Skip to main content

Showing 1–17 of 17 results for author: Nayak, G K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2309.16020  [pdf, other

    cs.CV cs.LG

    GeoCLIP: Clip-Inspired Alignment between Locations and Images for Effective Worldwide Geo-localization

    Authors: Vicente Vivanco Cepeda, Gaurav Kumar Nayak, Mubarak Shah

    Abstract: Worldwide Geo-localization aims to pinpoint the precise location of images taken anywhere on Earth. This task has considerable challenges due to immense variation in geographic landscapes. The image-to-image retrieval-based approaches fail to solve this problem on a global scale as it is not feasible to construct a large gallery of images covering the entire world. Instead, existing approaches div… ▽ More

    Submitted 21 November, 2023; v1 submitted 27 September, 2023; originally announced September 2023.

    Comments: Accepted at NeurIPS 2023

  2. arXiv:2309.05132  [pdf, other

    cs.CV cs.LG stat.ML

    DAD++: Improved Data-free Test Time Adversarial Defense

    Authors: Gaurav Kumar Nayak, Inder Khatri, Shubham Randive, Ruchit Rawal, Anirban Chakraborty

    Abstract: With the increasing deployment of deep neural networks in safety-critical applications such as self-driving cars, medical imaging, anomaly detection, etc., adversarial robustness has become a crucial concern in the reliability of these networks in real-world scenarios. A plethora of works based on adversarial training and regularization-based techniques have been proposed to make these deep networ… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

    Comments: IJCV Journal (Under Review)

  3. arXiv:2308.07387  [pdf, other

    cs.LG cs.CR cs.CV cs.DC

    DISBELIEVE: Distance Between Client Models is Very Essential for Effective Local Model Poisoning Attacks

    Authors: Indu Joshi, Priyank Upadhya, Gaurav Kumar Nayak, Peter Schüffler, Nassir Navab

    Abstract: Federated learning is a promising direction to tackle the privacy issues related to sharing patients' sensitive data. Often, federated systems in the medical image analysis domain assume that the participating local clients are \textit{honest}. Several studies report mechanisms through which a set of malicious clients can be introduced that can poison the federated setup, hampering the performance… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

    Comments: Accepted by MICCAI 2023 - DeCaF

  4. arXiv:2305.19600  [pdf, other

    cs.LG

    Adaptive Self-Distillation for Minimizing Client Drift in Heterogeneous Federated Learning

    Authors: M. Yashwanth, Gaurav Kumar Nayak, Arya Singh, Yogesh Simmhan, Anirban Chakraborty

    Abstract: Federated Learning (FL) is a machine learning paradigm that enables clients to jointly train a global model by aggregating the locally trained models without sharing any local training data. In practice, there can often be substantial heterogeneity (e.g., class imbalance) across the local data distributions observed by each of these clients. Under such non-iid data distributions across clients, FL… ▽ More

    Submitted 6 February, 2024; v1 submitted 31 May, 2023; originally announced May 2023.

  5. arXiv:2211.13171  [pdf, other

    cs.CV cs.CR

    Query Efficient Cross-Dataset Transferable Black-Box Attack on Action Recognition

    Authors: Rohit Gupta, Naveed Akhtar, Gaurav Kumar Nayak, Ajmal Mian, Mubarak Shah

    Abstract: Black-box adversarial attacks present a realistic threat to action recognition systems. Existing black-box attacks follow either a query-based approach where an attack is optimized by querying the target model, or a transfer-based approach where attacks are generated using a substitute model. While these methods can achieve decent fooling rates, the former tends to be highly query-inefficient whil… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

  6. arXiv:2211.01598  [pdf, other

    cs.CV cs.LG

    Robust Few-shot Learning Without Using any Adversarial Samples

    Authors: Gaurav Kumar Nayak, Ruchit Rawal, Inder Khatri, Anirban Chakraborty

    Abstract: The high cost of acquiring and annotating samples has made the `few-shot' learning problem of prime importance. Existing works mainly focus on improving performance on clean data and overlook robustness concerns on the data perturbed with adversarial noise. Recently, a few efforts have been made to combine the few-shot problem with the robustness objective using sophisticated Meta-Learning techniq… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: TNNLS Submission (Under Review)

