Skip to main content

Showing 1–49 of 49 results for author: Kumar, M P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10288  [pdf, other

    cs.CL cs.LG

    Mimicking User Data: On Mitigating Fine-Tuning Risks in Closed Large Language Models

    Authors: Francisco Eiras, Aleksandar Petrov, Phillip H. S. Torr, M. Pawan Kumar, Adel Bibi

    Abstract: Fine-tuning large language models on small, high-quality datasets can enhance their performance on specific downstream tasks. Recent research shows that fine-tuning on benign, instruction-following data can inadvertently undo the safety alignment process and increase a model's propensity to comply with harmful queries. Although critical, understanding and mitigating safety risks in well-defined ta… ▽ More

    Submitted 1 July, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

  2. arXiv:2405.04260  [pdf, other

    cs.LG cs.AI

    Verified Neural Compressed Sensing

    Authors: Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Alessandro De Palma, Robert Stanforth

    Abstract: We develop the first (to the best of our knowledge) provably correct neural networks for a precise computational task, with the proof of correctness generated by an automated verification algorithm without any human input. Prior work on neural network verification has focused on partial specifications that, even when satisfied, are not sufficient to ensure that a neural network never makes errors.… ▽ More

    Submitted 8 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

  3. arXiv:2306.04431  [pdf, other

    cs.LG

    Faithful Knowledge Distillation

    Authors: Tom A. Lamb, Rudy Brunel, Krishnamurthy DJ Dvijotham, M. Pawan Kumar, Philip H. S. Torr, Francisco Eiras

    Abstract: Knowledge distillation (KD) has received much attention due to its success in compressing networks to allow for their deployment in resource-constrained systems. While the problem of adversarial robustness has been studied before in the KD setting, previous works overlook what we term the relative calibration of the student network with respect to its teacher in terms of soft confidences. In parti… ▽ More

    Submitted 11 August, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: 7pgs (main content), 4 figures

  4. arXiv:2305.13991  [pdf, other

    cs.LG cs.CR stat.ML

    Expressive Losses for Verified Robustness via Convex Combinations

    Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio

    Abstract: In order to train networks for verified adversarial robustness, it is common to over-approximate the worst-case loss over perturbation regions, resulting in networks that attain verifiability at the expense of standard performance. As shown in recent work, better trade-offs between accuracy and robustness can be obtained by carefully coupling adversarial training with over-approximations. We hypot… ▽ More

    Submitted 18 March, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: ICLR 2024

  5. arXiv:2305.10157  [pdf, other

    cs.LG math-ph

    Efficient Error Certification for Physics-Informed Neural Networks

    Authors: Francisco Eiras, Adel Bibi, Rudy Bunel, Krishnamurthy Dj Dvijotham, Philip Torr, M. Pawan Kumar

    Abstract: Recent work provides promising evidence that Physics-Informed Neural Networks (PINN) can efficiently solve partial differential equations (PDE). However, previous works have failed to provide guarantees on the worst-case residual error of a PINN across the spatio-temporal domain - a measure akin to the tolerance of numerical solvers - focusing instead on point-wise comparisons between their soluti… ▽ More

    Submitted 29 May, 2024; v1 submitted 17 May, 2023; originally announced May 2023.

    Comments: Accepted to ICML'24

  6. arXiv:2206.14987  [pdf, other

    cs.LG math.OC stat.ML

    Lookback for Learning to Branch

    Authors: Prateek Gupta, Elias B. Khalil, Didier Chetélat, Maxime Gasse, Yoshua Bengio, Andrea Lodi, M. Pawan Kumar

    Abstract: The expressive and computationally inexpensive bipartite Graph Neural Networks (GNN) have been shown to be an important component of deep learning based Mixed-Integer Linear Program (MILP) solvers. Recent works have demonstrated the effectiveness of such GNNs in replacing the branching (variable selection) heuristic in branch-and-bound (B&B) solvers. These GNNs are trained, offline and on a collec… ▽ More

    Submitted 29 December, 2022; v1 submitted 29 June, 2022; originally announced June 2022.

