainly on measuring the distance or similarity between the tested examples and the training examples. This raises a major question about which distance measures to be used for the KNN classi… ▽ More

    Submitted 29 September, 2019; v1 submitted 14 August, 2017; originally announced August 2017.

    Comments: 39 pages, 6 figures, 17 tables, revised text and added extra experiments

  30. arXiv:1707.04294  [pdf, other

    cs.RO

    Ergodic Coverage In Constrained Environments Using Stochastic Trajectory Optimization

    Authors: Elif Ayvali, Hadi Salman, Howie Choset

    Abstract: In search and surveillance applications in robotics, it is intuitive to spatially distribute robot trajectories with respect to the probability of locating targets in the domain. Ergodic coverage is one such approach to trajectory planning in which a robot is directed such that the percentage of time spent in a region is in proportion to the probability of locating targets in that region. In this… ▽ More

    Submitted 22 July, 2017; v1 submitted 13 July, 2017; originally announced July 2017.

    Comments: Accepted, IROS 2017