Skip to main content

Showing 1–34 of 34 results for author: Ilyas, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16846  [pdf, other

    cs.LG cs.CY stat.ML

    Data Debiasing with Datamodels (D3M): Improving Subgroup Robustness via Data Selection

    Authors: Saachi Jain, Kimia Hamidieh, Kristian Georgiev, Andrew Ilyas, Marzyeh Ghassemi, Aleksander Madry

    Abstract: Machine learning models can fail on subgroups that are underrepresented during training. While techniques such as dataset balancing can improve performance on underperforming groups, they require access to training group annotations and can end up removing large portions of the dataset. In this paper, we introduce Data Debiasing with Datamodels (D3M), a debiasing approach which isolates and remove… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  2. arXiv:2405.05596  [pdf, other

    cs.CY cs.HC cs.IR cs.LG stat.ME

    Measuring Strategization in Recommendation: Users Adapt Their Behavior to Shape Future Content

    Authors: Sarah H. Cen, Andrew Ilyas, Jennifer Allen, Hannah Li, Aleksander Madry

    Abstract: Most modern recommendation algorithms are data-driven: they generate personalized recommendations by observing users' past behaviors. A common assumption in recommendation is that how a user interacts with a piece of content (e.g., whether they choose to "like" it) is a reflection of the content, but not of the algorithm that generated it. Although this assumption is convenient, it fails to captur… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

  3. arXiv:2404.11534  [pdf, other

    cs.LG cs.AI stat.ML

    Decomposing and Editing Predictions by Modeling Model Computation

    Authors: Harshay Shah, Andrew Ilyas, Aleksander Madry

    Abstract: How does the internal computation of a machine learning model transform inputs into predictions? In this paper, we introduce a task called component modeling that aims to address this question. The goal of component modeling is to decompose an ML model's prediction in terms of its components -- simple functions (e.g., convolution filters, attention heads) that are the "building blocks" of model co… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

  4. arXiv:2312.17666  [pdf, other

    cs.CY cs.GT cs.LG stat.ML

    User Strategization and Trustworthy Algorithms

    Authors: Sarah H. Cen, Andrew Ilyas, Aleksander Madry

    Abstract: Many human-facing algorithms -- including those that power recommender systems or hiring decision tools -- are trained on data provided by their users. The developers of these algorithms commonly adopt the assumption that the data generating process is exogenous: that is, how a user reacts to a given prompt (e.g., a recommendation or hiring suggestion) depends on the prompt and not on the algorith… ▽ More

    Submitted 29 December, 2023; originally announced December 2023.

  5. arXiv:2307.10163  [pdf, other

    cs.CR cs.LG stat.ML

    Rethinking Backdoor Attacks

    Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry

    Abstract: In a backdoor attack, an adversary inserts maliciously constructed backdoor examples into a training set to make the resulting model vulnerable to manipulation. Defending against such attacks typically involves viewing these inserted examples as outliers in the training set and using techniques from robust statistics to detect and remove them. In this work, we present a different approach to the… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: ICML 2023

  6. arXiv:2306.12517  [pdf, other

    cs.LG cs.CV

    FFCV: Accelerating Training by Removing Data Bottlenecks

    Authors: Guillaume Leclerc, Andrew Ilyas, Logan Engstrom, Sung Min Park, Hadi Salman, Aleksander Madry

    Abstract: We present FFCV, a library for easy and fast machine learning model training. FFCV speeds up model training by eliminating (often subtle) data bottlenecks from the training process. In particular, we combine techniques such as an efficient file storage format, caching, data pre-loading, asynchronous data transfer, and just-in-time compilation to (a) make data loading and transfer significantly mor… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  7. arXiv:2303.14186  [pdf, other

    stat.ML cs.LG

    TRAK: Attributing Model Behavior at Scale

    Authors: Sung Min Park, Kristian Georgiev, Andrew Ilyas, Guillaume Leclerc, Aleksander Madry

    Abstract: The goal of data attribution is to trace model predictions back to training data. Despite a long line of work towards this goal, existing approaches to data attribution tend to force users to choose between computational tractability and efficacy. That is, computationally tractable methods can struggle with accurately attributing model predictions in non-convex settings (e.g., in the context of de… ▽ More

    Submitted 3 April, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

  8. arXiv:2302.06588  [pdf, other

    cs.LG

    Raising the Cost of Malicious AI-Powered Image Editing

    Authors: Hadi Salman, Alaa Khaddaj, Guillaume Leclerc, Andrew Ilyas, Aleksander Madry