    Comments: Published in Transactions on Machine Learning Research (TMLR)

  7. arXiv:2206.14772  [pdf, other

    cs.LG cs.CR stat.ML

    IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound

    Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth

    Abstract: Recent works have tried to increase the verifiability of adversarially trained networks by running the attacks over domains larger than the original perturbations and adding various regularization terms to the objective. However, these algorithms either underperform or require complex and expensive stage-wise training procedures, hindering their practical applicability. We present IBP-R, a novel v… ▽ More

    Submitted 31 May, 2023; v1 submitted 29 June, 2022; originally announced June 2022.

    Comments: ICML 2022 Workshop on Formal Verification of Machine Learning

  8. arXiv:2201.12678  [pdf, ps, other

    cs.LG cs.CV

    A Stochastic Bundle Method for Interpolating Networks

    Authors: Alasdair Paren, Leonard Berrada, Rudra P. K. Poudel, M. Pawan Kumar

    Abstract: We propose a novel method for training deep neural networks that are capable of interpolation, that is, driving the empirical loss to zero. At each iteration, our method constructs a stochastic approximation of the learning objective. The approximation, known as a bundle, is a pointwise maximum of linear functions. Our bundle contains a constant function that lower bounds the empirical loss. This… ▽ More

    Submitted 29 January, 2022; originally announced January 2022.

  9. arXiv:2201.04122  [pdf, other

    cs.LG cs.AI cs.CV

    In Defense of the Unitary Scalarization for Deep Multi-Task Learning

    Authors: Vitaly Kurin, Alessandro De Palma, Ilya Kostrikov, Shimon Whiteson, M. Pawan Kumar

    Abstract: Recent multi-task learning research argues against unitary scalarization, where training simply minimizes the sum of the task losses. Several ad-hoc multi-task optimization algorithms have instead been proposed, inspired by various hypotheses about what makes multi-task settings difficult. The majority of these optimizers require per-task gradients, and introduce significant memory, runtime, and i… ▽ More

    Submitted 8 March, 2023; v1 submitted 11 January, 2022; originally announced January 2022.

    Comments: NeurIPS 2022 camera-ready version, fixed training loss y axis scale

  10. arXiv:2201.02265  [pdf, other

    cs.LG

    Learning to be adversarially robust and differentially private

    Authors: Jamie Hayes, Borja Balle, M. Pawan Kumar

    Abstract: We study the difficulties in learning that arise from robust and differentially private optimization. We first study convergence of gradient descent based adversarial training with differential privacy, taking a simple binary classification task on linearly separable data as an illustrative example. We compare the gap between adversarial and nominal risk in both private and non-private settings, s… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

    Comments: Preliminary work appeared at PPML 2021

  11. arXiv:2110.14030  [pdf, other

    cs.LG cs.CV

    Improving Local Effectiveness for Global robust training

    Authors: **gyue Lu, M. Pawan Kumar

    Abstract: Despite its popularity, deep neural networks are easily fooled. To alleviate this deficiency, researchers are actively develo** new training strategies, which encourage models that are robust to small input perturbations. Several successful robust training methods have been proposed. However, many of them rely on strong adversaries, which can be prohibitively expensive to generate when the input… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

  12. arXiv:2107.12855  [pdf, other

    cs.LG cs.AI

    Neural Network Branch-and-Bound for Neural Network Verification

    Authors: Florian Jaeckle, **gyue Lu, M. Pawan Kumar

    Abstract: Many available formal verification methods have been shown to be instances of a unified Branch-and-Bound (BaB) formulation. We propose a novel machine learning framework that can be used for designing an effective branching strategy as well as for computing better lower bounds. Specifically, we learn two graph neural networks (GNN) that both directly treat the network we want to verify as a graph… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1912.01329

  13. arXiv:2107.04570  [pdf, other

    cs.LG cs.CV

    ANCER: Anisotropic Certification via Sample-wise Volume Maximization

    Authors: Francisco Eiras, Motasem Alfarra, M. Pawan Kumar, Philip H. S. Torr, Puneet K. Dokania, Bernard Ghanem, Adel Bibi

    Abstract: Randomized smoothing has recently emerged as an effective tool that enables certification of deep neural network classifiers at scale. All prior art on randomized smoothing has focused on isotropic $\ell_p$ certification, which has the advantage of yielding certificates that can be easily compared among isotropic methods via $\ell_p$-norm radius. However, isotropic certification limits the region… ▽ More

    Submitted 31 August, 2022; v1 submitted 9 July, 2021; originally announced July 2021.

