Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
Robustness of Biologically Grounded Neural Networks Against Image Perturbations
Artificial Neural Networks and Machine Learning – ICANN 2024Pages 220–230https://doi.org/10.1007/978-3-031-72359-9_16AbstractThe reliability of deep neural networks is critical for industrial applications as well as human safety and security. However, artificial deep neural networks have been found vulnerable to multiple kinds of natural, artificial, and adversarial ...
- short-paperDecember 2024
Local Explanations and Self-Explanations for Assessing Faithfulness in black-box LLMs
SETN '24: Proceedings of the 13th Hellenic Conference on Artificial IntelligenceArticle No.: 56, Pages 1–5https://doi.org/10.1145/3688671.3688775This paper introduces a novel task to assess the faithfulness of large language models (LLMs) using local perturbations and self-explanations. Many LLMs often require additional context to answer certain questions correctly. For this purpose, we propose a ...
- research-articleFebruary 2024
EMG-Based Automatic Gesture Recognition Using Lipschitz-Regularized Neural Networks
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 15, Issue 2Article No.: 26, Pages 1–25https://doi.org/10.1145/3635159This article introduces a novel approach for building a robust Automatic Gesture Recognition system based on Surface Electromyographic (sEMG) signals, acquired at the forearm level. Our main contribution is to propose new constrained learning strategies ...
- surveyJuly 2023
A Survey of Adversarial Defenses and Robustness in NLP
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 332, Pages 1–39https://doi.org/10.1145/3593042In the past few years, it has become increasingly evident that deep neural networks are not resilient enough to withstand adversarial perturbations in input data, leaving them vulnerable to attack. Various authors have proposed strong adversarial attacks ...
- research-articleMay 2023
Research on disturbing white‐box cryptography algorithm based on local differential privacy
AbstractWhite‐box cryptography protects the secret key extraction from software implementations of cryptographic primitives. The principle is to white‐box the key by using obfuscation and hide the key in the whole encryption process to ensure that the ...
-
- research-articleFebruary 2021
On Nonconvex Optimization for Machine Learning: Gradients, Stochasticity, and Saddle Points
Journal of the ACM (JACM), Volume 68, Issue 2Article No.: 11, Pages 1–29https://doi.org/10.1145/3418526Gradient descent (GD) and stochastic gradient descent (SGD) are the workhorses of large-scale machine learning. While classical theory focused on analyzing the performance of these methods in convex optimization problems, the most notable successes in ...
- research-articleJanuary 2021
Drift-Diffusion Transport in a Randomly Inhomogeneous One-Dimensional Medium
SIAM Journal on Applied Mathematics (SJAM), Volume 81, Issue 4Pages 1767–1780https://doi.org/10.1137/20M131758XOrganic semiconductors are intrinsic randomly inhomogeneous materials where charge transport occurs by hopping of the carriers between localized sites having a distribution of energy levels. However, the average carrier density seems to be accurately ...
- research-articleSeptember 2020
Prediction Stability: A New Metric for Quantitatively Evaluating DNN Outputs
GLSVLSI '20: Proceedings of the 2020 on Great Lakes Symposium on VLSIPages 537–542https://doi.org/10.1145/3386263.3407600In many realistic applications, the collected inputs of DNN face a big challenge: perturbations. Although the perturbations are imperceptible, they may cause incorrect prediction results. This paper proposes prediction stability to quantitatively ...
- research-articleJune 2020
Explaining with Counter Visual Attributes and Examples
ICMR '20: Proceedings of the 2020 International Conference on Multimedia RetrievalPages 35–43https://doi.org/10.1145/3372278.3390672In this paper, we aim to explain the decisions of neural networks by utilizing multimodal information. That is counter-intuitive attributes and counter visual examples which appear when perturbed samples are introduced. Different from previous work on ...
- research-articleJanuary 2019
Anticipating Shocks in the State Space: Characterizing Robustness and Building Increasingly Robust Evolutions
SIAM Journal on Control and Optimization (SICON), Volume 57, Issue 1Pages 490–509https://doi.org/10.1137/16M1061175Given dynamics and constraints, the viability kernel gathers points from which there exists an evolution which remains in the constraint set. In this paper, we aim at providing more information: we introduce and study the robustness map which associates ...
