Skip to main content

Showing 1–13 of 13 results for author: Herzog, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14981  [pdf, other

    cs.AI cs.HC

    Human-AI collectives produce the most accurate differential diagnoses

    Authors: N. Zöller, J. Berger, I. Lin, N. Fu, J. Komarneni, G. Barabucci, K. Laskowski, V. Shia, B. Harack, E. A. Chu, V. Trianni, R. H. J. M. Kurvers, S. M. Herzog

    Abstract: Artificial intelligence systems, particularly large language models (LLMs), are increasingly being employed in high-stakes decisions that impact both individuals and society at large, often without adequate safeguards to ensure safety, quality, and equity. Yet LLMs hallucinate, lack common sense, and are biased - shortcomings that may reflect LLMs' inherent limitations and thus may not be remedied… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2405.01165  [pdf, other

    cs.SI cs.HC

    How A/B testing changes the dynamics of information spreading on a social network

    Authors: Matteo Ottaviani, Stefan M. Herzog, Pietro Leonardo Nickl, Philipp Lorenz-Spreen

    Abstract: A/B testing methodology is generally performed by private companies to increase user engagement and satisfaction about online features. Their usage is far from being transparent and may undermine user autonomy (e.g. polarizing individual opinions, mis- and dis- information spreading). For our analysis we leverage a crucial case study dataset (i.e. Upworthy) where news headlines were allocated to u… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  3. arXiv:2404.00411  [pdf, other

    physics.ao-ph cs.LG

    Aardvark Weather: end-to-end data-driven weather forecasting

    Authors: Anna Vaughan, Stratis Markou, Will Tebbutt, James Requeima, Wessel P. Bruinsma, Tom R. Andersson, Michael Herzog, Nicholas D. Lane, J. Scott Hosking, Richard E. Turner

    Abstract: Machine learning is revolutionising medium-range weather prediction. However it has only been applied to specific and individual components of the weather prediction pipeline. Consequently these data-driven approaches are unable to be deployed without input from conventional operational numerical weather prediction (NWP) systems, which is computationally costly and does not support end-to-end opti… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

  4. arXiv:2311.10197  [pdf, other

    cs.CR

    You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks

    Authors: Rafael Uetz, Marco Herzog, Louis Hackländer, Simon Schwarz, Martin Henze

    Abstract: Cyberattacks have grown into a major risk for organizations, with common consequences being data theft, sabotage, and extortion. Since preventive measures do not suffice to repel attacks, timely detection of successful intruders is crucial to stop them from reaching their final goals. For this purpose, many organizations utilize Security Information and Event Management (SIEM) systems to centrally… ▽ More

    Submitted 19 December, 2023; v1 submitted 16 November, 2023; originally announced November 2023.

    Comments: To be published in Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)

  5. arXiv:2309.16515  [pdf, other

    cs.CV

    Latent Noise Segmentation: How Neural Noise Leads to the Emergence of Segmentation and Grou**

    Authors: Ben Lonnqvist, Zhengqing Wu, Michael H. Herzog

    Abstract: Humans are able to segment images effortlessly without supervision using perceptual grou**. In this work, we propose a counter-intuitive computational approach to solving unsupervised perceptual grou** and segmentation: that they arise \textit{because} of neural noise, rather than in spite of it. We (1) mathematically demonstrate that under realistic assumptions, neural noise can be used to se… ▽ More

    Submitted 15 April, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

  6. arXiv:2306.07178  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Frequency-Based Vulnerability Analysis of Deep Learning Models against Image Corruptions

    Authors: Harshitha Machiraju, Michael H. Herzog, Pascal Frossard

    Abstract: Deep learning models often face challenges when handling real-world image corruptions. In response, researchers have developed image corruption datasets to evaluate the performance of deep neural networks in handling such corruptions. However, these datasets have a significant limitation: they do not account for all corruptions encountered in real-life scenarios. To address this gap, we present MU… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: Code: https://github.com/code-Assasin/MUFIACode

  7. arXiv:2210.02748  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    CLAD: A Contrastive Learning based Approach for Background Debiasing

    Authors: Ke Wang, Harshitha Machiraju, Oh-Hyeon Choung, Michael Herzog, Pascal Frossard

    Abstract: Convolutional neural networks (CNNs) have achieved superhuman performance in multiple vision tasks, especially image classification. However, unlike humans, CNNs leverage spurious features, such as background information to make decisions. This tendency creates different problems in terms of robustness or weak generalization performance. Through our work, we introduce a contrastive learning-based… ▽ More

    Submitted 6 October, 2022; originally announced October 2022.

