Skip to main content

Showing 1–19 of 19 results for author: Moulin, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2012.04692  [pdf, other

    cs.CV

    Locally optimal detection of stochastic targeted universal adversarial perturbations

    Authors: Amish Goel, Pierre Moulin

    Abstract: Deep learning image classifiers are known to be vulnerable to small adversarial perturbations of input images. In this paper, we derive the locally optimal generalized likelihood ratio test (LO-GLRT) based detector for detecting stochastic targeted universal adversarial perturbations (UAPs) of the classifier inputs. We also describe a supervised training method to learn the detector's parameters,… ▽ More

    Submitted 8 December, 2020; originally announced December 2020.

    Comments: Submitted to ICASSP 2021

  2. arXiv:2007.11693  [pdf, other

    cs.LG cs.CR cs.GT cs.IT stat.ML

    Robust Machine Learning via Privacy/Rate-Distortion Theory

    Authors: Ye Wang, Shuchin Aeron, Adnan Siraj Rakin, Toshiaki Koike-Akino, Pierre Moulin

    Abstract: Robust machine learning formulations have emerged to address the prevalent vulnerability of deep neural networks to adversarial examples. Our work draws the connection between optimal robust learning and the privacy-utility tradeoff problem, which is a generalization of the rate-distortion problem. The saddle point of the game between a robust classifier and an adversarial perturbation can be foun… ▽ More

    Submitted 18 May, 2021; v1 submitted 22 July, 2020; originally announced July 2020.

    Comments: 9 pages, 2 figures, accepted at 2021 IEEE International Symposium on Information Theory

  3. arXiv:2006.01906  [pdf, other

    eess.AS cs.CR cs.LG cs.SD stat.ML

    Detecting Audio Attacks on ASR Systems with Dropout Uncertainty

    Authors: Tejas Jayashankar, Jonathan Le Roux, Pierre Moulin

    Abstract: Various adversarial audio attacks have recently been developed to fool automatic speech recognition (ASR) systems. We here propose a defense against such attacks based on the uncertainty introduced by dropout in neural networks. We show that our defense is able to detect attacks created through optimized perturbations and frequency masking on a state-of-the-art end-to-end ASR system. Furthermore,… ▽ More

    Submitted 14 September, 2020; v1 submitted 2 June, 2020; originally announced June 2020.

    Comments: Accepted for publication at Interspeech 2020

  4. arXiv:1704.00196  [pdf, ps, other

    math.OC cs.LG math.NA

    Faster Subgradient Methods for Functions with Hölderian Growth

    Authors: Patrick R. Johnstone, Pierre Moulin

    Abstract: The purpose of this manuscript is to derive new convergence results for several subgradient methods applied to minimizing nonsmooth convex functions with Hölderian growth. The growth condition is satisfied in many applications and includes functions with quadratic growth and weakly sharp minima as special cases. To this end there are three main contributions. First, for a constant and sufficiently… ▽ More

    Submitted 30 April, 2018; v1 submitted 1 April, 2017; originally announced April 2017.

    Comments: 50 pages. First revised version (under submission to Math Programming)

    Journal ref: Math. Program. 180, 417-450 (2020)

  5. arXiv:1608.03697  [pdf, other

    cs.DM cs.IT

    On Information-Theoretic Characterizations of Markov Random Fields and Subfields

    Authors: Raymond W. Yeung, Ali Al-Bashabsheh, Chao Chen, Qi Chen, Pierre Moulin

    Abstract: Let $X_i, i \in V$ form a Markov random field (MRF) represented by an undirected graph $G = (V,E)$, and $V'$ be a subset of $V$. We determine the smallest graph that can always represent the subfield $X_i, i \in V'$ as an MRF. Based on this result, we obtain a necessary and sufficient condition for a subfield of a Markov tree to be also a Markov tree. When $G$ is a path so that $X_i, i \in V$ fo… ▽ More

    Submitted 17 January, 2018; v1 submitted 12 August, 2016; originally announced August 2016.

  6. arXiv:1603.05414  [pdf, ps, other

    cs.CV cs.IR

    Variable-Length Hashing

    Authors: Honghai Yu, Pierre Moulin, Hong Wei Ng, Xiaoli Li

    Abstract: Hashing has emerged as a popular technique for large-scale similarity search. Most learning-based hashing methods generate compact yet correlated hash codes. However, this redundancy is storage-inefficient. Hence we propose a lossless variable-length hashing (VLH) method that is both storage- and search-efficient. Storage efficiency is achieved by converting the fixed-length hash code into a varia… ▽ More

    Submitted 17 March, 2016; originally announced March 2016.

