Skip to main content

Showing 1–50 of 118 results for author: Wagner, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12420  [pdf, other

    cs.CL cs.LG

    MMUTF: Multimodal Multimedia Event Argument Extraction with Unified Template Filling

    Authors: Philipp Seeberger, Dominik Wagner, Korbinian Riedhammer

    Abstract: With the advancement of multimedia technologies, news documents and user-generated content are often represented as multiple modalities, making Multimedia Event Extraction (MEE) an increasingly important challenge. However, recent MEE methods employ weak alignment strategies and data augmentation with simple classification models, which ignore the capabilities of natural language-formulated event… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

  2. arXiv:2406.11025  [pdf, other

    cs.SD cs.CL eess.AS

    Large Language Models for Dysfluency Detection in Stuttered Speech

    Authors: Dominik Wagner, Sebastian P. Bayerl, Ilja Baumann, Korbinian Riedhammer, Elmar Nöth, Tobias Bocklet

    Abstract: Accurately detecting dysfluencies in spoken language can help to improve the performance of automatic speech and language processing components and support the development of more inclusive speech and language technologies. Inspired by the recent trend towards the deployment of large language models (LLMs) as universal learners and processors of non-lexical inputs, such as audio and video, we appr… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

    Comments: Accepted at Interspeech 2024

  3. arXiv:2406.11022  [pdf, other

    cs.SD eess.AS

    Outlier Reduction with Gated Attention for Improved Post-training Quantization in Large Sequence-to-sequence Speech Foundation Models

    Authors: Dominik Wagner, Ilja Baumann, Korbinian Riedhammer, Tobias Bocklet

    Abstract: This paper explores the improvement of post-training quantization (PTQ) after knowledge distillation in the Whisper speech foundation model family. We address the challenge of outliers in weights and activation tensors, known to impede quantization quality in transformer-based language and vision models. Extending this observation to Whisper, we demonstrate that these outliers are also present whe… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

    Comments: Accepted at Interspeech 2024

  4. arXiv:2406.11016  [pdf, other

    cs.LG cs.CL

    Optimized Speculative Sampling for GPU Hardware Accelerators

    Authors: Dominik Wagner, Seanie Lee, Ilja Baumann, Philipp Seeberger, Korbinian Riedhammer, Tobias Bocklet

    Abstract: In this work, we optimize speculative sampling for parallel hardware accelerators to improve sampling speed. We notice that substantial portions of the intermediate matrices necessary for speculative sampling can be computed concurrently. This allows us to distribute the workload across multiple GPU threads, enabling simultaneous operations on matrix segments within thread blocks. Additionally, we… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  5. arXiv:2405.18822  [pdf, other

    cs.CL

    Toxicity Detection for Free

    Authors: Zhanhao Hu, Julien Piet, Geng Zhao, Jiantao Jiao, David Wagner

    Abstract: Current LLMs are generally aligned to follow safety requirements and tend to refuse toxic prompts. However, LLMs can fail to refuse toxic prompts or be overcautious and refuse benign examples. In addition, state-of-the-art toxicity detectors have low TPRs at low FPR, incurring high costs in real-world applications where toxic examples are rare. In this paper, we explore Moderation Using LLM Intros… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  6. arXiv:2405.15556  [pdf, other

    cs.LG cs.CL cs.CR

    Certifiably Robust RAG against Retrieval Corruption

    Authors: Chong Xiang, Tong Wu, Zexuan Zhong, David Wagner, Danqi Chen, Prateek Mittal

    Abstract: Retrieval-augmented generation (RAG) has been shown vulnerable to retrieval corruption attacks: an attacker can inject malicious passages into retrieval results to induce inaccurate responses. In this paper, we propose RobustRAG as the first defense framework against retrieval corruption attacks. The key insight of RobustRAG is an isolate-then-aggregate strategy: we get LLM responses from each pas… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  7. arXiv:2405.06124  [pdf, other

    cs.CR

    Demystifying Behavior-Based Malware Detection at Endpoints

    Authors: Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David Wagner, Tudor Dumitras

    Abstract: Machine learning is widely used for malware detection in practice. Prior behavior-based detectors most commonly rely on traces of programs executed in controlled sandboxes. However, sandbox traces are unavailable to the last line of defense offered by security vendors: malware detection at endpoints. A detector at endpoints consumes the traces of programs running on real-world hosts, as sandbox an… ▽ More

    Submitted 9 May, 2024; originally announced May 2024.

