Skip to main content

Showing 1–11 of 11 results for author: Subramanya, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.11805  [pdf, other

    cs.CL cs.AI cs.CV

    Gemini: A Family of Highly Capable Multimodal Models

    Authors: Gemini Team, Rohan Anil, Sebastian Borgeaud, Jean-Baptiste Alayrac, Jiahui Yu, Radu Soricut, Johan Schalkwyk, Andrew M. Dai, Anja Hauth, Katie Millican, David Silver, Melvin Johnson, Ioannis Antonoglou, Julian Schrittwieser, Amelia Glaese, Jilin Chen, Emily Pitler, Timothy Lillicrap, Angeliki Lazaridou, Orhan Firat, James Molloy, Michael Isard, Paul R. Barham, Tom Hennigan, Benjamin Lee , et al. (1325 additional authors not shown)

    Abstract: This report introduces a new family of multimodal models, Gemini, that exhibit remarkable capabilities across image, audio, video, and text understanding. The Gemini family consists of Ultra, Pro, and Nano sizes, suitable for applications ranging from complex reasoning tasks to on-device memory-constrained use-cases. Evaluation on a broad range of benchmarks shows that our most-capable Gemini Ultr… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  2. arXiv:2206.08477  [pdf, other

    cs.CV cs.CR cs.LG

    Backdoor Attacks on Vision Transformers

    Authors: Akshayvarun Subramanya, Aniruddha Saha, Soroush Abbasi Koohpayegani, A**kya Tejankar, Hamed Pirsiavash

    Abstract: Vision Transformers (ViT) have recently demonstrated exemplary performance on a variety of vision tasks and are being used as an alternative to CNNs. Their design is based on a self-attention mechanism that processes images as a sequence of patches, which is quite different compared to CNNs. Hence it is interesting to study if ViTs are vulnerable to backdoor attacks. Backdoor attacks happen when a… ▽ More

    Submitted 16 June, 2022; originally announced June 2022.

  3. arXiv:2204.05432  [pdf, other

    cs.CV cs.AI cs.LG

    A Simple Approach to Adversarial Robustness in Few-shot Image Classification

    Authors: Akshayvarun Subramanya, Hamed Pirsiavash

    Abstract: Few-shot image classification, where the goal is to generalize to tasks with limited labeled data, has seen great progress over the years. However, the classifiers are vulnerable to adversarial examples, posing a question regarding their generalization capabilities. Recent works have tried to combine meta-learning approaches with adversarial training to improve the robustness of few-shot classifie… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

  4. arXiv:2112.04607  [pdf, other

    cs.CV

    Constrained Mean Shift Using Distant Yet Related Neighbors for Representation Learning

    Authors: KL Navaneet, Soroush Abbasi Koohpayegani, A**kya Tejankar, Kossar Pourahmadi, Akshayvarun Subramanya, Hamed Pirsiavash

    Abstract: We are interested in representation learning in self-supervised, supervised, and semi-supervised settings. Some recent self-supervised learning methods like mean-shift (MSF) cluster images by pulling the embedding of a query image to be closer to its nearest neighbors (NNs). Since most NNs are close to the query by design, the averaging may not affect the embedding of the query much. On the other… ▽ More

    Submitted 14 October, 2022; v1 submitted 8 December, 2021; originally announced December 2021.

    Comments: Code is available at https://github.com/UCDvision/CMSF. arXiv admin note: text overlap with arXiv:2110.10309

  5. arXiv:1910.00068  [pdf, other

    cs.CV

    Role of Spatial Context in Adversarial Robustness for Object Detection

    Authors: Aniruddha Saha, Akshayvarun Subramanya, Koninika Patil, Hamed Pirsiavash

    Abstract: The benefits of utilizing spatial context in fast object detection algorithms have been studied extensively. Detectors increase inference speed by doing a single forward pass per image which means they implicitly use contextual reasoning for their predictions. However, one can show that an adversary can design adversarial patches which do not overlap with any objects of interest in the scene and e… ▽ More

    Submitted 17 April, 2020; v1 submitted 30 September, 2019; originally announced October 2019.

