Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–22 of 22 results for author: Pang, T

Searching in archive stat. Search in all archives.
.
  1. arXiv:2406.04657  [pdf, other

    cs.LG cs.AI math.ST stat.ML

    Crafting Heavy-Tails in Weight Matrix Spectrum without Gradient Noise

    Authors: Vignesh Kothapalli, Tianyu Pang, Shenyang Deng, Zongmin Liu, Yaoqing Yang

    Abstract: Modern training strategies of deep neural networks (NNs) tend to induce a heavy-tailed (HT) spectra of layer weights. Extensive efforts to study this phenomenon have found that NNs with HT weight spectra tend to generalize well. A prevailing notion for the occurrence of such HT spectra attributes gradient noise during training as a key contributing factor. Our work shows that gradient noise is unn… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: 31 pages, 37 figures

  2. arXiv:2312.00359  [pdf, other

    cs.LG stat.ML

    Temperature Balancing, Layer-wise Weight Analysis, and Neural Network Training

    Authors: Yefan Zhou, Tianyu Pang, Keqin Liu, Charles H. Martin, Michael W. Mahoney, Yaoqing Yang

    Abstract: Regularization in modern machine learning is crucial, and it can take various forms in algorithmic design: training set, model family, error function, regularization terms, and optimizations. In particular, the learning rate, which can be interpreted as a temperature-like parameter within the statistical mechanics of learning, plays a crucial role in neural network training. Indeed, many widely ad… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: NeurIPS 2023 Spotlight, first two authors contributed equally

  3. arXiv:2306.01435  [pdf, other

    cs.LG stat.ML

    Improving Adversarial Robustness of DEQs with Explicit Regulations Along the Neural Dynamics

    Authors: Zonghan Yang, Peng Li, Tianyu Pang, Yang Liu

    Abstract: Deep equilibrium (DEQ) models replace the multiple-layer stacking of conventional deep networks with a fixed-point iteration of a single-layer transformation. Having been demonstrated to be competitive in a variety of real-world scenarios, the adversarial robustness of general DEQs becomes increasingly crucial for their reliable deployment. Existing works improve the robustness of general DEQ mode… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: Accepted at ICML 2023. Our code is available at https://github.com/minicheshire/DEQ-Regulating-Neural-Dynamics

  4. arXiv:2306.01429  [pdf, other

    cs.LG stat.ML

    A Closer Look at the Adversarial Robustness of Deep Equilibrium Models

    Authors: Zonghan Yang, Tianyu Pang, Yang Liu

    Abstract: Deep equilibrium models (DEQs) refrain from the traditional layer-stacking paradigm and turn to find the fixed point of a single layer. DEQs have achieved promising performance on different applications with featured memory efficiency. At the same time, the adversarial vulnerability of DEQs raises concerns. Several works propose to certify robustness for monotone DEQs. However, limited efforts are… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: Accepted at NeurIPS 2022. Our code is available at https://github.com/minicheshire/DEQ-White-Box-Robustness

  5. arXiv:2302.10688  [pdf, other

    cs.LG cs.CV stat.ML

    On Calibrating Diffusion Probabilistic Models

    Authors: Tianyu Pang, Cheng Lu, Chao Du, Min Lin, Shuicheng Yan, Zhijie Deng

    Abstract: Recently, diffusion probabilistic models (DPMs) have achieved promising results in diverse generative tasks. A typical DPM framework includes a forward process that gradually diffuses the data distribution and a reverse process that recovers the data distribution from time-dependent data scores. In this work, we observe that the stochastic reverse process of data scores is a martingale, from which… ▽ More

    Submitted 29 October, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

    Comments: NeurIPS 2023

  6. arXiv:2203.06560  [pdf, other

    cs.LG cs.CV stat.ML

    Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

    Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu

    Abstract: Adversarial attacks have been extensively studied in recent years since they can identify the vulnerability of deep learning models before deployed. In this paper, we consider the black-box adversarial setting, where the adversary needs to craft adversarial examples without access to the gradients of a target model. Previous methods attempted to approximate the true gradient either by using the tr… ▽ More

    Submitted 12 March, 2022; originally announced March 2022.

    Comments: Accepted by IEEE Transactions on Pattern Recognition and Machine Intelligence (TPAMI). The official version is at https://ieeexplore.ieee.org/document/9609659

  7. arXiv:2202.10103  [pdf, other

    cs.LG cs.CR stat.ML

    Robustness and Accuracy Could Be Reconcilable by (Proper) Definition

    Authors: Tianyu Pang, Min Lin, Xiao Yang, Jun Zhu, Shuicheng Yan

    Abstract: The trade-off between robustness and accuracy has been widely studied in the adversarial literature. Although still controversial, the prevailing view is that this trade-off is inherent, either empirically or theoretically. Thus, we dig for the origin of this trade-off in adversarial training and find that it may stem from the improperly defined robust error, which imposes an inductive bias of loc… ▽ More

    Submitted 16 June, 2022; v1 submitted 21 February, 2022; originally announced February 2022.