    Comments: First two authors and the last one contributed equally to this work

  14. arXiv:2105.14644  [pdf, other

    cs.LG cs.CR

    Generating Adversarial Examples with Graph Neural Networks

    Authors: Florian Jaeckle, M. Pawan Kumar

    Abstract: Recent years have witnessed the deployment of adversarial attacks to evaluate the robustness of Neural Networks. Past work in this field has relied on traditional optimization algorithms that ignore the inherent structure of the problem and data, or generative methods that rely purely on learning and often fail to generate adversarial examples where they are hard to find. To alleviate these defici… ▽ More

    Submitted 30 May, 2021; originally announced May 2021.

    Comments: To be published in UAI 2021

  15. arXiv:2105.10011  [pdf, ps, other

    cs.LG

    Comment on Stochastic Polyak Step-Size: Performance of ALI-G

    Authors: Leonard Berrada, Andrew Zisserman, M. Pawan Kumar

    Abstract: This is a short note on the performance of the ALI-G algorithm (Berrada et al., 2020) as reported in (Loizou et al., 2021). ALI-G (Berrada et al., 2020) and SPS (Loizou et al., 2021) are both adaptations of the Polyak step-size to optimize machine learning models that can interpolate the training data. The main algorithmic differences are that (1) SPS employs a multiplicative constant in the denom… ▽ More

    Submitted 20 May, 2021; originally announced May 2021.

  16. arXiv:2104.06718  [pdf, other

    cs.LG cs.LO stat.ML

    Improved Branch and Bound for Neural Network Verification via Lagrangian Decomposition

    Authors: Alessandro De Palma, Rudy Bunel, Alban Desmaison, Krishnamurthy Dvijotham, Pushmeet Kohli, Philip H. S. Torr, M. Pawan Kumar

    Abstract: We improve the scalability of Branch and Bound (BaB) algorithms for formally proving input-output properties of neural networks. First, we propose novel bounding algorithms based on Lagrangian Decomposition. Previous works have used off-the-shelf solvers to solve relaxations at each node of the BaB tree, or constructed weaker relaxations that can be solved efficiently, but lead to unnecessarily we… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: Submitted for review to JMLR. This is an extended version of our paper in the UAI-20 conference (arXiv:2002.10410)

  17. arXiv:2102.09479  [pdf, ps, other

    cs.LG

    Make Sure You're Unsure: A Framework for Verifying Probabilistic Specifications

    Authors: Leonard Berrada, Sumanth Dathathri, Krishnamurthy Dvijotham, Robert Stanforth, Rudy Bunel, Jonathan Uesato, Sven Gowal, M. Pawan Kumar

    Abstract: Most real world applications require dealing with stochasticity like sensor noise or predictive uncertainty, where formal specifications of desired behavior are inherently probabilistic. Despite the promise of formal verification in ensuring the reliability of neural networks, progress in the direction of probabilistic specifications has been limited. In this direction, we first introduce a genera… ▽ More

    Submitted 17 November, 2021; v1 submitted 18 February, 2021; originally announced February 2021.

    Comments: NeurIPS 2021 Camera Ready

  18. arXiv:2101.05844  [pdf, other

    cs.LG

    Scaling the Convex Barrier with Sparse Dual Algorithms

    Authors: Alessandro De Palma, Harkirat Singh Behl, Rudy Bunel, Philip H. S. Torr, M. Pawan Kumar

    Abstract: Tight and efficient neural network bounding is crucial to the scaling of neural network verification systems. Many efficient bounding algorithms have been presented recently, but they are often too loose to verify more challenging properties. This is due to the weakness of the employed relaxation, which is usually a linear program of size linear in the number of neurons. While a tighter linear rel… ▽ More

    Submitted 26 February, 2024; v1 submitted 14 January, 2021; originally announced January 2021.