    Abstract: We present an approach to mitigating the risks of malicious image editing posed by large diffusion models. The key idea is to immunize images so as to make them resistant to manipulation by these models. This immunization relies on injection of imperceptible adversarial perturbations designed to disrupt the operation of the targeted diffusion models, forcing them to generate unrealistic images. We… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

  9. arXiv:2211.12491  [pdf, other

    cs.LG cs.CV stat.ML

    ModelDiff: A Framework for Comparing Learning Algorithms

    Authors: Harshay Shah, Sung Min Park, Andrew Ilyas, Aleksander Madry

    Abstract: We study the problem of (learning) algorithm comparison, where the goal is to find differences between models trained with two different learning algorithms. We begin by formalizing this goal as one of finding distinguishing feature transformations, i.e., input transformations that change the predictions of models trained with one learning algorithm but not the other. We then present ModelDiff, a… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  10. arXiv:2207.02842  [pdf, other

    cs.LG

    When does Bias Transfer in Transfer Learning?

    Authors: Hadi Salman, Saachi Jain, Andrew Ilyas, Logan Engstrom, Eric Wong, Aleksander Madry

    Abstract: Using transfer learning to adapt a pre-trained "source model" to a downstream "target task" can dramatically increase performance with seemingly no downside. In this work, we demonstrate that there can exist a downside after all: bias transfer, or the tendency for biases of the source model to persist even after adapting the model to the target class. Through a combination of synthetic and natural… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

  11. arXiv:2205.03246  [pdf, other

    math.ST cs.DS cs.LG stat.ML

    What Makes A Good Fisherman? Linear Regression under Self-Selection Bias

    Authors: Yeshwanth Cherapanamjeri, Constantinos Daskalakis, Andrew Ilyas, Manolis Zampetakis

    Abstract: In the classical setting of self-selection, the goal is to learn $k$ models, simultaneously from observations $(x^{(i)}, y^{(i)})$ where $y^{(i)}$ is the output of one of $k$ underlying models on input $x^{(i)}$. In contrast to mixture models, where we observe the output of a randomly selected model, here the observed model depends on the outputs themselves, and is determined by some known selecti… ▽ More

    Submitted 10 December, 2022; v1 submitted 6 May, 2022; originally announced May 2022.

  12. arXiv:2205.02060  [pdf, ps, other

    cs.GT cs.DS math.ST stat.ML

    Estimation of Standard Auction Models

    Authors: Yeshwanth Cherapanamjeri, Constantinos Daskalakis, Andrew Ilyas, Manolis Zampetakis

    Abstract: We provide efficient estimation methods for first- and second-price auctions under independent (asymmetric) private values and partial observability. Given a finite set of observations, each comprising the identity of the winner and the price they paid in a sequence of identical auctions, we provide algorithms for non-parametrically estimating the bid distribution of each bidder, as well as their… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

  13. arXiv:2202.00622  [pdf, other

    stat.ML cs.CV cs.LG

    Datamodels: Predicting Predictions from Training Data

    Authors: Andrew Ilyas, Sung Min Park, Logan Engstrom, Guillaume Leclerc, Aleksander Madry

    Abstract: We present a conceptual framework, datamodeling, for analyzing the behavior of a model class in terms of the training data. For any fixed "target" example $x$, training set $S$, and learning algorithm, a datamodel is a parameterized function $2^S \to \mathbb{R}$ that for any subset of $S' \subset S$ -- using only information about which examples of $S$ are contained in $S'$ -- predicts the outcome… ▽ More

    Submitted 1 February, 2022; originally announced February 2022.

  14. arXiv:2111.11862  [pdf, other

    cs.CV cs.HC cs.LG

    Inferring User Facial Affect in Work-like Settings

    Authors: Chaudhary Muhammad Aqdus Ilyas, Siyang Song, Hatice Gunes

    Abstract: Unlike the six basic emotions of happiness, sadness, fear, anger, disgust and surprise, modelling and predicting dimensional affect in terms of valence (positivity - negativity) and arousal (intensity) has proven to be more flexible, applicable and useful for naturalistic and real-world settings. In this paper, we aim to infer user facial affect when the user is engaged in multiple work-like tasks… ▽ More

    Submitted 21 November, 2021; originally announced November 2021.

  15. arXiv:2106.03805  [pdf, other

    cs.CV cs.LG stat.ML

    3DB: A Framework for Debugging Computer Vision Models

    Authors: Guillaume Leclerc, Hadi Salman, Andrew Ilyas, Sai Vemprala, Logan Engstrom, Vibhav Vineet, Kai Xiao, Pengchuan Zhang, Shibani Santurkar, Greg Yang, Ashish Kapoor, Aleksander Madry

    Abstract: We introduce 3DB: an extendable, unified framework for testing and debugging vision models using photorealistic simulation. We demonstrate, through a wide range of use cases, that 3DB allows users to discover vulnerabilities in computer vision systems and gain insights into how models make decisions. 3DB captures and generalizes many robustness analyses from prior work, and enables one to study th… ▽ More

    Submitted 7 June, 2021; originally announced June 2021.