  7. arXiv:2211.01579  [pdf, other

    cs.LG cs.CR cs.CV

    Data-free Defense of Black Box Models Against Adversarial Attacks

    Authors: Gaurav Kumar Nayak, Inder Khatri, Ruchit Rawal, Anirban Chakraborty

    Abstract: Several companies often safeguard their trained deep models (i.e., details of architecture, learnt weights, training details etc.) from third-party users by exposing them only as black boxes through APIs. Moreover, they may not even provide access to the training data due to proprietary reasons or sensitivity concerns. In this work, we propose a novel defense mechanism for black box models against… ▽ More

    Submitted 28 March, 2024; v1 submitted 3 November, 2022; originally announced November 2022.

    Comments: CVPR Workshop (Under Review)

  8. arXiv:2210.08929  [pdf, other

    cs.LG cs.CV

    DE-CROP: Data-efficient Certified Robustness for Pretrained Classifiers

    Authors: Gaurav Kumar Nayak, Ruchit Rawal, Anirban Chakraborty

    Abstract: Certified defense using randomized smoothing is a popular technique to provide robustness guarantees for deep neural networks against l2 adversarial attacks. Existing works use this technique to provably secure a pretrained non-robust model by training a custom denoiser network on entire training data. However, access to the training set may be restricted to a handful of data samples due to constr… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: WACV 2023. Project page: https://sites.google.com/view/decrop

  9. arXiv:2205.02604  [pdf, other

    cs.CV cs.HC cs.LG stat.ML

    Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

    Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty

    Abstract: Adversarial attack perturbs an image with an imperceptible noise, leading to incorrect model prediction. Recently, a few works showed inherent bias associated with such attack (robustness bias), where certain subgroups in a dataset (e.g. based on class, gender, etc.) are less robust than others. This bias not only persists even after adversarial training, but often results in severe performance di… ▽ More

    Submitted 5 May, 2022; originally announced May 2022.

    Comments: Accepted in CVPR Workshop 2022 on Human-centered Intelligent Services: Safe and Trustworthy

  10. arXiv:2204.01568  [pdf, other

    cs.LG cs.CR cs.CV

    DAD: Data-free Adversarial Defense at Test Time

    Authors: Gaurav Kumar Nayak, Ruchit Rawal, Anirban Chakraborty

    Abstract: Deep models are highly susceptible to adversarial attacks. Such attacks are carefully crafted imperceptible noises that can fool the network and can cause severe consequences when deployed. To encounter them, the model requires training data for adversarial training or explicit regularization-based techniques. However, privacy has become an important concern, restricting access to only trained mod… ▽ More

    Submitted 8 April, 2022; v1 submitted 4 April, 2022; originally announced April 2022.

    Comments: WACV 2022. Project page: https://sites.google.com/view/dad-wacv22

  11. arXiv:2110.14215  [pdf, other

    cs.CV cs.LG stat.ML

    Beyond Classification: Knowledge Distillation using Multi-Object Impressions

    Authors: Gaurav Kumar Nayak, Monish Keswani, Sharan Seshadri, Anirban Chakraborty

    Abstract: Knowledge Distillation (KD) utilizes training data as a transfer set to transfer knowledge from a complex network (Teacher) to a smaller network (Student). Several works have recently identified many scenarios where the training data may not be available due to data privacy or sensitivity concerns and have proposed solutions under this restrictive constraint for the classification task. Unlike exi… ▽ More

    Submitted 27 October, 2021; originally announced October 2021.