    Comments: ICML 2022

  8. arXiv:2106.01606  [pdf, other

    cs.LG cs.CV stat.ML

    Exploring Memorization in Adversarial Training

    Authors: Yinpeng Dong, Ke Xu, Xiao Yang, Tianyu Pang, Zhijie Deng, Hang Su, Jun Zhu

    Abstract: Deep learning models have a propensity for fitting the entire training set even with random labels, which requires memorization of every training sample. In this paper, we explore the memorization effect in adversarial training (AT) for promoting a deeper understanding of model capacity, convergence, generalization, and especially robust overfitting of the adversarially trained models. We first de… ▽ More

    Submitted 12 March, 2022; v1 submitted 3 June, 2021; originally announced June 2021.

    Comments: Accepted by ICLR 2022. 24 pages

  9. arXiv:2103.13127  [pdf, other

    cs.CR cs.CV cs.LG stat.ML

    Black-box Detection of Backdoor Attacks with Limited Information and Data

    Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu

    Abstract: Although deep neural networks (DNNs) have made rapid progress in recent years, they are vulnerable in adversarial environments. A malicious backdoor could be embedded in a model by poisoning the training dataset, whose intention is to make the infected model give wrong predictions during inference when the specific trigger appears. To mitigate the potential threats of backdoor attacks, various bac… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

  10. arXiv:2010.00467  [pdf, other

    cs.LG cs.CV stat.ML

    Bag of Tricks for Adversarial Training

    Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu

    Abstract: Adversarial training (AT) is one of the most effective strategies for promoting model robustness. However, recent benchmarks show that most of the proposed improvements on AT are less effective than simply early stopping the training procedure. This counter-intuitive fact motivates us to investigate the implementation details of tens of AT methods. Surprisingly, we find that the basic settings (e.… ▽ More

    Submitted 31 March, 2021; v1 submitted 1 October, 2020; originally announced October 2020.

    Comments: ICLR 2021

  11. arXiv:2007.03317  [pdf, other

    cs.LG stat.ML

    Efficient Learning of Generative Models via Finite-Difference Score Matching

    Authors: Tianyu Pang, Kun Xu, Chongxuan Li, Yang Song, Stefano Ermon, Jun Zhu

    Abstract: Several machine learning applications involve the optimization of higher-order derivatives (e.g., gradients of gradients) during training, which can be expensive in respect to memory and computation even with automatic differentiation. As a typical example in generative modeling, score matching (SM) involves the optimization of the trace of a Hessian. To improve computing efficiency, we rewrite th… ▽ More

    Submitted 25 November, 2020; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: NeurIPS 2020

  12. arXiv:2003.06814  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Towards Face Encryption by Generating Adversarial Identity Masks

    Authors: Xiao Yang, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu, Yuefeng Chen, Hui Xue

    Abstract: As billions of personal data being shared through social media and network, the data privacy and security have drawn an increasing attention. Several attempts have been made to alleviate the leakage of identity information from face photos, with the aid of, e.g., image obfuscation techniques. However, most of the present results are either perceptually unsatisfactory or ineffective against face re… ▽ More

    Submitted 16 August, 2021; v1 submitted 15 March, 2020; originally announced March 2020.

    Comments: Accepted by ICCV2021

  13. arXiv:2002.08619  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Boosting Adversarial Training with Hypersphere Embedding

    Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Kun Xu, Jun Zhu, Hang Su

    Abstract: Adversarial training (AT) is one of the most effective defenses against adversarial attacks for deep learning models. In this work, we advocate incorporating the hypersphere embedding (HE) mechanism into the AT procedure by regularizing the features onto compact manifolds, which constitutes a lightweight yet effective module to blend in the strength of representation learning. Our extensive analys… ▽ More

    Submitted 25 November, 2020; v1 submitted 20 February, 2020; originally announced February 2020.

    Comments: NeurIPS 2020

  14. arXiv:2002.05999  [pdf, other

    cs.LG cs.CR stat.ML

    Adversarial Distributional Training for Robust Deep Learning

    Authors: Yinpeng Dong, Zhijie Deng, Tianyu Pang, Hang Su, Jun Zhu

    Abstract: Adversarial training (AT) is among the most effective techniques to improve model robustness by augmenting training data with adversarial examples. However, most existing AT methods adopt a specific attack to craft adversarial examples, leading to the unreliable robustness against other unseen attacks. Besides, a single attack algorithm could be insufficient to explore the space of perturbations.… ▽ More

    Submitted 19 November, 2020; v1 submitted 14 February, 2020; originally announced February 2020.