  16. arXiv:2012.12235  [pdf, other

    cs.CV cs.LG

    Unadversarial Examples: Designing Objects for Robust Vision

    Authors: Hadi Salman, Andrew Ilyas, Logan Engstrom, Sai Vemprala, Aleksander Madry, Ashish Kapoor

    Abstract: We study a class of realistic computer vision settings wherein one can influence the design of the objects being recognized. We develop a framework that leverages this capability to significantly improve vision models' performance and robustness. This framework exploits the sensitivity of modern machine learning algorithms to input perturbations in order to design "robust objects," i.e., objects t… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

  17. arXiv:2007.08489  [pdf, other

    cs.CV cs.LG stat.ML

    Do Adversarially Robust ImageNet Models Transfer Better?

    Authors: Hadi Salman, Andrew Ilyas, Logan Engstrom, Ashish Kapoor, Aleksander Madry

    Abstract: Transfer learning is a widely-used paradigm in deep learning, where models pre-trained on standard datasets can be efficiently adapted to downstream tasks. Typically, better pre-trained models yield better transfer results, suggesting that initial accuracy is a key aspect of transfer learning performance. In this work, we identify another such aspect: we find that adversarially robust models, whil… ▽ More

    Submitted 7 December, 2020; v1 submitted 16 July, 2020; originally announced July 2020.

    Comments: NeurIPS 2020

  18. arXiv:2006.09994  [pdf, other

    cs.CV cs.LG

    Noise or Signal: The Role of Image Backgrounds in Object Recognition

    Authors: Kai Xiao, Logan Engstrom, Andrew Ilyas, Aleksander Madry

    Abstract: We assess the tendency of state-of-the-art object recognition models to depend on signals from image backgrounds. We create a toolkit for disentangling foreground and background signal on ImageNet images, and find that (a) models can achieve non-trivial accuracy by relying on the background alone, (b) models often misclassify images even in the presence of correctly classified foregrounds--up to 8… ▽ More

    Submitted 17 June, 2020; originally announced June 2020.

  19. arXiv:2005.12729  [pdf, other

    cs.LG cs.RO stat.ML

    Implementation Matters in Deep Policy Gradients: A Case Study on PPO and TRPO

    Authors: Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Firdaus Janoos, Larry Rudolph, Aleksander Madry

    Abstract: We study the roots of algorithmic progress in deep policy gradient algorithms through a case study on two popular algorithms: Proximal Policy Optimization (PPO) and Trust Region Policy Optimization (TRPO). Specifically, we investigate the consequences of "code-level optimizations:" algorithm augmentations found only in implementations or described as auxiliary details to the core algorithm. Seemin… ▽ More

    Submitted 25 May, 2020; originally announced May 2020.

    Comments: ICLR 2020 version. arXiv admin note: text overlap with arXiv:1811.02553

  20. arXiv:2005.11295  [pdf, other

    cs.CV cs.LG stat.ML

    From ImageNet to Image Classification: Contextualizing Progress on Benchmarks

    Authors: Dimitris Tsipras, Shibani Santurkar, Logan Engstrom, Andrew Ilyas, Aleksander Madry

    Abstract: Building rich machine learning datasets in a scalable manner often necessitates a crowd-sourced data collection pipeline. In this work, we use human studies to investigate the consequences of employing such a pipeline, focusing on the popular ImageNet dataset. We study how specific design choices in the ImageNet creation process impact the fidelity of the resulting dataset---including the introduc… ▽ More

    Submitted 22 May, 2020; originally announced May 2020.

  21. arXiv:2005.09619  [pdf, other

    stat.ML cs.CV cs.LG

    Identifying Statistical Bias in Dataset Replication

    Authors: Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Jacob Steinhardt, Aleksander Madry

    Abstract: Dataset replication is a useful tool for assessing whether improvements in test accuracy on a specific benchmark correspond to improvements in models' ability to generalize reliably. In this work, we present unintuitive yet significant ways in which standard approaches to dataset replication introduce statistical bias, skewing the resulting observations. We study ImageNet-v2, a replication of the… ▽ More

    Submitted 2 September, 2020; v1 submitted 19 May, 2020; originally announced May 2020.