    Comments: Journal of Machine Learning Research, 2024 (extension of ICLR 2021 paper in [v1])

  19. arXiv:2007.09397  [pdf, other

    cs.CV

    Weakly Supervised Instance Segmentation by Learning Annotation Consistent Instances

    Authors: Aditya Arun, C. V. Jawahar, M. Pawan Kumar

    Abstract: Recent approaches for weakly supervised instance segmentations depend on two components: (i) a pseudo label generation model that provides instances which are consistent with a given annotation; and (ii) an instance segmentation model, which is trained in a supervised manner using the pseudo labels as ground-truth. Unlike previous approaches, we explicitly model the uncertainty in the pseudo label… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

    Comments: To appear at ECCV 2020

  20. arXiv:2006.15212  [pdf, other

    cs.LG math.OC stat.ML

    Hybrid Models for Learning to Branch

    Authors: Prateek Gupta, Maxime Gasse, Elias B. Khalil, M. Pawan Kumar, Andrea Lodi, Yoshua Bengio

    Abstract: A recent Graph Neural Network (GNN) approach for learning to branch has been shown to successfully reduce the running time of branch-and-bound algorithms for Mixed Integer Linear Programming (MILP). While the GNN relies on a GPU for inference, MILP solvers are purely CPU-based. This severely limits its application as many practitioners may not have access to high-end GPUs. In this work, we ask two… ▽ More

    Submitted 23 October, 2020; v1 submitted 26 June, 2020; originally announced June 2020.

    Comments: 34th Conference on Neural Information Processing Systems (NeurIPS 2020), Vancouver, Canada

  21. arXiv:2002.10410  [pdf, other

    cs.LG stat.ML

    Lagrangian Decomposition for Neural Network Verification

    Authors: Rudy Bunel, Alessandro De Palma, Alban Desmaison, Krishnamurthy Dvijotham, Pushmeet Kohli, Philip H. S. Torr, M. Pawan Kumar

    Abstract: A fundamental component of neural network verification is the computation of bounds on the values their outputs can take. Previous methods have either used off-the-shelf solvers, discarding the problem structure, or relaxed the problem even further, making the bounds unnecessarily loose. We propose a novel approach based on Lagrangian Decomposition. Our formulation admits an efficient supergradien… ▽ More

    Submitted 17 June, 2020; v1 submitted 24 February, 2020; originally announced February 2020.

    Comments: UAI 2020 conference paper

  22. arXiv:1912.01329  [pdf, other

    cs.LG stat.ML

    Neural Network Branching for Neural Network Verification

    Authors: **gyue Lu, M. Pawan Kumar

    Abstract: Formal verification of neural networks is essential for their deployment in safety-critical areas. Many available formal verification methods have been shown to be instances of a unified Branch and Bound (BaB) formulation. We propose a novel framework for designing an effective branching strategy for BaB. Specifically, we learn a graph neural network (GNN) to imitate the strong branching heuristic… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

  23. arXiv:1909.06588  [pdf, other

    cs.LG cs.LO stat.ML

    Branch and Bound for Piecewise Linear Neural Network Verification

    Authors: Rudy Bunel, **gyue Lu, Ilker Turkaslan, Philip H. S. Torr, Pushmeet Kohli, M. Pawan Kumar

    Abstract: The success of Deep Learning and its potential use in many safety-critical applications has motivated research on formal verification of Neural Network (NN) models. In this context, verification involves proving or disproving that an NN model satisfies certain input-output properties. Despite the reputation of learned NN models as black boxes, and the theoretical hardness of proving useful propert… ▽ More

    Submitted 26 October, 2020; v1 submitted 14 September, 2019; originally announced September 2019.

  24. arXiv:1906.05661  [pdf, other

    cs.LG stat.ML

    Training Neural Networks for and by Interpolation

    Authors: Leonard Berrada, Andrew Zisserman, M. Pawan Kumar

    Abstract: In modern supervised learning, many deep neural networks are able to interpolate the data: the empirical loss can be driven to near zero on all samples simultaneously. In this work, we explicitly exploit this interpolation property for the design of a new optimization algorithm for deep learning, which we term Adaptive Learning-rates for Interpolation with Gradients (ALI-G). ALI-G retains the two… ▽ More

    Submitted 1 August, 2020; v1 submitted 13 June, 2019; originally announced June 2019.

