Skip to main content

Showing 1–24 of 24 results for author: Hammoud, A

.
  1. arXiv:2406.14563  [pdf, other

    cs.CL cs.AI cs.LG

    Model Merging and Safety Alignment: One Bad Model Spoils the Bunch

    Authors: Hasan Abed Al Kader Hammoud, Umberto Michieli, Fabio Pizzati, Philip Torr, Adel Bibi, Bernard Ghanem, Mete Ozay

    Abstract: Merging Large Language Models (LLMs) is a cost-effective technique for combining multiple expert LLMs into a single versatile model, retaining the expertise of the original ones. However, current approaches often overlook the importance of safety alignment during merging, leading to highly misaligned models. This work investigates the effects of model merging on alignment. We evaluate several popu… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: Under review

  2. arXiv:2406.04950  [pdf, other

    cs.RO

    Robotic in-hand manipulation with relaxed optimization

    Authors: Ali Hammoud, Valerio Belcamino, Quentin Huet, Alessandro Carfì, Mahdi Khoramshahi, Veronique Perdereau, Fulvio Mastrogiovanni

    Abstract: Dexterous in-hand manipulation is a unique and valuable human skill requiring sophisticated sensorimotor interaction with the environment while respecting stability constraints. Satisfying these constraints with generated motions is essential for a robotic platform to achieve reliable in-hand manipulation skills. Explicitly modelling these constraints can be challenging, but they can be implicitly… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

    Comments: 9 pages, 6 pictures, ROMAN 2024

  3. arXiv:2405.17437  [pdf, other

    cs.NI cs.DC

    Federated Learning and Evolutionary Game Model for Fog Federation Formation

    Authors: Zyad Yasser, Ahmad Hammoud, Azzam Mourad, Hadi Otrok, Zbigniew Dziong, Mohsen Guizani

    Abstract: In this paper, we tackle the network delays in the Internet of Things (IoT) for an enhanced QoS through a stable and optimized federated fog computing infrastructure. Network delays contribute to a decline in the Quality-of-Service (QoS) for IoT applications and may even disrupt time-critical functions. Our paper addresses the challenge of establishing fog federations, which are designed to enhanc… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  4. arXiv:2403.13808  [pdf, other

    cs.CV cs.AI cs.LG

    On Pretraining Data Diversity for Self-Supervised Learning

    Authors: Hasan Abed Al Kader Hammoud, Tuhin Das, Fabio Pizzati, Philip Torr, Adel Bibi, Bernard Ghanem

    Abstract: We explore the impact of training with more diverse datasets, characterized by the number of unique samples, on the performance of self-supervised learning (SSL) under a fixed computational budget. Our findings consistently demonstrate that increasing pretraining data diversity enhances SSL performance, albeit only when the distribution distance to the downstream data is minimal. Notably, even wit… ▽ More

    Submitted 5 April, 2024; v1 submitted 20 March, 2024; originally announced March 2024.

    Comments: Under review

  5. arXiv:2402.01832  [pdf, other

    cs.CV cs.AI cs.LG

    SynthCLIP: Are We Ready for a Fully Synthetic CLIP Training?

    Authors: Hasan Abed Al Kader Hammoud, Hani Itani, Fabio Pizzati, Philip Torr, Adel Bibi, Bernard Ghanem

    Abstract: We present SynthCLIP, a novel framework for training CLIP models with entirely synthetic text-image pairs, significantly departing from previous methods relying on real data. Leveraging recent text-to-image (TTI) generative networks and large language models (LLM), we are able to generate synthetic datasets of images and corresponding captions at any scale, with no human intervention. With trainin… ▽ More

    Submitted 2 February, 2024; originally announced February 2024.

    Comments: Under review

  6. arXiv:2401.00916  [pdf, other

    math.DS cs.AI cs.LG physics.ao-ph

    Data Assimilation in Chaotic Systems Using Deep Reinforcement Learning

    Authors: Mohamad Abed El Rahman Hammoud, Naila Raboudi, Edriss S. Titi, Omar Knio, Ibrahim Hoteit

    Abstract: Data assimilation (DA) plays a pivotal role in diverse applications, ranging from climate predictions and weather forecasts to trajectory planning for autonomous vehicles. A prime example is the widely used ensemble Kalman filter (EnKF), which relies on linear updates to minimize variance among the ensemble of forecast states. Recent advancements have seen the emergence of deep learning approaches… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

  7. arXiv:2311.11293  [pdf, other

    cs.LG

    From Categories to Classifier: Name-Only Continual Learning by Exploring the Web

    Authors: Ameya Prabhu, Hasan Abed Al Kader Hammoud, Ser-Nam Lim, Bernard Ghanem, Philip H. S. Torr, Adel Bibi

    Abstract: Continual Learning (CL) often relies on the availability of extensive annotated datasets, an assumption that is unrealistically time-consuming and costly in practice. We explore a novel paradigm termed name-only continual learning where time and cost constraints prohibit manual annotation. In this scenario, learners adapt to new category shifts using only category names without the luxury of annot… ▽ More

    Submitted 19 November, 2023; originally announced November 2023.