    Comments: Accepted to British Machine Vision Conference (BMVC) 2022

  8. arXiv:2208.01456  [pdf, ps, other

    q-bio.NC cs.LG

    A comment on Guo et al. [arXiv:2206.11228]

    Authors: Ben Lonnqvist, Harshitha Machiraju, Michael H. Herzog

    Abstract: In a recent article, Guo et al. [arXiv:2206.11228] report that adversarially trained neural representations in deep networks may already be as robust as corresponding primate IT neural representations. While we find the paper's primary experiment illuminating, we have doubts about the interpretation and phrasing of the results presented in the paper.

    Submitted 2 August, 2022; originally announced August 2022.

  9. arXiv:2205.09037  [pdf, other

    cs.CV

    Empirical Advocacy of Bio-inspired Models for Robust Image Recognition

    Authors: Harshitha Machiraju, Oh-Hyeon Choung, Michael H. Herzog, Pascal Frossard

    Abstract: Deep convolutional neural networks (DCNNs) have revolutionized computer vision and are often advocated as good models of the human visual system. However, there are currently many shortcomings of DCNNs, which preclude them as a model of human vision. There are continuous attempts to use features of the human visual system to improve the robustness of neural networks to data perturbations. We provi… ▽ More

    Submitted 18 May, 2022; originally announced May 2022.

  10. arXiv:2103.09265  [pdf

    cs.CV cs.AI cs.LG

    Bio-inspired Robustness: A Review

    Authors: Harshitha Machiraju, Oh-Hyeon Choung, Pascal Frossard, Michael. H Herzog

    Abstract: Deep convolutional neural networks (DCNNs) have revolutionized computer vision and are often advocated as good models of the human visual system. However, there are currently many shortcomings of DCNNs, which preclude them as a model of human vision. For example, in the case of adversarial attacks, where adding small amounts of noise to an image, including an object, can lead to strong misclassifi… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

  11. Training a Fast Object Detector for LiDAR Range Images Using Labeled Data from Sensors with Higher Resolution

    Authors: Manuel Herzog, Klaus Dietmayer

    Abstract: In this paper, we describe a strategy for training neural networks for object detection in range images obtained from one type of LiDAR sensor using labeled data from a different type of LiDAR sensor. Additionally, an efficient model for object detection in range images for use in self-driving cars is presented. Currently, the highest performing algorithms for object detection from LiDAR measureme… ▽ More

    Submitted 5 December, 2019; v1 submitted 8 May, 2019; originally announced May 2019.

    Journal ref: 2019 IEEE Intelligent Transportation Systems Conference (ITSC), Auckland, New Zealand, 2019, pp. 2707-2713

  12. Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study

    Authors: Alena Naiakshina, Anastasia Danilova, Christian Tiefenau, Marco Herzog, Sergej Dechand, Matthew Smith

    Abstract: Passwords are still a mainstay of various security systems, as well as the cause of many usability issues. For end-users, many of these issues have been studied extensively, highlighting problems and informing design decisions for better policies and motivating research into alternatives. However, end-users are not the only ones who have usability problems with passwords! Developers who are tasked… ▽ More

    Submitted 30 August, 2017; v1 submitted 29 August, 2017; originally announced August 2017.

  13. arXiv:0705.1390  [pdf

    cs.CE

    Machine and Component Residual Life Estimation through the Application of Neural Networks

    Authors: M. A. Herzog, T. Marwala, P. S. Heyns

    Abstract: This paper concerns the use of neural networks for predicting the residual life of machines and components. In addition, the advantage of using condition-monitoring data to enhance the predictive capability of these neural networks was also investigated. A number of neural network variations were trained and tested with the data of two different reliability-related datasets. The first dataset re… ▽ More

    Submitted 10 May, 2007; originally announced May 2007.

    Comments: 22 pages