    Comments: Published at ICML 2020

  25. arXiv:1811.10016  [pdf, other

    cs.CV

    Dissimilarity Coefficient based Weakly Supervised Object Detection

    Authors: Aditya Arun, C. V. Jawahar, M. Pawan Kumar

    Abstract: We consider the problem of weakly supervised object detection, where the training samples are annotated using only image-level labels that indicate the presence or absence of an object category. In order to model the uncertainty in the location of the objects, we employ a dissimilarity coefficient based probabilistic learning objective. The learning objective minimizes the difference between an an… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

    Comments: Preprint

  26. arXiv:1811.07591  [pdf, other

    cs.LG stat.ML

    Deep Frank-Wolfe For Neural Network Optimization

    Authors: Leonard Berrada, Andrew Zisserman, M. Pawan Kumar

    Abstract: Learning a deep neural network requires solving a challenging optimization problem: it is a high-dimensional, non-convex and non-smooth minimization problem with a large number of terms. The current practice in neural network optimization is to rely on the stochastic gradient descent (SGD) algorithm or its adaptive variants. However, SGD requires a hand-designed schedule for the learning rate. In… ▽ More

    Submitted 21 February, 2021; v1 submitted 19 November, 2018; originally announced November 2018.

    Comments: Published as a conference paper at ICLR 2019, last version fixing an inaccuracy (details in appendix A.5, Proposition 2)

    Journal ref: International Conference on Learning Representations 2019

  27. arXiv:1811.07209  [pdf, other

    stat.ML cs.LG

    A Statistical Approach to Assessing Neural Network Robustness

    Authors: Stefan Webb, Tom Rainforth, Yee Whye Teh, M. Pawan Kumar

    Abstract: We present a new approach to assessing the robustness of neural networks based on estimating the proportion of inputs for which a property is violated. Specifically, we estimate the probability of the event that the property is violated under an input model. Our approach critically varies from the formal verification framework in that when the property can be violated, it provides an informative n… ▽ More

    Submitted 21 February, 2019; v1 submitted 17 November, 2018; originally announced November 2018.

    Comments: To appear at the 7th International Conference on Learning Representations (ICLR 2019), New Orleans

  28. arXiv:1807.09075  [pdf, other

    cs.CV

    Learning Human Poses from Actions

    Authors: Aditya Arun, C. V. Jawahar, M. Pawan Kumar

    Abstract: We consider the task of learning to estimate human pose in still images. In order to avoid the high cost of full supervision, we propose to use a diverse data set, which consists of two types of annotations: (i) a small number of images are labeled using the expensive ground-truth pose; and (ii) other images are labeled using the inexpensive action label. As action information helps narrow down th… ▽ More

    Submitted 24 July, 2018; originally announced July 2018.

    Comments: Accepted at BMVC 2018

  29. arXiv:1805.09028  [pdf, other

    cs.CV

    Efficient Relaxations for Dense CRFs with Sparse Higher Order Potentials

    Authors: Thomas Joy, Alban Desmaison, Thalaiyasingam Ajanthan, Rudy Bunel, Mathieu Salzmann, Pushmeet Kohli, Philip H. S. Torr, M. Pawan Kumar

    Abstract: Dense conditional random fields (CRFs) have become a popular framework for modelling several problems in computer vision such as stereo correspondence and multi-class semantic segmentation. By modelling long-range interactions, dense CRFs provide a labelling that captures finer detail than their sparse counterparts. Currently, the state-of-the-art algorithm performs mean-field inference using a fi… ▽ More

    Submitted 26 October, 2018; v1 submitted 23 May, 2018; originally announced May 2018.

  30. arXiv:1802.07595  [pdf, other

    cs.LG

    Smooth Loss Functions for Deep Top-k Classification

    Authors: Leonard Berrada, Andrew Zisserman, M. Pawan Kumar

    Abstract: The top-k error is a common measure of performance in machine learning and computer vision. In practice, top-k classification is typically performed with deep neural networks trained with the cross-entropy loss. Theoretical results indeed suggest that cross-entropy is an optimal learning objective for such a task in the limit of infinite data. In the context of limited and noisy data however, the… ▽ More

    Submitted 21 February, 2018; originally announced February 2018.

    Comments: ICLR 2018

  31. arXiv:1801.06490  [pdf, other

    cs.LG cs.CV stat.ML

    Worst-case Optimal Submodular Extensions for Marginal Estimation

    Authors: Pankaj Pansari, Chris Russell, M. Pawan Kumar

    Abstract: Submodular extensions of an energy function can be used to efficiently compute approximate marginals via variational inference. The accuracy of the marginals depends crucially on the quality of the submodular extension. To identify the best possible extension, we show an equivalence between the submodular extensions of the energy and the objective functions of linear programming (LP) relaxations f… ▽ More

    Submitted 10 January, 2018; originally announced January 2018.