  8. arXiv:2310.11945  [pdf, other

    math.DS cs.CE

    Downscaling Using CDAnet Under Observational and Model Noises: The Rayleigh-Benard Convection Paradigm

    Authors: Mohamad Abed El Rahman Hammoud, Edriss S. Titi, Ibrahim Hoteit, Omar Knio

    Abstract: Efficient downscaling of large ensembles of coarse-scale information is crucial in several applications, such as oceanic and atmospheric modeling. The determining form map is a theoretical lifting function from the low-resolution solution trajectories of a dissipative dynamical system to their corresponding fine-scale counterparts. Recently, a physics-informed deep neural network ("CDAnet") was in… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

  9. arXiv:2309.14352  [pdf, other

    physics.ao-ph

    Oil Spill Risk Analysis For The NEOM Shoreline

    Authors: HVR Mittal, Mohamad Abed El Rahman Hammoud, Ana K. Carrasco, Ibrahim Hoteit, Omar Knio

    Abstract: A risk analysis is conducted considering several release sources located around the NEOM shoreline. The sources are selected close to the coast and in neighboring regions of high marine traffic. The evolution of oil spills released by these sources is simulated using the MOHID model, driven by validated, high-resolution met-ocean fields of the Red Sea. For each source, simulations are conducted ov… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: 15 pages, 8 figures

  10. In-hand manipulation planning using human motion dictionary

    Authors: Ali Hammoud, Valerio Belcamino, Alessandro Carfi, Veronique Perdereau, Fulvio Mastrogiovanni

    Abstract: Dexterous in-hand manipulation is a peculiar and useful human skill. This ability requires the coordination of many senses and hand motion to adhere to many constraints. These constraints vary and can be influenced by the object characteristics or the specific application. One of the key elements for a robotic platform to implement reliable inhand manipulation skills is to be able to integrate tho… ▽ More

    Submitted 29 August, 2023; originally announced August 2023.

    Journal ref: 2022 31st IEEE International Conference on Robot and Human Interactive Communication (RO-MAN), pp. 927-933

  11. arXiv:2305.17066  [pdf, other

    cs.AI cs.CL cs.CV cs.LG cs.MA

    Mindstorms in Natural Language-Based Societies of Mind

    Authors: Mingchen Zhuge, Haozhe Liu, Francesco Faccio, Dylan R. Ashley, Róbert Csordás, Anand Gopalakrishnan, Abdullah Hamdi, Hasan Abed Al Kader Hammoud, Vincent Herrmann, Kazuki Irie, Louis Kirsch, Bing Li, Guohao Li, Shuming Liu, **jie Mai, Piotr Piękos, Aditya Ramesh, Imanol Schlag, Weimin Shi, Aleksandar Stanić, Wenyi Wang, Yuhui Wang, Mengmeng Xu, Deng-** Fan, Bernard Ghanem , et al. (1 additional authors not shown)

    Abstract: Both Minsky's "society of mind" and Schmidhuber's "learning to think" inspire diverse societies of large multimodal neural networks (NNs) that solve problems by interviewing each other in a "mindstorm." Recent implementations of NN-based societies of minds consist of large language models (LLMs) and other NN-based experts communicating through a natural language interface. In doing so, they overco… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: 9 pages in main text + 7 pages of references + 38 pages of appendices, 14 figures in main text + 13 in appendices, 7 tables in appendices

    MSC Class: 68T07 ACM Class: I.2.6; I.2.11

  12. arXiv:2305.09275  [pdf, other

    cs.LG cs.AI cs.CV

    Rapid Adaptation in Online Continual Learning: Are We Evaluating It Right?

    Authors: Hasan Abed Al Kader Hammoud, Ameya Prabhu, Ser-Nam Lim, Philip H. S. Torr, Adel Bibi, Bernard Ghanem

    Abstract: We revisit the common practice of evaluating adaptation of Online Continual Learning (OCL) algorithms through the metric of online accuracy, which measures the accuracy of the model on the immediate next few samples. However, we show that this metric is unreliable, as even vacuous blind classifiers, which do not use input images for prediction, can achieve unrealistically high online accuracy by e… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

