Skip to main content

Showing 1–15 of 15 results for author: Romanelli, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06968  [pdf, other

    cs.LG cs.AI

    Beyond the Norms: Detecting Prediction Errors in Regression Models

    Authors: Andres Altieri, Marco Romanelli, Georg Pichler, Florence Alberge, Pablo Piantanida

    Abstract: This paper tackles the challenge of detecting unreliable behavior in regression algorithms, which may arise from intrinsic variability (e.g., aleatoric uncertainty) or modeling errors (e.g., model uncertainty). First, we formally introduce the notion of unreliability in regression, i.e., when the output of the regressor exceeds a specified discrepancy (or error). Then, using powerful tools for pro… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: To appear as spotlight at ICML 2024. 36 pages, 4 figures

  2. arXiv:2405.18572  [pdf, other

    cs.LG cs.AI cs.CL

    Low-rank finetuning for LLMs: A fairness perspective

    Authors: Saswat Das, Marco Romanelli, Cuong Tran, Zarreen Reza, Bhavya Kailkhura, Ferdinando Fioretto

    Abstract: Low-rank approximation techniques have become the de facto standard for fine-tuning Large Language Models (LLMs) due to their reduced computational and memory requirements. This paper investigates the effectiveness of these methods in capturing the shift of fine-tuning datasets from the initial pre-trained data distribution. Our findings reveal that there are cases in which low-rank fine-tuning fa… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  3. arXiv:2402.16926  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    On the (In)feasibility of ML Backdoor Detection as an Hypothesis Testing Problem

    Authors: Georg Pichler, Marco Romanelli, Divya Prakash Manivannan, Prashanth Krishnamurthy, Farshad Khorrami, Siddharth Garg

    Abstract: We introduce a formal statistical definition for the problem of backdoor detection in machine learning systems and use it to analyze the feasibility of such problems, providing evidence for the utility and applicability of our definition. The main contributions of this work are an impossibility result and an achievability result for backdoor detection. We show a no-free-lunch theorem, proving that… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

  4. arXiv:2402.15808  [pdf, other

    cs.LG cs.AI cs.CR

    Optimal Zero-Shot Detector for Multi-Armed Attacks

    Authors: Federica Granese, Marco Romanelli, Pablo Piantanida

    Abstract: This paper explores a scenario in which a malicious actor employs a multi-armed attack strategy to manipulate data samples, offering them various avenues to introduce noise into the dataset. Our central objective is to protect the data by detecting any alterations to the input. We approach this defensive strategy with utmost caution, operating in an environment where the defender possesses signifi… ▽ More

    Submitted 27 February, 2024; v1 submitted 24 February, 2024; originally announced February 2024.

    Comments: Accepted to appear in the 27th International Conference on Artificial Intelligence and Statistics (AISTATS), May 2nd - May 4th, 2024 This article supersedes arXiv:2302.02216

  5. arXiv:2402.03629  [pdf, other

    cs.LG cs.CR cs.CY

    Disparate Impact on Group Accuracy of Linearization for Private Inference

    Authors: Saswat Das, Marco Romanelli, Ferdinando Fioretto

    Abstract: Ensuring privacy-preserving inference on cryptographically secure data is a well-known computational challenge. To alleviate the bottleneck of costly cryptographic computations in non-linear activations, recent methods have suggested linearizing a targeted portion of these activations in neural networks. This technique results in significantly reduced runtimes with often negligible impacts on accu… ▽ More

    Submitted 13 June, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

    Comments: Accepted to appear at the Forty-first International Conference on Machine Learning (ICML) 2024

  6. arXiv:2401.12205  [pdf, other

    cs.LG cs.AI cs.AR

    Retrieval-Guided Reinforcement Learning for Boolean Circuit Minimization

    Authors: Animesh Basak Chowdhury, Marco Romanelli, Benjamin Tan, Ramesh Karri, Siddharth Garg

    Abstract: Logic synthesis, a pivotal stage in chip design, entails optimizing chip specifications encoded in hardware description languages like Verilog into highly efficient implementations using Boolean logic gates. The process involves a sequential application of logic minimization heuristics (``synthesis recipe"), with their arrangement significantly impacting crucial metrics such as area and delay. Add… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: Accepted in ICLR 2024

  7. arXiv:2306.01710  [pdf, other

    stat.ML cs.LG

    A Data-Driven Measure of Relative Uncertainty for Misclassification Detection

    Authors: Eduardo Dadalto, Marco Romanelli, Georg Pichler, Pablo Piantanida

    Abstract: Misclassification detection is an important problem in machine learning, as it allows for the identification of instances where the model's predictions are unreliable. However, conventional uncertainty measures such as Shannon entropy do not provide an effective way to infer the real uncertainty associated with the model's predictions. In this paper, we introduce a novel data-driven measure of unc… ▽ More

    Submitted 8 February, 2024; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: Accepted in ICLR2024

    MSC Class: 68T01

  8. arXiv:2305.13164  [pdf, other

    cs.LG cs.AR

    INVICTUS: Optimizing Boolean Logic Circuit Synthesis via Synergistic Learning and Search

    Authors: Animesh Basak Chowdhury, Marco Romanelli, Benjamin Tan, Ramesh Karri, Siddharth Garg

    Abstract: Logic synthesis is the first and most vital step in chip design. This steps converts a chip specification written in a hardware description language (such as Verilog) into an optimized implementation using Boolean logic gates. State-of-the-art logic synthesis algorithms have a large number of logic minimization heuristics, typically applied sequentially based on human experience and intuition. The… ▽ More

    Submitted 5 June, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: 20 pages, 8 figures and 15 tables

  9. arXiv:2302.02216  [pdf, other

    cs.CV

    A Minimax Approach Against Multi-Armed Adversarial Attacks Detection

    Authors: Federica Granese, Marco Romanelli, Siddharth Garg, Pablo Piantanida

    Abstract: Multi-armed adversarial attacks, in which multiple algorithms and objective loss functions are simultaneously used at evaluation time, have been shown to be highly successful in fooling state-of-the-art adversarial examples detectors while requiring no specific side information about the detection mechanism. By formalizing the problem at hand, we can propose a solution that aggregates the soft-pro… ▽ More

    Submitted 4 February, 2023; originally announced February 2023.