- research-articleSeptember 2018
Nonlinear Control Method for Nonlinear Systems with Unknown Perturbations by Combining Left and Right Factorization
AbstractIn this paper, nonlinear control design scheme for a class of nonlinear systems is proposed based on operator coprime factorization theory. In detail, two stable controllers are provided to design a Bezout identity by combining left factorization (...
- research-articleSeptember 2015
Touchscreen usability and input performance in vehicles under different road conditions: an evaluative study
AutomotiveUI '15: Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular ApplicationsPages 47–54https://doi.org/10.1145/2799250.2799284With the proliferation of the touchscreen technology, interactive displays are becoming an integrated part of the modern vehicle environment. However, due to road and driving conditions, the user input on such displays can be perturbed resulting in ...
- research-articleFebruary 2014
Causal simulation models for facing third millennium air transport sustainability
Aeronautics and air transport is a vital sector of our society and economy. Air transport logistics is one of the key players to support efficient globalization; however, sustainable mobility is at stake, due to facts such as the interdependencies with ...
- ArticleSeptember 2013
A Multiagent System Generating Complex Behaviours
ICCCI 2013: Proceedings of the 5th International Conference on Computational Collective Intelligence. Technologies and Applications - Volume 8083Pages 154–164https://doi.org/10.1007/978-3-642-40495-5_16In this paper we describe the design of a multiagent system based on simple interaction rules that can generate different overall behaviours, from asymptotically stable to chaotic, verified by the corresponding largest Lyapunov exponent. We show that ...
- research-articleJanuary 2013
Reduction of Infinite Dimensional Systems to Finite Dimensions: Compact Convergence Approach
SIAM Journal on Mathematical Analysis (SIMA), Volume 45, Issue 2Pages 600–638https://doi.org/10.1137/10080734XWe consider parameter dependent semilinear evolution problems for which, at the limit value of the parameter, the problem is finite dimensional. We introduce an abstract functional analytic framework that applies to many problems in the existing literature ...
- ArticleJune 2012
The Adaptive Topology of a Digital Image
ISVD '12: Proceedings of the 2012 Ninth International Symposium on Voronoi Diagrams in Science and EngineeringPages 41–48https://doi.org/10.1109/ISVD.2012.11In order to enjoy a digital version of the Jordan Curve Theorem, it is common to use the closed topology for the foreground and the open topology for the background of a 2-dimensional binary image. In this paper, we introduce a single topology that ...
- articleApril 2012
Analyzing subtle features of natural time series by means of a wavelet-based approach
Pattern Recognition and Image Analysis (SPPRIA), Volume 22, Issue 2Pages 323–332https://doi.org/10.1134/S1054661812020083The present paper is devoted to the development of methods and approaches intended for the analysis of natural time series. Due to the strong variability, irregularity, and complex structure of the time series in question, the problem of automatic ...
- articleDecember 2011
Structured Pseudospectra for Small Perturbations
SIAM Journal on Matrix Analysis and Applications (SIMAX), Volume 32, Issue 4Pages 1383–1398https://doi.org/10.1137/090774744In this paper we study the shape and growth of structured pseudospectra for small matrix perturbations of the form $A \leadsto A_\Delta=A+B\Delta C$, $\Delta \in \boldsymbol{\Delta}$, $\|\Delta\|\leq \delta$. It is shown that the properly scaled ...
- research-articleSeptember 2011
Proving programs robust
ESEC/FSE '11: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineeringPages 102–112https://doi.org/10.1145/2025113.2025131We present a program analysis for verifying quantitative robustness properties of programs, stated generally as: "If the inputs of a program are perturbed by an arbitrary amount epsilon, then its outputs change at most by (K . epsilon), where K can ...
- articleJuly 2011
Asymptotic integration of nonoscillatory differential equations: a unified approach
Journal of Dynamical and Control Systems (KLU-JODS), Volume 17, Issue 3Pages 329–358https://doi.org/10.1007/s10883-011-9122-3We consider the equation [ r ( t ) x ] + f ( t ) x = 0 as a perturbation of the equation [ r ( t ) y ] + g ( t ) y = 0, where the latter is assumed to be nonoscillatory at infinity. The functions r and g are real-valued, r is ...