    Comments: CVPR 2020 Workshop on Adversarial Machine Learning in Computer Vision

  6. arXiv:1910.00033  [pdf, other

    cs.CV

    Hidden Trigger Backdoor Attacks

    Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash

    Abstract: With the success of deep learning algorithms in various domains, studying adversarial attacks to secure deep models in real world applications has become an important research topic. Backdoor attacks are a form of adversarial attacks on deep networks where the attacker provides poisoned data to the victim to train the model with, and then activates the attack by showing a specific small trigger pa… ▽ More

    Submitted 20 December, 2019; v1 submitted 30 September, 2019; originally announced October 2019.

    Comments: AAAI 2020 - Main Technical Track (Oral)

  7. arXiv:1812.02843  [pdf, other

    cs.CV cs.LG

    Fooling Network Interpretation in Image Classification

    Authors: Akshayvarun Subramanya, Vipin Pillai, Hamed Pirsiavash

    Abstract: Deep neural networks have been shown to be fooled rather easily using adversarial attack algorithms. Practical methods such as adversarial patches have been shown to be extremely effective in causing misclassification. However, these patches are highlighted using standard network interpretation algorithms, thus revealing the identity of the adversary. We show that it is possible to create adversar… ▽ More

    Submitted 24 September, 2019; v1 submitted 6 December, 2018; originally announced December 2018.

    Comments: Accepted at ICCV 2019

  8. arXiv:1707.07013  [pdf, other

    cs.CV

    Confidence estimation in Deep Neural networks via density modelling

    Authors: Akshayvarun Subramanya, Suraj Srinivas, R. Venkatesh Babu

    Abstract: State-of-the-art Deep Neural Networks can be easily fooled into providing incorrect high-confidence predictions for images with small amounts of adversarial noise. Does this expose a flaw with deep neural networks, or do we simply need a better way to estimate confidence? In this paper we consider the problem of accurately estimating predictive confidence. We formulate this problem as that of dens… ▽ More

    Submitted 21 July, 2017; originally announced July 2017.

    Comments: ICME 2017

  9. arXiv:1611.06694  [pdf, other

    cs.CV cs.LG

    Training Sparse Neural Networks

    Authors: Suraj Srinivas, Akshayvarun Subramanya, R. Venkatesh Babu

    Abstract: Deep neural networks with lots of parameters are typically used for large-scale computer vision tasks such as image classification. This is a result of using dense matrix multiplications and convolutions. However, sparse computations are known to be much more efficient. In this work, we train and build neural networks which implicitly use sparse computations. We introduce additional gate variables… ▽ More

    Submitted 21 November, 2016; originally announced November 2016.

  10. arXiv:1512.00103  [pdf, other

    cs.CL

    Multilingual Language Processing From Bytes

    Authors: Dan Gillick, Cliff Brunk, Oriol Vinyals, Amarnag Subramanya

    Abstract: We describe an LSTM-based model which we call Byte-to-Span (BTS) that reads text as bytes and outputs span annotations of the form [start, length, label] where start positions, lengths, and labels are separate entries in our vocabulary. Because we operate directly on unicode bytes rather than language-specific words or characters, we can analyze text in many languages with a single model. Due to t… ▽ More

    Submitted 2 April, 2016; v1 submitted 30 November, 2015; originally announced December 2015.

  11. arXiv:1206.6869  [pdf

    cs.AI

    Recognizing Activities and Spatial Context Using Wearable Sensors

    Authors: Amarnag Subramanya, Alvin Raj, Jeff A. Bilmes, Dieter Fox

    Abstract: We introduce a new dynamic model with the capability of recognizing both activities that an individual is performing as well as where that ndividual is located. Our model is novel in that it utilizes a dynamic graphical model to jointly estimate both activity and spatial context over time based on the simultaneous use of asynchronous observations consisting of GPS measurements, and measurements fr… ▽ More

    Submitted 27 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the Twenty-Second Conference on Uncertainty in Artificial Intelligence (UAI2006)

    Report number: UAI-P-2006-PG-494-502