Skip to main content

Showing 1–14 of 14 results for author: Mudumbai, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.16200  [pdf, other

    cs.LG cs.CR cs.IT eess.SP

    Towards unlocking the mystery of adversarial fragility of neural networks

    Authors: **gchao Gao, Raghu Mudumbai, Xiaodong Wu, Jirong Yi, Catherine Xu, Hui Xie, Weiyu Xu

    Abstract: In this paper, we study the adversarial robustness of deep neural networks for classification tasks. We look at the smallest magnitude of possible additive perturbations that can change the output of a classification algorithm. We provide a matrix-theoretic explanation of the adversarial fragility of deep neural network for classification. In particular, our theoretical results show that neural ne… ▽ More

    Submitted 23 June, 2024; originally announced June 2024.

    Comments: 21 pages

  2. arXiv:2405.13798  [pdf, other

    cs.CL cs.AI cs.IT

    Slaves to the Law of Large Numbers: An Asymptotic Equipartition Property for Perplexity in Generative Language Models

    Authors: Raghu Mudumbai, Tyler Bell

    Abstract: We propose a new asymptotic equipartition property for the perplexity of a large piece of text generated by a language model and present theoretical arguments for this property. Perplexity, defined as a inverse likelihood function, is widely used as a performance metric for training language models. Our main result states that the logarithmic perplexity of any large text produced by a language mod… ▽ More

    Submitted 22 May, 2024; originally announced May 2024.

  3. arXiv:2310.16999  [pdf, other

    cs.CV cs.LG eess.IV

    Trust, but Verify: Robust Image Segmentation using Deep Learning

    Authors: Fahim Ahmed Zaman, Xiaodong Wu, Weiyu Xu, Milan Sonka, Raghuraman Mudumbai

    Abstract: We describe a method for verifying the output of a deep neural network for medical image segmentation that is robust to several classes of random as well as worst-case perturbations i.e. adversarial attacks. This method is based on a general approach recently developed by the authors called "Trust, but Verify" wherein an auxiliary verification network produces predictions about certain masked feat… ▽ More

    Submitted 19 December, 2023; v1 submitted 25 October, 2023; originally announced October 2023.

    Comments: 5 Pages, 8 Figures, conference

  4. arXiv:2008.01944  [pdf, ps, other

    q-bio.QM cs.IT eess.SP stat.AP

    Optimal Pooling Matrix Design for Group Testing with Dilution (Row Degree) Constraints

    Authors: Jirong Yi, Myung Cho, Xiaodong Wu, Raghu Mudumbai, Weiyu Xu

    Abstract: In this paper, we consider the problem of designing optimal pooling matrix for group testing (for example, for COVID-19 virus testing) with the constraint that no more than $r>0$ samples can be pooled together, which we call "dilution constraint". This problem translates to designing a matrix with elements being either 0 or 1 that has no more than $r$ '1's in each row and has a certain performance… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

    Comments: group testing design, COVID-19

  5. arXiv:2007.14042  [pdf, other

    cs.LG cs.IT stat.ML

    Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning

    Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu

    Abstract: We consider the theoretical problem of designing an optimal adversarial attack on a decision system that maximally degrades the achievable performance of the system as measured by the mutual information between the degraded signal and the label of interest. This problem is motivated by the existence of adversarial examples for machine learning classifiers. By adopting an information theoretic pers… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

    Comments: 16 pages, 5 theorems, 6 figures

  6. arXiv:2004.05759  [pdf, other

    q-bio.QM cs.IT eess.SP q-bio.BM

    Low-Cost and High-Throughput Testing of COVID-19 Viruses and Antibodies via Compressed Sensing: System Concepts and Computational Experiments

    Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu

    Abstract: Coronavirus disease 2019 (COVID-19) is an ongoing pandemic infectious disease outbreak that has significantly harmed and threatened the health and lives of millions or even billions of people. COVID-19 has also negatively impacted the social and economic activities of many countries significantly. With no approved vaccine available at this moment, extensive testing of COVID-19 viruses in people ar… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

    Comments: 11 pages

  7. arXiv:2003.11816  [pdf, other

    cs.CV cs.LG eess.IV math.OC stat.ML

    Do Deep Minds Think Alike? Selective Adversarial Attacks for Fine-Grained Manipulation of Multiple Deep Neural Networks

    Authors: Zain Khan, Jirong Yi, Raghu Mudumbai, Xiaodong Wu, Weiyu Xu

    Abstract: Recent works have demonstrated the existence of {\it adversarial examples} targeting a single machine learning system. In this paper we ask a simple but fundamental question of "selective fooling": given {\it multiple} machine learning systems assigned to solve the same classification problem and taking the same input signal, is it possible to construct a perturbation to the input signal that mani… ▽ More

    Submitted 26 March, 2020; originally announced March 2020.