    Comments: 10 pages, 6 figures

  7. arXiv:1602.02726  [pdf, ps, other

    math.OC cs.LG math.NA

    Local and Global Convergence of a General Inertial Proximal Splitting Scheme

    Authors: Patrick R. Johnstone, Pierre Moulin

    Abstract: This paper is concerned with convex composite minimization problems in a Hilbert space. In these problems, the objective is the sum of two closed, proper, and convex functions where one is smooth and the other admits a computationally inexpensive proximal operator. We analyze a general family of inertial proximal splitting algorithms (GIPSA) for solving such problems. We establish finiteness of th… ▽ More

    Submitted 8 February, 2016; originally announced February 2016.

    Comments: 33 pages 1 figure

    Journal ref: Comput Optim Appl 67, 259-292 (2017)

  8. arXiv:1504.06029  [pdf, ps, other

    cs.IT

    On MMSE estimation from quantized observations in the nonasymptotic regime

    Authors: Jaeho Lee, Maxim Raginsky, Pierre Moulin

    Abstract: This paper studies MMSE estimation on the basis of quantized noisy observations. It presents nonasymptotic bounds on MMSE regret due to quantization for two settings: (1) estimation of a scalar random variable given a quantized vector of $n$ conditionally independent observations, and (2) estimation of a $p$-dimensional random vector given a quantized vector of $n$ observations (not necessarily in… ▽ More

    Submitted 22 April, 2015; originally announced April 2015.

    Comments: 5 pages; to be presented at ISIT 2015

  9. arXiv:1402.4881  [pdf, other

    cs.IT

    Fixed Error Asymptotics For Erasure and List Decoding

    Authors: Vincent Y. F. Tan, Pierre Moulin

    Abstract: We derive the optimum second-order coding rates, known as second-order capacities, for erasure and list decoding. For erasure decoding for discrete memoryless channels, we show that second-order capacity is $\sqrt{V}Φ^{-1}(ε_t)$ where $V$ is the channel dispersion and $ε_t$ is the total error probability, i.e., the sum of the erasure and undetected errors. We show numerically that the expected rat… ▽ More

    Submitted 21 April, 2014; v1 submitted 19 February, 2014; originally announced February 2014.

    Comments: 18 pages, 1 figure; Submitted to IEEE Transactions on Information Theory; Shorter version to be presented at ISIT 2014

  10. arXiv:1311.0181  [pdf, ps, other

    cs.IT

    The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within A Few Nats

    Authors: Pierre Moulin

    Abstract: Shannon's analysis of the fundamental capacity limits for memoryless communication channels has been refined over time. In this paper, the maximum volume $M_\avg^*(n,ε)$ of length-$n$ codes subject to an average decoding error probability $ε$ is shown to satisfy the following tight asymptotic lower and upper bounds as $n \to \infty$: \[ \underline{A}_ε+ o(1) \le \log M_\avg^*(n,ε) - [nC - \sqrt{nV… ▽ More

    Submitted 26 December, 2016; v1 submitted 1 November, 2013; originally announced November 2013.

    Comments: 75 pages, 8 figures. This is the final version to appear in the IEEE Transactions on Information Theory, 2017

    Journal ref: IEEE Transactions on Information Theory, 2017

  11. arXiv:1210.0954  [pdf, ps, other

    cs.SI cs.LG

    Learning from Collective Intelligence in Groups

    Authors: Guo-Jun Qi, Charu Aggarwal, Pierre Moulin, Thomas Huang

    Abstract: Collective intelligence, which aggregates the shared information from large crowds, is often negatively impacted by unreliable information sources with the low quality data. This becomes a barrier to the effective use of collective intelligence in a variety of applications. In order to address this issue, we propose a probabilistic model to jointly assess the reliability of sources and find the tr… ▽ More

    Submitted 2 October, 2012; originally announced October 2012.

  12. On the Saddle-point Solution and the Large-Coalition Asymptotics of Fingerprinting Games

    Authors: Yen-Wei Huang, Pierre Moulin

    Abstract: We study a fingerprinting game in which the number of colluders and the collusion channel are unknown. The encoder embeds fingerprints into a host sequence and provides the decoder with the capability to trace back pirated copies to the colluders. Fingerprinting capacity has recently been derived as the limit value of a sequence of maximin games with mutual information as their payoff functions.… ▽ More

    Submitted 19 April, 2011; v1 submitted 4 November, 2010; originally announced November 2010.