    Comments: NeurIPS 2020. The first two authors contribute equally

  15. arXiv:1912.11852  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    Benchmarking Adversarial Robustness

    Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Tianyu Pang, Hang Su, Zihao Xiao, Jun Zhu

    Abstract: Deep neural networks are vulnerable to adversarial examples, which becomes one of the most important research problems in the development of deep learning. While a lot of efforts have been made in recent years, it is of great significance to perform correct and complete evaluations of the adversarial attack and defense algorithms. In this paper, we establish a comprehensive, rigorous, and coherent… ▽ More

    Submitted 26 December, 2019; originally announced December 2019.

  16. arXiv:1909.11515  [pdf, other

    cs.LG cs.CV stat.ML

    Mixup Inference: Better Exploiting Mixup to Defend Adversarial Attacks

    Authors: Tianyu Pang, Kun Xu, Jun Zhu

    Abstract: It has been widely recognized that adversarial examples can be easily crafted to fool deep networks, which mainly root from the locally non-linear behavior nearby input examples. Applying mixup in training provides an effective mechanism to improve generalization performance and model robustness against adversarial perturbations, which introduces the globally linear behavior in-between training ex… ▽ More

    Submitted 20 February, 2020; v1 submitted 25 September, 2019; originally announced September 2019.

    Comments: ICLR 2020

  17. arXiv:1906.06919  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Improving Black-box Adversarial Attacks with a Transfer-based Prior

    Authors: Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu

    Abstract: We consider the black-box adversarial setting, where the adversary has to generate adversarial perturbations without access to the target models to compute gradients. Previous methods tried to approximate the gradient either by using a transfer gradient of a surrogate white-box model, or based on the query feedback. However, these methods often suffer from low attack success rates or poor query ef… ▽ More

    Submitted 26 July, 2020; v1 submitted 17 June, 2019; originally announced June 2019.

    Comments: NeurIPS 2019; Code available at https://github.com/thu-ml/Prior-Guided-RGF

  18. arXiv:1905.10626  [pdf, other

    cs.LG cs.CR stat.ML

    Rethinking Softmax Cross-Entropy Loss for Adversarial Robustness

    Authors: Tianyu Pang, Kun Xu, Yinpeng Dong, Chao Du, Ning Chen, Jun Zhu

    Abstract: Previous work shows that adversarially robust generalization requires larger sample complexity, and the same dataset, e.g., CIFAR-10, which enables good standard accuracy may not suffice to train robust models. Since collecting new training data could be costly, we focus on better utilizing the given data by inducing the regions with high sample density in the feature space, which could lead to lo… ▽ More

    Submitted 20 February, 2020; v1 submitted 25 May, 2019; originally announced May 2019.

    Comments: ICLR 2020

  19. arXiv:1901.08846  [pdf, other

    cs.LG stat.ML

    Improving Adversarial Robustness via Promoting Ensemble Diversity

    Authors: Tianyu Pang, Kun Xu, Chao Du, Ning Chen, Jun Zhu

    Abstract: Though deep neural networks have achieved significant progress on various tasks, often enhanced by model ensemble, existing high-performance models can be vulnerable to adversarial attacks. Many efforts have been devoted to enhancing the robustness of individual networks and then constructing a straightforward ensemble, e.g., by directly averaging the outputs, which ignores the interaction among n… ▽ More

    Submitted 29 May, 2019; v1 submitted 25 January, 2019; originally announced January 2019.

    Comments: ICML 2019

  20. arXiv:1804.00097  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    Adversarial Attacks and Defences Competition

    Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe

    Abstract: To accelerate research on adversarial examples and robustness of machine learning classifiers, Google Brain organized a NIPS 2017 competition that encouraged researchers to develop new methods to generate adversarial examples as well as to develop new ways to defend against them. In this chapter, we describe the structure and organization of the competition and the solutions developed by several o… ▽ More

    Submitted 30 March, 2018; originally announced April 2018.

    Comments: 36 pages, 10 figures

  21. arXiv:1710.06081  [pdf, other

    cs.LG stat.ML

    Boosting Adversarial Attacks with Momentum

    Authors: Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, Jianguo Li

    Abstract: Deep neural networks are vulnerable to adversarial examples, which poses security concerns on these algorithms due to the potentially severe consequences. Adversarial attacks serve as an important surrogate to evaluate the robustness of deep learning models before they are deployed. However, most of existing adversarial attacks can only fool a black-box model with a low success rate. To address th… ▽ More

    Submitted 22 March, 2018; v1 submitted 17 October, 2017; originally announced October 2017.

    Comments: CVPR 2018 Spotlight

  22. arXiv:1611.04248  [pdf, ps, other

    stat.AP math.ST

    Asymptotic Inference for AR(1) Penal Data

    Authors: Jianfei Shen, Tianxiao Pang

    Abstract: A general asymptotic theory is given for the panel data AR(1) model with time series independent in different cross sections. The theory covers the cases of stationary process, nearly non-stationary process, unit root process, mildly integrated, mildly explosive and explosive processes. It is assumed that the cross-sectional dimension and time-series dimension are respectively $N$ and $T$. The res… ▽ More

    Submitted 13 November, 2016; originally announced November 2016.

    Comments: 16 pages