    Comments: Accepted to AISTATS 2018

  32. Coplanar Repeats by Energy Minimization

    Authors: James Pritts, Denys Rozumnyi, M. Pawan Kumar, Ondrej Chum

    Abstract: This paper proposes an automated method to detect, group and rectify arbitrarily-arranged coplanar repeated elements via energy minimization. The proposed energy functional combines several features that model how planes with coplanar repeats are projected into images and captures global interactions between different coplanar repeat groups and scene planes. An inference framework based on a recen… ▽ More

    Submitted 26 November, 2017; originally announced November 2017.

    Comments: 14 pages with supplemental materials attached

    Journal ref: Proceedings of the British Machine Vision Conference (BMVC) 2016

  33. arXiv:1711.00455  [pdf, ps, other

    cs.AI cs.LG

    A Unified View of Piecewise Linear Neural Network Verification

    Authors: Rudy Bunel, Ilker Turkaslan, Philip H. S. Torr, Pushmeet Kohli, M. Pawan Kumar

    Abstract: The success of Deep Learning and its potential use in many safety-critical applications has motivated research on formal verification of Neural Network (NN) models. Despite the reputation of learned NN models to behave as black boxes and the theoretical hardness of proving their properties, researchers have been successful in verifying some classes of models by exploiting their piecewise linear st… ▽ More

    Submitted 22 May, 2018; v1 submitted 1 November, 2017; originally announced November 2017.

    Comments: Updated version of "Piecewise Linear Neural Network verification: A comparative study"

  34. arXiv:1612.01094  [pdf, other

    cs.LG

    Learning to superoptimize programs - Workshop Version

    Authors: Rudy Bunel, Alban Desmaison, M. Pawan Kumar, Philip H. S. Torr, Pushmeet Kohli

    Abstract: Superoptimization requires the estimation of the best program for a given computational task. In order to deal with large programs, superoptimization techniques perform a stochastic search. This involves proposing a modification of the current program, which is accepted or rejected based on the improvement achieved. The state of the art method uses uniform proposal distributions, which fails to ex… ▽ More

    Submitted 4 December, 2016; originally announced December 2016.

    Comments: Workshop version for the NIPS NAMPI Workshop. Extended version at arXiv:1611.01787

  35. arXiv:1611.09718  [pdf, other

    cs.CV

    Efficient Linear Programming for Dense CRFs

    Authors: Thalaiyasingam Ajanthan, Alban Desmaison, Rudy Bunel, Mathieu Salzmann, Philip H. S. Torr, M. Pawan Kumar

    Abstract: The fully connected conditional random field (CRF) with Gaussian pairwise potentials has proven popular and effective for multi-class semantic segmentation. While the energy of a dense CRF can be minimized accurately using a linear programming (LP) relaxation, the state-of-the-art algorithm is too slow to be useful in practice. To alleviate this deficiency, we introduce an efficient LP minimizatio… ▽ More

    Submitted 14 February, 2017; v1 submitted 29 November, 2016; originally announced November 2016.

    Comments: 24 pages, 10 figures and 4 tables

    ACM Class: G.1.6; I.4.6

  36. arXiv:1611.02185  [pdf, other

    cs.LG

    Trusting SVM for Piecewise Linear CNNs

    Authors: Leonard Berrada, Andrew Zisserman, M. Pawan Kumar

    Abstract: We present a novel layerwise optimization algorithm for the learning objective of Piecewise-Linear Convolutional Neural Networks (PL-CNNs), a large class of convolutional neural networks. Specifically, PL-CNNs employ piecewise linear non-linearities such as the commonly used ReLU and max-pool, and an SVM classifier as the final layer. The key observation of our approach is that the problem corresp… ▽ More

    Submitted 6 March, 2017; v1 submitted 7 November, 2016; originally announced November 2016.

  37. arXiv:1611.01787  [pdf, other

    cs.LG

    Learning to superoptimize programs

    Authors: Rudy Bunel, Alban Desmaison, M. Pawan Kumar, Philip H. S. Torr, Pushmeet Kohli

    Abstract: Code super-optimization is the task of transforming any given program to a more efficient version while preserving its input-output behaviour. In some sense, it is similar to the paraphrase problem from natural language processing where the intention is to change the syntax of an utterance without changing its semantics. Code-optimization has been the subject of years of research that has resulted… ▽ More

    Submitted 28 June, 2017; v1 submitted 6 November, 2016; originally announced November 2016.

