Skip to main content

Showing 1–3 of 3 results for author: Ndiour, I J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.10422  [pdf, other

    cs.LG

    Subspace Modeling for Fast Out-Of-Distribution and Anomaly Detection

    Authors: Ibrahima J. Ndiour, Nilesh A. Ahuja, Omesh Tickoo

    Abstract: This paper presents a fast, principled approach for detecting anomalous and out-of-distribution (OOD) samples in deep neural networks (DNN). We propose the application of linear statistical dimensionality reduction techniques on the semantic features produced by a DNN, in order to capture the low-dimensional subspace truly spanned by said features. We show that the "feature reconstruction error" (… ▽ More

    Submitted 19 March, 2022; originally announced March 2022.

    Comments: arXiv admin note: text overlap with arXiv:2012.04250

  2. arXiv:2105.03270  [pdf, other

    cs.LG cs.CV

    Energy-Based Anomaly Detection and Localization

    Authors: Ergin Utku Genc, Nilesh Ahuja, Ibrahima J Ndiour, Omesh Tickoo

    Abstract: This brief sketches initial progress towards a unified energy-based solution for the semi-supervised visual anomaly detection and localization problem. In this setup, we have access to only anomaly-free training data and want to detect and identify anomalies of an arbitrary nature on test data. We employ the density estimates from the energy-based model (EBM) as normalcy scores that can be used to… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Comments: 9 pages, 3 figures, as submitted to EBM ICLR 2021 workshop

  3. arXiv:1912.01206  [pdf, ps, other

    cs.LG stat.ML

    Deep Probabilistic Models to Detect Data Poisoning Attacks

    Authors: Mahesh Subedar, Nilesh Ahuja, Ranganath Krishnan, Ibrahima J. Ndiour, Omesh Tickoo

    Abstract: Data poisoning attacks compromise the integrity of machine-learning models by introducing malicious training samples to influence the results during test time. In this work, we investigate backdoor data poisoning attack on deep neural networks (DNNs) by inserting a backdoor pattern in the training images. The resulting attack will misclassify poisoned test samples while maintaining high accuracies… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: To appear in Bayesian Deep Learning Workshop at NeurIPS 2019