    Comments: 10 pages, 13 figures, 14 tables

  10. arXiv:2206.15415  [pdf, other

    cs.CV

    MEAD: A Multi-Armed Approach for Evaluation of Adversarial Examples Detectors

    Authors: Federica Granese, Marine Picot, Marco Romanelli, Francisco Messina, Pablo Piantanida

    Abstract: Detection of adversarial examples has been a hot topic in the last years due to its importance for safely deploying machine learning algorithms in critical applications. However, the detection methods are generally validated by assuming a single implicitly known attack strategy, which does not necessarily account for real-life threats. Indeed, this can lead to an overoptimistic assessment of the d… ▽ More

    Submitted 30 June, 2022; originally announced June 2022.

    Comments: This paper has been accepted to appear in the Proceedings of the 2022 European Conference on Machine Learning and Data Mining (ECML-PKDD), 19th to the 23rd of September, Grenoble, France

  11. arXiv:2203.16463  [pdf

    cs.LG cs.AI cs.CR

    Perfectly Accurate Membership Inference by a Dishonest Central Server in Federated Learning

    Authors: Georg Pichler, Marco Romanelli, Leonardo Rey Vega, Pablo Piantanida

    Abstract: Federated Learning is expected to provide strong privacy guarantees, as only gradients or model parameters but no plain text training data is ever exchanged either between the clients or between the clients and the central server. In this paper, we challenge this claim by introducing a simple but still very effective membership inference attack algorithm, which relies only on a single training ste… ▽ More

    Submitted 9 November, 2023; v1 submitted 30 March, 2022; originally announced March 2022.

    Comments: accepted for publication in IEEE Transactions on Dependable and Secure Computing

  12. arXiv:2106.02395  [pdf, other

    cs.CV cs.LG

    DOCTOR: A Simple Method for Detecting Misclassification Errors

    Authors: Federica Granese, Marco Romanelli, Daniele Gorla, Catuscia Palamidessi, Pablo Piantanida

    Abstract: Deep neural networks (DNNs) have shown to perform very well on large scale object recognition problems and lead to widespread use for real-world applications, including situations where DNN are implemented as "black boxes". A promising approach to secure their use is to accept decisions that are likely to be correct while discarding the others. In this work, we propose DOCTOR, a simple method that… ▽ More

    Submitted 29 October, 2021; v1 submitted 4 June, 2021; originally announced June 2021.

    Comments: This paper has been accepted to appear as a spotlight in the Proceedings of the 2021 Conference on Neural Information Processing Systems (NeurIPS 2021), December 6-14, 2021, Virtual Event

  13. arXiv:2005.04399  [pdf, other

    cs.CR cs.LG stat.ML

    Estimating g-Leakage via Machine Learning

    Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida

    Abstract: This paper considers the problem of estimating the information leakage of a system in the black-box scenario. It is assumed that the system's internals are unknown to the learner, or anyway too complicated to analyze, and the only available information are pairs of input-output data samples, possibly obtained by submitting queries to the system or provided by a third party. Previous research has m… ▽ More

    Submitted 24 November, 2021; v1 submitted 9 May, 2020; originally announced May 2020.

    Comments: This is the extended version of the paper which will appear in the Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS '20), November 9-13, 2020, Virtual Event, USA

  14. arXiv:2001.09654  [pdf, other

    cs.LG cs.IT stat.ML

    Feature selection in machine learning: Rényi min-entropy vs Shannon entropy

    Authors: Catuscia Palamidessi, Marco Romanelli

    Abstract: Feature selection, in the context of machine learning, is the process of separating the highly predictive feature from those that might be irrelevant or redundant. Information theory has been recognized as a useful concept for this task, as the prediction power stems from the correlation, i.e., the mutual information, between features and labels. Many algorithms for feature selection in the litera… ▽ More

    Submitted 27 January, 2020; originally announced January 2020.

    Comments: 16 pages

    ACM Class: E.4; H.1.1; I.2.6

  15. arXiv:1904.01059  [pdf, other

    cs.LG stat.ML

    Optimal Obfuscation Mechanisms via Machine Learning

    Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi

    Abstract: We consider the problem of obfuscating sensitive information while preserving utility, and we propose a machine learning approach inspired by the generative adversarial networks paradigm. The idea is to set up two nets: the generator, that tries to produce an optimal obfuscation mechanism to protect the data, and the classifier, that tries to de-obfuscate the data. By letting the two nets compete… ▽ More

    Submitted 25 October, 2020; v1 submitted 1 April, 2019; originally announced April 2019.

    Comments: Preprint version of a paper that will appear on the Proceedings of the IEEE 33rd Computer Security Foundations Symposium, CSF 2020