  22. arXiv:1906.09453  [pdf, other

    cs.CV cs.LG cs.NE stat.ML

    Image Synthesis with a Single (Robust) Classifier

    Authors: Shibani Santurkar, Dimitris Tsipras, Brandon Tran, Andrew Ilyas, Logan Engstrom, Aleksander Madry

    Abstract: We show that the basic classification framework alone can be used to tackle some of the most challenging tasks in image synthesis. In contrast to other state-of-the-art approaches, the toolkit we develop is rather minimal: it uses a single, off-the-shelf classifier for all these tasks. The crux of our approach is that we train this classifier to be adversarially robust. It turns out that adversari… ▽ More

    Submitted 8 August, 2019; v1 submitted 6 June, 2019; originally announced June 2019.

  23. arXiv:1906.00945  [pdf, other

    stat.ML cs.CV cs.LG cs.NE

    Adversarial Robustness as a Prior for Learned Representations

    Authors: Logan Engstrom, Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Brandon Tran, Aleksander Madry

    Abstract: An important goal in deep learning is to learn versatile, high-level feature representations of input data. However, standard networks' representations seem to possess shortcomings that, as we illustrate, prevent them from fully realizing this goal. In this work, we show that robust optimization can be re-cast as a tool for enforcing priors on the features learned by deep neural networks. It turns… ▽ More

    Submitted 27 September, 2019; v1 submitted 3 June, 2019; originally announced June 2019.

  24. arXiv:1905.02175  [pdf, other

    stat.ML cs.CR cs.CV cs.LG

    Adversarial Examples Are Not Bugs, They Are Features

    Authors: Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry

    Abstract: Adversarial examples have attracted significant attention in machine learning, but the reasons for their existence and pervasiveness remain unclear. We demonstrate that adversarial examples can be directly attributed to the presence of non-robust features: features derived from patterns in the data distribution that are highly predictive, yet brittle and incomprehensible to humans. After capturing… ▽ More

    Submitted 12 August, 2019; v1 submitted 6 May, 2019; originally announced May 2019.

  25. arXiv:1811.02553  [pdf, other

    cs.LG cs.NE cs.RO stat.ML

    A Closer Look at Deep Policy Gradients

    Authors: Andrew Ilyas, Logan Engstrom, Shibani Santurkar, Dimitris Tsipras, Firdaus Janoos, Larry Rudolph, Aleksander Madry

    Abstract: We study how the behavior of deep policy gradient algorithms reflects the conceptual framework motivating their development. To this end, we propose a fine-grained analysis of state-of-the-art methods based on key elements of this framework: gradient estimation, value prediction, and optimization landscapes. Our results show that the behavior of deep policy gradient algorithms often deviates from… ▽ More

    Submitted 25 May, 2020; v1 submitted 6 November, 2018; originally announced November 2018.

    Comments: ICLR 2020 version

  26. arXiv:1807.10272  [pdf, other

    stat.ML cs.CR cs.CV cs.LG

    Evaluating and Understanding the Robustness of Adversarial Logit Pairing

    Authors: Logan Engstrom, Andrew Ilyas, Anish Athalye

    Abstract: We evaluate the robustness of Adversarial Logit Pairing, a recently proposed defense against adversarial examples. We find that a network trained with Adversarial Logit Pairing achieves 0.6% accuracy in the threat model in which the defense is considered. We provide a brief overview of the defense and the threat models/claims considered, as well as a discussion of the methodology and results of ou… ▽ More

    Submitted 23 November, 2018; v1 submitted 26 July, 2018; originally announced July 2018.

    Comments: NeurIPS SECML 2018. Source code at https://github.com/labsix/adversarial-logit-pairing-analysis

  27. arXiv:1807.07978  [pdf, other

    stat.ML cs.CR cs.LG

    Prior Convictions: Black-Box Adversarial Attacks with Bandits and Priors

    Authors: Andrew Ilyas, Logan Engstrom, Aleksander Madry

    Abstract: We study the problem of generating adversarial examples in a black-box setting in which only loss-oracle access to a model is available. We introduce a framework that conceptually unifies much of the existing work on black-box attacks, and we demonstrate that the current state-of-the-art methods are optimal in a natural sense. Despite this optimality, we show how to improve black-box attacks by br… ▽ More

    Submitted 27 March, 2019; v1 submitted 20 July, 2018; originally announced July 2018.

    Comments: To appear at ICLR 2019; Code available at https://git.io/blackbox-bandits

  28. arXiv:1805.11604  [pdf, other

    stat.ML cs.LG cs.NE

    How Does Batch Normalization Help Optimization?

