Skip to main content

Showing 1–11 of 11 results for author: Cornelius, C

.
  1. arXiv:2405.07969  [pdf, other

    cs.CV cs.AI

    Investigating the Semantic Robustness of CLIP-based Zero-Shot Anomaly Segmentation

    Authors: Kevin Stangl, Marius Arvinte, Weilin Xu, Cory Cornelius

    Abstract: Zero-shot anomaly segmentation using pre-trained foundation models is a promising approach that enables effective algorithms without expensive, domain-specific training or fine-tuning. Ensuring that these methods work across various environmental conditions and are robust to distribution shifts is an open problem. We investigate the performance of WinCLIP [14] zero-shot anomaly segmentation algori… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  2. arXiv:2310.07084  [pdf, other

    cs.LG

    Investigating the Adversarial Robustness of Density Estimation Using the Probability Flow ODE

    Authors: Marius Arvinte, Cory Cornelius, Jason Martin, Nageen Himayat

    Abstract: Beyond their impressive sampling capabilities, score-based diffusion models offer a powerful analysis tool in the form of unbiased density estimation of a query sample under the training data distribution. In this work, we investigate the robustness of density estimation using the probability flow (PF) neural ordinary differential equation (ODE) model against gradient-based likelihood maximization… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  3. arXiv:2308.16258  [pdf, other

    cs.CV

    Robust Principles: Architectural Design Principles for Adversarially Robust CNNs

    Authors: ShengYun Peng, Weilin Xu, Cory Cornelius, Matthew Hull, Kevin Li, Rahul Duggal, Mansi Phute, Jason Martin, Duen Horng Chau

    Abstract: Our research aims to unify existing works' diverging opinions on how architectural components affect the adversarial robustness of CNNs. To accomplish our goal, we synthesize a suite of three generalizable robust architectural design principles: (a) optimal range for depth and width configurations, (b) preferring convolutional over patchify stem stage, and (c) robust residual block design through… ▽ More

    Submitted 31 August, 2023; v1 submitted 30 August, 2023; originally announced August 2023.

    Comments: Published at BMVC'23

  4. arXiv:2308.07308  [pdf, other

    cs.CL cs.AI

    LLM Self Defense: By Self Examination, LLMs Know They Are Being Tricked

    Authors: Mansi Phute, Alec Helbling, Matthew Hull, ShengYun Peng, Sebastian Szyller, Cory Cornelius, Duen Horng Chau

    Abstract: Large language models (LLMs) are popular for high-quality text generation but can produce harmful content, even when aligned with human values through reinforcement learning. Adversarial prompts can bypass their safety measures. We propose LLM Self Defense, a simple approach to defend against these attacks by having an LLM screen the induced responses. Our method does not require any fine-tuning,… ▽ More

    Submitted 2 May, 2024; v1 submitted 14 August, 2023; originally announced August 2023.

  5. arXiv:2301.03110  [pdf, other

    cs.CV cs.AI

    RobArch: Designing Robust Architectures against Adversarial Attacks

    Authors: ShengYun Peng, Weilin Xu, Cory Cornelius, Kevin Li, Rahul Duggal, Duen Horng Chau, Jason Martin

    Abstract: Adversarial Training is the most effective approach for improving the robustness of Deep Neural Networks (DNNs). However, compared to the large body of research in optimizing the adversarial training process, there are few investigations into how architecture components affect robustness, and they rarely constrain model capacity. Thus, it is unclear where robustness precisely comes from. In this w… ▽ More

    Submitted 8 January, 2023; originally announced January 2023.

  6. arXiv:2208.10445  [pdf, other

    cs.CR cs.LG

    Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models

    Authors: Xinlei He, Zheng Li, Weilin Xu, Cory Cornelius, Yang Zhang

    Abstract: Machine learning models are prone to memorizing sensitive data, making them vulnerable to membership inference attacks in which an adversary aims to infer whether an input sample was used to train the model. Over the past few years, researchers have produced many membership inference attacks and defenses. However, these attacks and defenses employ a variety of strategies and are conducted in diffe… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

  7. arXiv:2207.10719  [pdf, other

    cs.CV cs.AI cs.LG

    Synthetic Dataset Generation for Adversarial Machine Learning Research

    Authors: Xiruo Liu, Shibani Singh, Cory Cornelius, Colin Busho, Mike Tan, Anindya Paul, Jason Martin

    Abstract: Existing adversarial example research focuses on digitally inserted perturbations on top of existing natural image datasets. This construction of adversarial examples is not realistic because it may be difficult, or even impossible, for an attacker to deploy such an attack in the real-world due to sensing and environmental effects. To better understand adversarial examples against cyber-physical s… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

    Journal ref: AdvML Frontiers 2022

  8. Toward Few-step Adversarial Training from a Frequency Perspective

    Authors: Hans Shih-Han Wang, Cory Cornelius, Brandon Edwards, Jason Martin

    Abstract: We investigate adversarial-sample generation methods from a frequency domain perspective and extend standard $l_{\infty}$ Projected Gradient Descent (PGD) to the frequency domain. The resulting method, which we call Spectral Projected Gradient Descent (SPGD), has better success rate compared to PGD during early steps of the method. Adversarially training models using SPGD achieves greater adversar… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

    Comments: 9 pages, 9 figures, SPAI'20, ACM ASIACCS 2020

    MSC Class: 68T07; 68T99 ACM Class: I.2.m

    Journal ref: Proceedings of the 1st ACM Workshop on Security and Privacy on Artificial Intelligence (2020)

  9. arXiv:1904.12622  [pdf, other

    cs.CV

    Talk Proposal: Towards the Realistic Evaluation of Evasion Attacks using CARLA

    Authors: Cory Cornelius, Shang-Tse Chen, Jason Martin, Duen Horng Chau

    Abstract: In this talk we describe our content-preserving attack on object detectors, ShapeShifter, and demonstrate how to evaluate this threat in realistic scenarios. We describe how we use CARLA, a realistic urban driving simulator, to create these scenarios, and how we use ShapeShifter to generate content-preserving attacks against those scenarios.

    Submitted 18 April, 2019; originally announced April 2019.

    Comments: Submitted as talk proposal to Dependable and Secure Machine Learning (DSML '19)

  10. arXiv:1902.00541  [pdf, other

    cs.LG cs.AI cs.CR cs.CV stat.ML

    The Efficacy of SHIELD under Different Threat Models

    Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau

    Abstract: In this appraisal paper, we evaluate the efficacy of SHIELD, a compression-based defense framework for countering adversarial attacks on image classification models, which was published at KDD 2018. Here, we consider alternative threat models not studied in the original work, where we assume that an adaptive adversary is aware of the ensemble defense approach, the defensive pre-processing, and the… ▽ More

    Submitted 2 August, 2019; v1 submitted 1 February, 2019; originally announced February 2019.

    Comments: Appraisal paper of existing method accepted for oral presentation at KDD LEMINCS 2019

  11. arXiv:1804.05810  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector

    Authors: Shang-Tse Chen, Cory Cornelius, Jason Martin, Duen Horng Chau

    Abstract: Given the ability to directly manipulate image pixels in the digital input space, an adversary can easily generate imperceptible perturbations to fool a Deep Neural Network (DNN) image classifier, as demonstrated in prior work. In this work, we propose ShapeShifter, an attack that tackles the more challenging problem of crafting physical adversarial perturbations to fool image-based object detecto… ▽ More

    Submitted 30 April, 2019; v1 submitted 16 April, 2018; originally announced April 2018.

    Journal ref: Joint European Conference on Machine Learning and Knowledge Discovery in Databases, pp. 52-68, 2018