  13. arXiv:2304.09240  [pdf, other

    cs.CY cs.AI cs.CV cs.NI

    The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions

    Authors: Hani Sami, Ahmad Hammoud, Mouhamad Arafeh, Mohamad Wazzeh, Sarhad Arisdakessian, Mario Chahoud, Osama Wehbi, Mohamad Ajaj, Azzam Mourad, Hadi Otrok, Omar Abdel Wahab, Rabeb Mizouni, Jamal Bentahar, Chamseddine Talhi, Zbigniew Dziong, Ernesto Damiani, Mohsen Guizani

    Abstract: The Metaverse offers a second world beyond reality, where boundaries are non-existent, and possibilities are endless through engagement and immersive experiences using the virtual reality (VR) technology. Many disciplines can benefit from the advancement of the Metaverse when accurately developed, including the fields of technology, gaming, education, art, and culture. Nevertheless, develo** the… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: IEEE Communications Surveys & Tutorials 2024

  14. arXiv:2303.17760  [pdf, other

    cs.AI cs.CL cs.CY cs.LG cs.MA

    CAMEL: Communicative Agents for "Mind" Exploration of Large Language Model Society

    Authors: Guohao Li, Hasan Abed Al Kader Hammoud, Hani Itani, Dmitrii Khizbullin, Bernard Ghanem

    Abstract: The rapid advancement of chat-based language models has led to remarkable progress in complex task-solving. However, their success heavily relies on human input to guide the conversation, which can be challenging and time-consuming. This paper explores the potential of building scalable techniques to facilitate autonomous cooperation among communicative agents, and provides insight into their "cog… ▽ More

    Submitted 2 November, 2023; v1 submitted 30 March, 2023; originally announced March 2023.

    Comments: Accepted at NeurIPS'2023, 77 pages, project website: https://www.camel-ai.org, github repository: https://github.com/camel-ai/camel

  15. arXiv:2303.13211  [pdf, other

    cs.CR cs.CV cs.LG

    Don't FREAK Out: A Frequency-Inspired Approach to Detecting Backdoor Poisoned Samples in DNNs

    Authors: Hasan Abed Al Kader Hammoud, Adel Bibi, Philip H. S. Torr, Bernard Ghanem

    Abstract: In this paper we investigate the frequency sensitivity of Deep Neural Networks (DNNs) when presented with clean samples versus poisoned samples. Our analysis shows significant disparities in frequency sensitivity between these two types of samples. Building on these findings, we propose FREAK, a frequency-based poisoned sample detection algorithm that is simple yet effective. Our experimental resu… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

    Comments: Accepted at CVPRW (The Art of Robustness)

  16. arXiv:2303.11165  [pdf, other

    cs.LG cs.CV

    Computationally Budgeted Continual Learning: What Does Matter?

    Authors: Ameya Prabhu, Hasan Abed Al Kader Hammoud, Puneet Dokania, Philip H. S. Torr, Ser-Nam Lim, Bernard Ghanem, Adel Bibi

    Abstract: Continual Learning (CL) aims to sequentially train models on streams of incoming data that vary in distribution by preserving previous knowledge while adapting to new data. Current CL literature focuses on restricted access to previously seen data, while imposing no constraints on the computational budget for training. This is unreasonable for applications in-the-wild, where systems are primarily… ▽ More

    Submitted 14 July, 2023; v1 submitted 20 March, 2023; originally announced March 2023.

    Comments: CVPR 2023

  17. arXiv:2302.01047  [pdf, other

    cs.LG cs.AI cs.CV

    Real-Time Evaluation in Online Continual Learning: A New Hope

    Authors: Yasir Ghunaim, Adel Bibi, Kumail Alhamoud, Motasem Alfarra, Hasan Abed Al Kader Hammoud, Ameya Prabhu, Philip H. S. Torr, Bernard Ghanem

    Abstract: Current evaluations of Continual Learning (CL) methods typically assume that there is no constraint on training time and computation. This is an unrealistic assumption for any real-world setting, which motivates us to propose: a practical real-time evaluation of continual learning, in which the stream does not wait for the model to complete training before revealing the next data for predictions.… ▽ More

    Submitted 24 March, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: Accepted at CVPR'23 as Highlight (Top 2.5%)

  18. arXiv:2301.00986  [pdf, other

    cs.CV cs.CR cs.LG

    Look, Listen, and Attack: Backdoor Attacks Against Video Action Recognition

    Authors: Hasan Abed Al Kader Hammoud, Shuming Liu, Mohammed Alkhrashi, Fahad AlBalawi, Bernard Ghanem

    Abstract: Deep neural networks (DNNs) are vulnerable to a class of attacks called "backdoor attacks", which create an association between a backdoor trigger and a target label the attacker is interested in exploiting. A backdoored DNN performs well on clean test images, yet persistently predicts an attacker-defined label for any sample in the presence of the backdoor trigger. Although backdoor attacks have… ▽ More

    Submitted 19 January, 2023; v1 submitted 3 January, 2023; originally announced January 2023.