    Comments: submitted to IEEE Trans. on Information Forensics and Security

  13. Saddle-point Solution of the Fingerprinting Capacity Game Under the Marking Assumption

    Authors: Yen-Wei Huang, Pierre Moulin

    Abstract: We study a fingerprinting game in which the collusion channel is unknown. The encoder embeds fingerprints into a host sequence and provides the decoder with the capability to trace back pirated copies to the colluders. Fingerprinting capacity has recently been derived as the limit value of a sequence of maxmin games with mutual information as the payoff function. However, these games generally… ▽ More

    Submitted 9 May, 2009; originally announced May 2009.

    Comments: 5 pages, to appear in 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June 2009

  14. arXiv:0803.0265  [pdf, ps, other

    cs.IT

    Blind Fingerprinting

    Authors: Ying Wang, Pierre Moulin

    Abstract: We study blind fingerprinting, where the host sequence into which fingerprints are embedded is partially or completely unknown to the decoder. This problem relates to a multiuser version of the Gel'fand-Pinsker problem. The number of colluders and the collusion channel are unknown, and the colluders and the fingerprint embedder are subject to distortion constraints. We propose a conditionally… ▽ More

    Submitted 3 March, 2008; originally announced March 2008.

    Comments: 36 pages, submitted for publication

  15. A Neyman-Pearson Approach to Universal Erasure and List Decoding

    Authors: Pierre Moulin

    Abstract: When information is to be transmitted over an unknown, possibly unreliable channel, an erasure option at the decoder is desirable. Using constant-composition random codes, we propose a generalization of Csiszar and Korner's Maximum Mutual Information decoder with erasure option for discrete memoryless channels. The new decoder is parameterized by a weighting function that is designed to optimize… ▽ More

    Submitted 29 January, 2008; originally announced January 2008.

    Comments: 31 pages, submitted to IEEE Transactions on Information Theory

  16. arXiv:0801.3837  [pdf, ps, other

    cs.IT

    Universal Fingerprinting: Capacity and Random-Coding Exponents

    Authors: Pierre Moulin

    Abstract: This paper studies fingerprinting (traitor tracing) games in which the number of colluders and the collusion channel are unknown. The fingerprints are embedded into host sequences representing signals to be protected and provide the receiver with the capability to trace back pirated copies to the colluders. The colluders and the fingerprint embedder are subject to signal fidelity constraints. Our… ▽ More

    Submitted 24 May, 2011; v1 submitted 24 January, 2008; originally announced January 2008.

    Comments: 69 pages, revised

  17. Perfectly Secure Steganography: Capacity, Error Exponents, and Code Constructions

    Authors: Ying Wang, Pierre Moulin

    Abstract: An analysis of steganographic systems subject to the following perfect undetectability condition is presented in this paper. Following embedding of the message into the covertext, the resulting stegotext is required to have exactly the same probability distribution as the covertext. Then no statistical test can reliably detect the presence of the hidden message. We refer to such steganographic s… ▽ More

    Submitted 25 December, 2007; v1 submitted 27 February, 2007; originally announced February 2007.

    Comments: To appear in IEEE Trans. on Information Theory, June 2008; ignore Version 2 as the file was corrupted

  18. arXiv:cs/0506013  [pdf, ps, other

    cs.IT

    On the existence and characterization of the maxent distribution under general moment inequality constraints

    Authors: Prakash Ishwar, Pierre Moulin

    Abstract: A broad set of sufficient conditions that guarantees the existence of the maximum entropy (maxent) distribution consistent with specified bounds on certain generalized moments is derived. Most results in the literature are either focused on the minimum cross-entropy distribution or apply only to distributions with a bounded-volume support or address only equality constraints. The results of this… ▽ More

    Submitted 5 June, 2005; originally announced June 2005.

    Comments: 13 pages; accepted for publication in the IEEE Transactions on Information Theory

  19. arXiv:cs/0410003  [pdf, ps, other

    cs.IT

    Capacity and Random-Coding Exponents for Channel Coding with Side Information

    Authors: Pierre Moulin, Ying Wang

    Abstract: Capacity formulas and random-coding exponents are derived for a generalized family of Gel'fand-Pinsker coding problems. These exponents yield asymptotic upper bounds on the achievable log probability of error. In our model, information is to be reliably transmitted through a noisy channel with finite input and output alphabets and random state sequence, and the channel is selected by a hypotheti… ▽ More

    Submitted 28 December, 2006; v1 submitted 1 October, 2004; originally announced October 2004.

    Comments: to appear in IEEE Transactions on Information Theory, without Appendices G and H