    Comments: Accepted to ICLR 2017

  38. arXiv:1608.06192  [pdf, other

    cs.CV

    Efficient Continuous Relaxations for Dense CRF

    Authors: Alban Desmaison, Rudy Bunel, Pushmeet Kohli, Philip H. S. Torr, M. Pawan Kumar

    Abstract: Dense conditional random fields (CRF) with Gaussian pairwise potentials have emerged as a popular framework for several computer vision applications such as stereo correspondence and semantic segmentation. By modeling long-range interactions, dense CRFs provide a more detailed labelling compared to their sparse counterparts. Variational inference in these dense models is performed using a filterin… ▽ More

    Submitted 22 August, 2016; originally announced August 2016.

  39. arXiv:1606.02556  [pdf, other

    cs.CV cs.AI

    DISCO Nets: DISsimilarity COefficient Networks

    Authors: Diane Bouchacourt, M. Pawan Kumar, Sebastian Nowozin

    Abstract: We present a new type of probabilistic model which we call DISsimilarity COefficient Networks (DISCO Nets). DISCO Nets allow us to efficiently sample from a posterior distribution parametrised by a neural network. During training, DISCO Nets are learned by minimising the dissimilarity coefficient between the true distribution and the estimated distribution. This allows us to tailor the training to… ▽ More

    Submitted 28 October, 2016; v1 submitted 8 June, 2016; originally announced June 2016.

  40. arXiv:1605.07969  [pdf, other

    cs.AI cs.LG

    Adaptive Neural Compilation

    Authors: Rudy Bunel, Alban Desmaison, Pushmeet Kohli, Philip H. S. Torr, M. Pawan Kumar

    Abstract: This paper proposes an adaptive neural-compilation framework to address the problem of efficient program learning. Traditional code optimisation strategies used in compilers are based on applying pre-specified set of transformations that make the code faster to execute without changing its semantics. In contrast, our work involves adapting programs to make them more efficient while considering cor… ▽ More

    Submitted 26 May, 2016; v1 submitted 25 May, 2016; originally announced May 2016.

    Comments: Submitted to NIPS 2016, code and supplementary materials will be available on author's page

  41. arXiv:1604.08269  [pdf, ps, other

    cs.CV

    Efficient Optimization for Rank-based Loss Functions

    Authors: Pritish Mohapatra, Michal Rolinek, C. V. Jawahar, Vladimir Kolmogorov, M. Pawan Kumar

    Abstract: The accuracy of information retrieval systems is often measured using complex loss functions such as the average precision (AP) or the normalized discounted cumulative gain (NDCG). Given a set of positive and negative samples, the parameters of a retrieval system can be estimated by minimizing these loss functions. However, the non-differentiability and non-decomposability of these loss functions… ▽ More

    Submitted 28 February, 2018; v1 submitted 27 April, 2016; originally announced April 2016.

    Comments: 15 pages, 2 figures

  42. arXiv:1512.07815  [pdf, other

    cs.CV

    Truncated Max-of-Convex Models

    Authors: Pankaj Pansari, M. Pawan Kumar

    Abstract: Truncated convex models (TCM) are a special case of pairwise random fields that have been widely used in computer vision. However, by restricting the order of the potentials to be at most two, they fail to capture useful image statistics. We propose a natural generalization of TCM to high-order random fields, which we call truncated max-of-convex models (TMCM). The energy function of TMCM consists… ▽ More

    Submitted 3 December, 2016; v1 submitted 24 December, 2015; originally announced December 2015.

    Comments: Under review at CVPR 2017

  43. arXiv:1507.01208  [pdf, other

    cs.CV

    Parsimonious Labeling

    Authors: Puneet K. Dokania, M. Pawan Kumar

    Abstract: We propose a new family of discrete energy minimization problems, which we call parsimonious labeling. Specifically, our energy functional consists of unary potentials and high-order clique potentials. While the unary potentials are arbitrary, the clique potentials are proportional to the {\em diversity} of set of the unique labels assigned to the clique. Intuitively, our energy functional encoura… ▽ More

    Submitted 5 July, 2015; originally announced July 2015.

