Skip to main content

Showing 1–7 of 7 results for author: Harikumar, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.13411  [pdf, other

    cs.CV cs.LG

    Composite Concept Extraction through Backdooring

    Authors: Banibrata Ghosh, Haripriya Harikumar, Khoa D Doan, Svetha Venkatesh, Santu Rana

    Abstract: Learning composite concepts, such as \textquotedbl red car\textquotedbl , from individual examples -- like a white car representing the concept of \textquotedbl car\textquotedbl{} and a red strawberry representing the concept of \textquotedbl red\textquotedbl -- is inherently challenging. This paper introduces a novel method called Composite Concept Extractor (CoCE), which leverages techniques fro… ▽ More

    Submitted 21 June, 2024; v1 submitted 19 June, 2024; originally announced June 2024.

  2. arXiv:2402.03577  [pdf, other

    cs.LG

    Revisiting the Dataset Bias Problem from a Statistical Perspective

    Authors: Kien Do, Dung Nguyen, Hung Le, Thao Le, Dang Nguyen, Haripriya Harikumar, Truyen Tran, Santu Rana, Svetha Venkatesh

    Abstract: In this paper, we study the "dataset bias" problem from a statistical standpoint, and identify the main cause of the problem as the strong correlation between a class attribute u and a non-class attribute b in the input x, represented by p(u|b) differing significantly from p(u). Since p(u|b) appears as part of the sampling distributions in the standard maximum log-likelihood (MLL) objective, a mod… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  3. arXiv:2209.10359  [pdf, other

    cs.CV cs.AI

    Momentum Adversarial Distillation: Handling Large Distribution Shifts in Data-Free Knowledge Distillation

    Authors: Kien Do, Hung Le, Dung Nguyen, Dang Nguyen, Haripriya Harikumar, Truyen Tran, Santu Rana, Svetha Venkatesh

    Abstract: Data-free Knowledge Distillation (DFKD) has attracted attention recently thanks to its appealing capability of transferring knowledge from a teacher network to a student network without using training data. The main idea is to use a generator to synthesize data for training the student. As the generator gets updated, the distribution of synthetic data will change. Such distribution shift could be… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: Accepted to NeurIPS 2022

  4. arXiv:2207.03895  [pdf, other

    cs.CV

    Defense Against Multi-target Trojan Attacks

    Authors: Haripriya Harikumar, Santu Rana, Kien Do, Sunil Gupta, Wei Zong, Willy Susilo, Svetha Venkastesh

    Abstract: Adversarial attacks on deep learning-based models pose a significant threat to the current AI infrastructure. Among them, Trojan attacks are the hardest to defend against. In this paper, we first introduce a variation of the Badnet kind of attacks that introduces Trojan backdoors to multiple target classes and allows triggers to be placed anywhere in the image. The former makes it more potent and… ▽ More

    Submitted 8 July, 2022; originally announced July 2022.

  5. arXiv:2202.12154  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Towards Effective and Robust Neural Trojan Defenses via Input Filtering

    Authors: Kien Do, Haripriya Harikumar, Hung Le, Dung Nguyen, Truyen Tran, Santu Rana, Dang Nguyen, Willy Susilo, Svetha Venkatesh

    Abstract: Trojan attacks on deep neural networks are both dangerous and surreptitious. Over the past few years, Trojan attacks have advanced from using only a single input-agnostic trigger and targeting only one class to using multiple, input-specific triggers and targeting multiple classes. However, Trojan defenses have not caught up with this development. Most defense methods still make inadequate assumpt… ▽ More

    Submitted 14 February, 2023; v1 submitted 24 February, 2022; originally announced February 2022.

    Comments: Accepted to ECCV 2022

  6. arXiv:2110.13414  [pdf, ps, other

    cs.CV cs.CR

    Semantic Host-free Trojan Attack

    Authors: Haripriya Harikumar, Kien Do, Santu Rana, Sunil Gupta, Svetha Venkatesh

    Abstract: In this paper, we propose a novel host-free Trojan attack with triggers that are fixed in the semantic space but not necessarily in the pixel space. In contrast to existing Trojan attacks which use clean input images as hosts to carry small, meaningless trigger patterns, our attack considers triggers as full-sized images belonging to a semantically meaningful object class. Since in our attack, the… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

  7. arXiv:2006.05646  [pdf, ps, other

    cs.CV

    Scalable Backdoor Detection in Neural Networks

    Authors: Haripriya Harikumar, Vuong Le, Santu Rana, Sourangshu Bhattacharya, Sunil Gupta, Svetha Venkatesh

    Abstract: Recently, it has been shown that deep learning models are vulnerable to Trojan attacks, where an attacker can install a backdoor during training time to make the resultant model misidentify samples contaminated with a small trigger patch. Current backdoor detection methods fail to achieve good detection performance and are computationally expensive. In this paper, we propose a novel trigger revers… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.