  19. arXiv:2211.02828  [pdf, other

    math.DS cs.CE

    Continuous and Discrete Data Assimilation with Noisy Observations for the Rayleigh-Benard Convection: A Computational Study

    Authors: Mohamad Abed El Rahman Hammoud, Olivier LeMaitre, Edriss S. Titi, Ibrahim Hoteit, Omar Knio

    Abstract: Obtaining accurate high-resolution representations of model outputs is essential to describe the system dynamics. In general, however, only spatially- and temporally-coarse observations of the system states are available. These observations can also be corrupted by noise. Downscaling is a process/scheme in which one uses coarse scale observations to reconstruct the high-resolution solution of the… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

  20. arXiv:2209.15042  [pdf, other

    cs.LG cs.AI cs.CV

    Generalizability of Adversarial Robustness Under Distribution Shifts

    Authors: Kumail Alhamoud, Hasan Abed Al Kader Hammoud, Motasem Alfarra, Bernard Ghanem

    Abstract: Recent progress in empirical and certified robustness promises to deliver reliable and deployable Deep Neural Networks (DNNs). Despite that success, most existing evaluations of DNN robustness have been done on images sampled from the same distribution on which the model was trained. However, in the real world, DNNs may be deployed in dynamic environments that exhibit significant distribution shif… ▽ More

    Submitted 6 November, 2023; v1 submitted 29 September, 2022; originally announced September 2022.

    Comments: TMLR 2023 (Featured Certification)

  21. arXiv:2206.04670  [pdf, other

    cs.CV cs.AI

    PointNeXt: Revisiting PointNet++ with Improved Training and Scaling Strategies

    Authors: Guocheng Qian, Yuchen Li, Houwen Peng, **jie Mai, Hasan Abed Al Kader Hammoud, Mohamed Elhoseiny, Bernard Ghanem

    Abstract: PointNet++ is one of the most influential neural architectures for point cloud understanding. Although the accuracy of PointNet++ has been largely surpassed by recent networks such as PointMLP and Point Transformer, we find that a large portion of the performance gain is due to improved training strategies, i.e. data augmentation and optimization techniques, and increased model sizes rather than a… ▽ More

    Submitted 12 October, 2022; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: Accepted by NeurIPS'22. Code and models are available at https://github.com/guochengqian/pointnext

  22. arXiv:2110.10538  [pdf, other

    cs.CV cs.LG

    ASSANet: An Anisotropic Separable Set Abstraction for Efficient Point Cloud Representation Learning

    Authors: Guocheng Qian, Hasan Abed Al Kader Hammoud, Guohao Li, Ali Thabet, Bernard Ghanem

    Abstract: Access to 3D point cloud representations has been widely facilitated by LiDAR sensors embedded in various mobile devices. This has led to an emerging need for fast and accurate point cloud processing techniques. In this paper, we revisit and dive deeper into PointNet++, one of the most influential yet under-explored networks, and develop faster and more accurate variants of the model. We first pre… ▽ More

    Submitted 24 October, 2021; v1 submitted 20 October, 2021; originally announced October 2021.

    Comments: ASSANet gets accepted to NeurIPS'21 as a Spotlight paper. code available at https://github.com/guochengqian/ASSANet

  23. arXiv:2109.05507  [pdf, other

    cs.CR cs.CV cs.LG

    Check Your Other Door! Creating Backdoor Attacks in the Frequency Domain

    Authors: Hasan Abed Al Kader Hammoud, Bernard Ghanem

    Abstract: Deep Neural Networks (DNNs) are ubiquitous and span a variety of applications ranging from image classification to real-time object detection. As DNN models become more sophisticated, the computational cost of training these models becomes a burden. For this reason, outsourcing the training process has been the go-to option for many DNN users. Unfortunately, this comes at the cost of vulnerability… ▽ More

    Submitted 9 January, 2023; v1 submitted 12 September, 2021; originally announced September 2021.

    Comments: Accepted to BMVC 2022

  24. arXiv:2011.03995  [pdf, ps, other

    cs.CR cs.CY

    Privacy-accuracy trade-offs in noisy digital exposure notifications

    Authors: Abbas Hammoud, Yun William Yu

    Abstract: Since the global spread of Covid-19 began to overwhelm the attempts of governments to conduct manual contact-tracing, there has been much interest in using the power of mobile phones to automate the contact-tracing process through the development of exposure notification applications. The rough idea is simple: use Bluetooth or other data-exchange technologies to record contacts between users, enab… ▽ More

    Submitted 8 November, 2020; originally announced November 2020.

    Comments: 11 pages, preprint submitted to conference