    Comments: Accepted in BMVC 2021

  12. arXiv:2110.13598  [pdf, other

    cs.CV

    Incremental Learning for Animal Pose Estimation using RBF k-DPP

    Authors: Gaurav Kumar Nayak, Het Shah, Anirban Chakraborty

    Abstract: Pose estimation is the task of locating keypoints for an object of interest in an image. Animal Pose estimation is more challenging than estimating human pose due to high inter and intra class variability in animals. Existing works solve this problem for a fixed set of predefined animal categories. Models trained on such sets usually do not work well with new animal categories. Retraining the mode… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

    Comments: Accepted in BMVC 2021

  13. arXiv:2101.06069  [pdf, other

    cs.CV cs.LG stat.ML

    Mining Data Impressions from Deep Models as Substitute for the Unavailable Training Data

    Authors: Gaurav Kumar Nayak, Konda Reddy Mopuri, Saksham Jain, Anirban Chakraborty

    Abstract: Pretrained deep models hold their learnt knowledge in the form of model parameters. These parameters act as "memory" for the trained models and help them generalize well on unseen data. However, in absence of training data, the utility of a trained model is merely limited to either inference or better initialization towards a target task. In this paper, we go further and extract synthetic data by… ▽ More

    Submitted 30 August, 2021; v1 submitted 15 January, 2021; originally announced January 2021.

    Comments: Accepted in TPAMI, 2021. arXiv admin note: text overlap with arXiv:1905.08114

  14. arXiv:2011.09113  [pdf, other

    cs.LG cs.CV

    Effectiveness of Arbitrary Transfer Sets for Data-free Knowledge Distillation

    Authors: Gaurav Kumar Nayak, Konda Reddy Mopuri, Anirban Chakraborty

    Abstract: Knowledge Distillation is an effective method to transfer the learning across deep neural networks. Typically, the dataset originally used for training the Teacher model is chosen as the "Transfer Set" to conduct the knowledge transfer to the Student. However, this original training data may not always be freely available due to privacy or sensitivity concerns. In such scenarios, existing approach… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: Accepted in WACV 2021

  15. arXiv:2008.00878  [pdf, other

    cs.CV

    Fusion of Deep and Non-Deep Methods for Fast Super-Resolution of Satellite Images

    Authors: Gaurav Kumar Nayak, Saksham Jain, R Venkatesh Babu, Anirban Chakraborty

    Abstract: In the emerging commercial space industry there is a drastic increase in access to low cost satellite imagery. The price for satellite images depends on the sensor quality and revisit rate. This work proposes to bridge the gap between image quality and the price by improving the image quality via super-resolution (SR). Recently, a number of deep SR techniques have been proposed to enhance satellit… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: Accepted in IEEE BigMM 2020

  16. arXiv:1912.11960  [pdf, other

    cs.LG cs.CV stat.ML

    DeGAN : Data-Enriching GAN for Retrieving Representative Samples from a Trained Classifier

    Authors: Sravanti Addepalli, Gaurav Kumar Nayak, Anirban Chakraborty, R. Venkatesh Babu

    Abstract: In this era of digital information explosion, an abundance of data from numerous modalities is being generated as well as archived everyday. However, most problems associated with training Deep Neural Networks still revolve around lack of data that is rich enough for a given task. Data is required not only for training an initial model, but also for future learning tasks such as Model Compression… ▽ More

    Submitted 26 December, 2019; originally announced December 2019.

    Comments: Accepted at AAAI-2020

  17. arXiv:1905.08114  [pdf, other

    cs.LG cs.CV stat.ML

    Zero-Shot Knowledge Distillation in Deep Networks

    Authors: Gaurav Kumar Nayak, Konda Reddy Mopuri, Vaisakh Shaj, R. Venkatesh Babu, Anirban Chakraborty

    Abstract: Knowledge distillation deals with the problem of training a smaller model (Student) from a high capacity source model (Teacher) so as to retain most of its performance. Existing approaches use either the training data or meta-data extracted from it in order to train the Student. However, accessing the dataset on which the Teacher has been trained may not always be feasible if the dataset is very l… ▽ More

    Submitted 20 May, 2019; originally announced May 2019.

    Comments: Accepted in ICML 2019, codes will be available at https://github.com/vcl-iisc/ZSKD