    Authors: Shibani Santurkar, Dimitris Tsipras, Andrew Ilyas, Aleksander Madry

    Abstract: Batch Normalization (BatchNorm) is a widely adopted technique that enables faster and more stable training of deep neural networks (DNNs). Despite its pervasiveness, the exact reasons for BatchNorm's effectiveness are still poorly understood. The popular belief is that this effectiveness stems from controlling the change of the layers' input distributions during training to reduce the so-called "i… ▽ More

    Submitted 14 April, 2019; v1 submitted 29 May, 2018; originally announced May 2018.

    Comments: In NeurIPS'18

  29. arXiv:1804.08598  [pdf, other

    cs.CV cs.CR stat.ML

    Black-box Adversarial Attacks with Limited Queries and Information

    Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin

    Abstract: Current neural network-based classifiers are susceptible to adversarial examples even in the black-box setting, where the attacker only has query access to the model. In practice, the threat model for real-world systems is often more restrictive than the typical black-box model where the adversary can observe the full output of the network on arbitrarily many chosen inputs. We define three realist… ▽ More

    Submitted 11 July, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

    Comments: ICML 2018. This supercedes the previous paper "Query-efficient Black-box adversarial examples."

  30. arXiv:1712.09196  [pdf, other

    cs.CV cs.CR cs.LG stat.ML

    The Robust Manifold Defense: Adversarial Training using Generative Models

    Authors: Ajil Jalal, Andrew Ilyas, Constantinos Daskalakis, Alexandros G. Dimakis

    Abstract: We propose a new type of attack for finding adversarial examples for image classifiers. Our method exploits spanners, i.e. deep neural networks whose input space is low-dimensional and whose output range approximates the set of images of interest. Spanners may be generators of GANs or decoders of VAEs. The key idea in our attack is to search over latent code pairs to find ones that generate nearby… ▽ More

    Submitted 9 July, 2019; v1 submitted 26 December, 2017; originally announced December 2017.

    Comments: Added pseudo code for defense-gan break

  31. arXiv:1712.07113  [pdf, other

    cs.CV cs.LG stat.ML

    Query-Efficient Black-box Adversarial Examples (superceded)

    Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin

    Abstract: Note that this paper is superceded by "Black-Box Adversarial Attacks with Limited Queries and Information." Current neural network-based image classifiers are susceptible to adversarial examples, even in the black-box setting, where the attacker is limited to query access without access to gradients. Previous methods --- substitute networks and coordinate-based finite-difference methods --- are… ▽ More

    Submitted 6 April, 2018; v1 submitted 19 December, 2017; originally announced December 2017.

    Comments: Superceded by "Black-Box Adversarial Attacks with Limited Queries and Information."

  32. arXiv:1711.00141  [pdf, other

    cs.LG cs.GT stat.ML

    Training GANs with Optimism

    Authors: Constantinos Daskalakis, Andrew Ilyas, Vasilis Syrgkanis, Haoyang Zeng

    Abstract: We address the issue of limit cycling behavior in training Generative Adversarial Networks and propose the use of Optimistic Mirror Decent (OMD) for training Wasserstein GANs. Recent theoretical results have shown that optimistic mirror decent (OMD) can enjoy faster regret rates in the context of zero-sum games. WGANs is exactly a context of solving a zero-sum game with simultaneous no-regret dyna… ▽ More

    Submitted 13 February, 2018; v1 submitted 31 October, 2017; originally announced November 2017.

  33. arXiv:1710.11528  [pdf, other

    cs.DB

    Extracting Syntactic Patterns from Databases

    Authors: Andrew Ilyas, Joana M. F. da Trindade, Raul Castro Fernandez, Samuel Madden

    Abstract: Many database columns contain string or numerical data that conforms to a pattern, such as phone numbers, dates, addresses, product identifiers, and employee ids. These patterns are useful in a number of data processing applications, including understanding what a specific field represents when field names are ambiguous, identifying outlier values, and finding similar fields across data sets. One… ▽ More

    Submitted 6 December, 2017; v1 submitted 31 October, 2017; originally announced October 2017.

  34. arXiv:1707.07397  [pdf, other

    cs.CV

    Synthesizing Robust Adversarial Examples

    Authors: Anish Athalye, Logan Engstrom, Andrew Ilyas, Kevin Kwok

    Abstract: Standard methods for generating adversarial examples for neural networks do not consistently fool neural network classifiers in the physical world due to a combination of viewpoint shifts, camera noise, and other natural transformations, limiting their relevance to real-world systems. We demonstrate the existence of robust 3D adversarial objects, and we present the first algorithm for synthesizing… ▽ More

    Submitted 7 June, 2018; v1 submitted 24 July, 2017; originally announced July 2017.

    Comments: ICML 2018