  44. arXiv:1308.6721  [pdf, other

    cs.CV cs.LG

    Discriminative Parameter Estimation for Random Walks Segmentation

    Authors: Pierre-Yves Baudin, Danny Goodman, Puneet Kumar, Noura Azzabou, Pierre G. Carlier, Nikos Paragios, M. Pawan Kumar

    Abstract: The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use probabilistic segmentation methods. By combining contrast terms with prior terms, it provides accurate segmentations of medical images in a fully automated manner. However, one of the main drawbacks of using the RW algorithm is that its parameters have to be hand-tuned. we propose a novel discriminative learning framework… ▽ More

    Submitted 30 August, 2013; originally announced August 2013.

    Comments: Medical Image Computing and Computer Assisted Interventaion (2013)

  45. arXiv:1306.1083  [pdf, ps, other

    cs.CV cs.LG

    Discriminative Parameter Estimation for Random Walks Segmentation: Technical Report

    Authors: Pierre-Yves Baudin, Danny Goodman, Puneet Kumar, Noura Azzabou, Pierre G. Carlier, Nikos Paragios, M. Pawan Kumar

    Abstract: The Random Walks (RW) algorithm is one of the most e - cient and easy-to-use probabilistic segmentation methods. By combining contrast terms with prior terms, it provides accurate segmentations of medical images in a fully automated manner. However, one of the main drawbacks of using the RW algorithm is that its parameters have to be hand-tuned. we propose a novel discriminative learning framework… ▽ More

    Submitted 5 June, 2013; originally announced June 2013.

  46. arXiv:1206.4636  [pdf

    cs.LG cs.AI cs.CV

    Modeling Latent Variable Uncertainty for Loss-based Learning

    Authors: M. Pawan Kumar, Ben Packer, Daphne Koller

    Abstract: We consider the problem of parameter estimation using weakly supervised datasets, where a training sample consists of the input and a partially specified annotation, which we refer to as the output. The missing information in the annotation is modeled using latent variables. Previous methods overburden a single distribution with two separate tasks: (i) modeling the uncertainty in the latent variab… ▽ More

    Submitted 18 June, 2012; originally announced June 2012.

    Comments: ICML2012

  47. arXiv:1205.2633  [pdf

    cs.AI cs.DS

    MAP Estimation of Semi-Metric MRFs via Hierarchical Graph Cuts

    Authors: M. Pawan Kumar, Daphne Koller

    Abstract: We consider the task of obtaining the maximum a posteriori estimate of discrete pairwise random fields with arbitrary unary potentials and semimetric pairwise potentials. For this problem, we propose an accurate hierarchical move making strategy where each move is computed efficiently by solving an st-MINCUT problem. Unlike previous move making approaches, e.g. the widely used a-expansion algorith… ▽ More

    Submitted 9 May, 2012; originally announced May 2012.

    Comments: Appears in Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence (UAI2009)

    Report number: UAI-P-2009-PG-313-320

  48. arXiv:1203.3951  [pdf

    cs.RO

    Path Planning Algorithm for Extinguishing Forest Fires

    Authors: M. P. Sivaram Kumar, S. Rajasekaran

    Abstract: One of the major impacts of climatic changes is due to destroying of forest. Destroying of forest takes place in many ways but the majority of the forest is destroyed due to wild forest fires. In this paper we have presented a path planning algorithm for extinguishing fires which uses Wireless Sensor and Actor Networks (WSANs) for detecting fires. Since most of the works on forest fires are based… ▽ More

    Submitted 18 March, 2012; originally announced March 2012.

    Comments: 6 pages

    Journal ref: Journal of Computing, Volume 4, Issue 2, February 2012, 108-113

  49. arXiv:1004.0770  [pdf

    cs.CR cs.NI

    Data security in mobile devices by geo locking

    Authors: M Prabu Kumar, K Praneesh Kumar Yadav

    Abstract: In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second level is for secure access of information from the device. In the first level, encryption of the data is done using the… ▽ More

    Submitted 6 April, 2010; originally announced April 2010.

    Comments: 10Pages

    Journal ref: International Journal of Network Security & Its Applications 1.3 (2009) 52-61