    Comments: 9 pages, submitted to ICML 2020

  8. arXiv:1905.11381  [pdf, other

    cs.CR cs.CV cs.LG stat.ML

    Trust but Verify: An Information-Theoretic Explanation for the Adversarial Fragility of Machine Learning Systems, and a General Defense against Adversarial Attacks

    Authors: Jirong Yi, Hui Xie, Leixin Zhou, Xiaodong Wu, Weiyu Xu, Raghuraman Mudumbai

    Abstract: Deep-learning based classification algorithms have been shown to be susceptible to adversarial attacks: minor changes to the input of classifiers can dramatically change their outputs, while being imperceptible to humans. In this paper, we present a simple hypothesis about a feature compression property of artificial intelligence (AI) classifiers and present theoretical arguments to show that this… ▽ More

    Submitted 25 May, 2019; originally announced May 2019.

    Comments: 44 Pages, 2 Theorems, 35 Figures, 29 Tables. arXiv admin note: substantial text overlap with arXiv:1901.09413

  9. arXiv:1901.09413  [pdf, other

    cs.IT cs.LG eess.SP

    An Information-Theoretic Explanation for the Adversarial Fragility of AI Classifiers

    Authors: Hui Xie, Jirong Yi, Weiyu Xu, Raghu Mudumbai

    Abstract: We present a simple hypothesis about a compression property of artificial intelligence (AI) classifiers and present theoretical arguments to show that this hypothesis successfully accounts for the observed fragility of AI classifiers to small adversarial perturbations. We also propose a new method for detecting when small input perturbations cause classifier errors, and show theoretical guarantees… ▽ More

    Submitted 27 January, 2019; originally announced January 2019.

    Comments: 5 pages

  10. arXiv:1611.09774  [pdf, other

    cs.DC cs.PF

    Serving the Grid: an Experimental Study of Server Clusters as Real-Time Demand Response Resources

    Authors: Josiah McClurg, Raghuraman Mudumbai

    Abstract: Demand response is a crucial technology to allow large-scale penetration of intermittent renewable energy sources in the electric grid. This paper is based on the thesis that datacenters represent especially attractive candidates for providing flexible, real-time demand response services to the grid; they are capable of finely-controllable power consumption, fast power ramp-rates, and large dynami… ▽ More

    Submitted 29 November, 2016; originally announced November 2016.

    ACM Class: C.4; C.5.5; D.4.8; K.6.2

  11. arXiv:1508.04524  [pdf, other

    cs.NI

    PHY-layer link quality indicators for wireless networks using matched-filters

    Authors: Henry E. Baidoo-Williams, Octav Chipara, Raghuraman Mudumbai, Soura Dasgupta

    Abstract: We present a novel approach to accurate real-time estimation of wireless link quality using simple matched-filtering techniques. Our approach is based on the simple observation that there is a portion of each packet transmission from any given node that does not change from one packet to another; this includes preamble sequences used to synchronize the receiver and also address information in the… ▽ More

    Submitted 19 August, 2015; v1 submitted 19 August, 2015; originally announced August 2015.

    Comments: 6 pages

    ACM Class: C.2; C.3; J.2

  12. arXiv:1412.2700  [pdf, other

    math.NA cs.CV

    Subspace based low rank and joint sparse matrix recovery

    Authors: Sampurna Biswas, Sunrita Poddar, Soura Dasgupta, Raghuraman Mudumbai, Mathews Jacob

    Abstract: We consider the recovery of a low rank and jointly sparse matrix from under sampled measurements of its columns. This problem is highly relevant in the recovery of dynamic MRI data with high spatio-temporal resolution, where each column of the matrix corresponds to a frame in the image time series; the matrix is highly low-rank since the frames are highly correlated. Similarly the non-zero locatio… ▽ More

    Submitted 2 June, 2015; v1 submitted 5 December, 2014; originally announced December 2014.

    Comments: 5 pages, 5 figures, Asilomar 2014 conference submission

  13. arXiv:1412.2669  [pdf, other

    stat.ML cs.IT

    Two step recovery of jointly sparse and low-rank matrices: theoretical guarantees

    Authors: Sampurna Biswas, Sunrita Poddar, Soura Dasgupta, Raghuraman Mudumbai, Mathews Jacob

    Abstract: We introduce a two step algorithm with theoretical guarantees to recover a jointly sparse and low-rank matrix from undersampled measurements of its columns. The algorithm first estimates the row subspace of the matrix using a set of common measurements of the columns. In the second step, the subspace aware recovery of the matrix is solved using a simple least square algorithm. The results are veri… ▽ More

    Submitted 2 June, 2015; v1 submitted 5 December, 2014; originally announced December 2014.

    Comments: 4 pages, 4 figures, ISBI 2015 conference submission

  14. arXiv:cs/0603072  [pdf, ps, other

    cs.IT

    Distributed Transmit Beamforming using Feedback Control

    Authors: R. Mudumbai, J. Hespanha, U. Madhow, G. Barriac

    Abstract: A simple feedback control algorithm is presented for distributed beamforming in a wireless network. A network of wireless sensors that seek to cooperatively transmit a common message signal to a Base Station (BS) is considered. In this case, it is well-known that substantial energy efficiencies are possible by using distributed beamforming. The feedback algorithm is shown to achieve the carrier… ▽ More

    Submitted 17 March, 2006; originally announced March 2006.

    ACM Class: C.2.1