Skip to main content

Showing 1–8 of 8 results for author: Sadasivan, V S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02836  [pdf, other

    cs.CR cs.CV

    DREW : Towards Robust Data Provenance by Leveraging Error-Controlled Watermarking

    Authors: Mehrdad Saberi, Vinu Sankar Sadasivan, Arman Zarei, Hessam Mahdavifar, Soheil Feizi

    Abstract: Identifying the origin of data is crucial for data provenance, with applications including data ownership protection, media forensics, and detecting AI-generated content. A standard approach involves embedding-based retrieval techniques that match query data with entries in a reference dataset. However, this method is not robust against benign and malicious edits. To address this, we propose Data… ▽ More

    Submitted 20 June, 2024; v1 submitted 4 June, 2024; originally announced June 2024.

  2. arXiv:2402.15570  [pdf, other

    cs.CR cs.AI cs.CL

    Fast Adversarial Attacks on Language Models In One GPU Minute

    Authors: Vinu Sankar Sadasivan, Shoumik Saha, Gaurang Sriramanan, Priyatham Kattakinda, Atoosa Chegini, Soheil Feizi

    Abstract: In this paper, we introduce a novel class of fast, beam search-based adversarial attack (BEAST) for Language Models (LMs). BEAST employs interpretable parameters, enabling attackers to balance between attack speed, success rate, and the readability of adversarial prompts. The computational efficiency of BEAST facilitates us to investigate its applications on LMs for jailbreaking, eliciting halluci… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

  3. arXiv:2310.19889  [pdf, other

    cs.CV cs.AI cs.LG

    Exploring Geometry of Blind Spots in Vision Models

    Authors: Sriram Balasubramanian, Gaurang Sriramanan, Vinu Sankar Sadasivan, Soheil Feizi

    Abstract: Despite the remarkable success of deep neural networks in a myriad of settings, several works have demonstrated their overwhelming sensitivity to near-imperceptible perturbations, known as adversarial attacks. On the other hand, prior works have also observed that deep networks can be under-sensitive, wherein large-magnitude perturbations in input space do not induce appreciable changes to network… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: 25 pages, 20 figures, Accepted at NeurIPS 2023 (spotlight)

    ACM Class: I.2.6; I.2.10

  4. arXiv:2310.00076  [pdf, other

    cs.CV

    Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks

    Authors: Mehrdad Saberi, Vinu Sankar Sadasivan, Keivan Rezaei, Aounon Kumar, Atoosa Chegini, Wenxiao Wang, Soheil Feizi

    Abstract: In light of recent advancements in generative AI models, it has become essential to distinguish genuine content from AI-generated one to prevent the malicious usage of fake materials as authentic ones and vice versa. Various techniques have been introduced for identifying AI-generated images, with watermarking emerging as a promising approach. In this paper, we analyze the robustness of various AI… ▽ More

    Submitted 14 February, 2024; v1 submitted 29 September, 2023; originally announced October 2023.

  5. arXiv:2303.16308  [pdf, other

    cs.LG stat.ML

    Provable Robustness for Streaming Models with a Sliding Window

    Authors: Aounon Kumar, Vinu Sankar Sadasivan, Soheil Feizi

    Abstract: The literature on provable robustness in machine learning has primarily focused on static prediction problems, such as image classification, in which input samples are assumed to be independent and model performance is measured as an expectation over the input distribution. Robustness certificates are derived for individual input instances with the assumption that the model is evaluated on each in… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

  6. arXiv:2303.11156  [pdf, other

    cs.CL cs.AI cs.LG

    Can AI-Generated Text be Reliably Detected?

    Authors: Vinu Sankar Sadasivan, Aounon Kumar, Sriram Balasubramanian, Wenxiao Wang, Soheil Feizi

    Abstract: The unregulated use of LLMs can potentially lead to malicious consequences such as plagiarism, generating fake news, spamming, etc. Therefore, reliable detection of AI-generated text can be critical to ensure the responsible use of LLMs. Recent works attempt to tackle this problem either using certain model signatures present in the generated text outputs or by applying watermarking techniques tha… ▽ More

    Submitted 19 February, 2024; v1 submitted 17 March, 2023; originally announced March 2023.

  7. arXiv:2303.04278  [pdf, other

    cs.LG cs.CR cs.CV

    CUDA: Convolution-based Unlearnable Datasets

    Authors: Vinu Sankar Sadasivan, Mahdi Soltanolkotabi, Soheil Feizi

    Abstract: Large-scale training of modern deep learning models heavily relies on publicly available data on the web. This potentially unauthorized usage of online data leads to concerns regarding data privacy. Recent works aim to make unlearnable data for deep learning models by adding small, specially designed noises to tackle this issue. However, these methods are vulnerable to adversarial training (AT) an… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: CVPR 2023

  8. arXiv:2103.00147  [pdf, other

    cs.LG

    Statistical Measures For Defining Curriculum Scoring Function

    Authors: Vinu Sankar Sadasivan, Anirban Dasgupta

    Abstract: Curriculum learning is a training strategy that sorts the training examples by some measure of their difficulty and gradually exposes them to the learner to improve the network performance. Motivated by our insights from implicit curriculum ordering, we first introduce a simple curriculum learning strategy that uses statistical measures such as standard deviation and entropy values to score the di… ▽ More

    Submitted 27 July, 2021; v1 submitted 27 February, 2021; originally announced March 2021.

    Comments: Revision 1: Corrected minor typos, added link to open-sourced codes, fixed Figures 7 as per reviews