    Comments: Behavior-based malware detection with machine learning. 18 pages, 10 figures, 15 tables. Leaderboard: https://malwaredetectioninthewild.github.io

  8. arXiv:2403.18624  [pdf, other

    cs.SE cs.CL

    Vulnerability Detection with Code Language Models: How Far Are We?

    Authors: Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David Wagner, Baishakhi Ray, Yizheng Chen

    Abstract: In the context of the rising interest in code language models (code LMs) and vulnerability detection, we study the effectiveness of code LMs for detecting vulnerabilities. Our analysis reveals significant shortcomings in existing vulnerability datasets, including poor data quality, low label accuracy, and high duplication rates, leading to unreliable model performance in realistic vulnerability de… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  9. A Multimodal Approach to Device-Directed Speech Detection with Large Language Models

    Authors: Dominik Wagner, Alexander Churchill, Siddharth Sigtia, Panayiotis Georgiou, Matt Mirsamadi, Aarshee Mishra, Erik Marchi

    Abstract: Interactions with virtual assistants typically start with a predefined trigger phrase followed by the user command. To make interactions with the assistant more intuitive, we explore whether it is feasible to drop the requirement that users must begin each command with a trigger phrase. We explore this task in three ways: First, we train classifiers using only acoustic information obtained from th… ▽ More

    Submitted 26 March, 2024; v1 submitted 21 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: text overlap with arXiv:2312.03632

  10. arXiv:2403.06595  [pdf, other

    cs.CR

    Towards more accurate and useful data anonymity vulnerability measures

    Authors: Paul Francis, David Wagner

    Abstract: The purpose of anonymizing structured data is to protect the privacy of individuals in the data while retaining the statistical properties of the data. There is a large body of work that examines anonymization vulnerabilities. Focusing on strong anonymization mechanisms, this paper examines a number of prominent attack papers and finds several problems, all of which lead to overstating risk. First… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  11. arXiv:2402.12617  [pdf, other

    cs.CR cs.AI cs.CL cs.CY cs.LG

    Generative AI Security: Challenges and Countermeasures

    Authors: Banghua Zhu, Norman Mu, Jiantao Jiao, David Wagner

    Abstract: Generative AI's expanding footprint across numerous industries has led to both excitement and increased scrutiny. This paper delves into the unique security challenges posed by Generative AI, and outlines potential research directions for managing these risks.

    Submitted 19 February, 2024; originally announced February 2024.

  12. arXiv:2402.11752  [pdf, ps, other

    cs.LG cs.AI math.OC

    Diagonalisation SGD: Fast & Convergent SGD for Non-Differentiable Models via Reparameterisation and Smoothing

    Authors: Dominik Wagner, Basim Khajwal, C. -H. Luke Ong

    Abstract: It is well-known that the reparameterisation gradient estimator, which exhibits low variance in practice, is biased for non-differentiable models. This may compromise correctness of gradient-based optimisation methods such as stochastic gradient descent (SGD). We introduce a simple syntactic framework to define non-differentiable functions piecewisely and present a systematic approach to obtain sm… ▽ More

    Submitted 19 February, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

  13. arXiv:2402.09674  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    PAL: Proxy-Guided Black-Box Attack on Large Language Models

    Authors: Chawin Sitawarin, Norman Mu, David Wagner, Alexandre Araujo

    Abstract: Large Language Models (LLMs) have surged in popularity in recent months, but they have demonstrated concerning capabilities to generate harmful content when manipulated. While techniques like safety fine-tuning aim to minimize harmful use, recent works have shown that LLMs remain vulnerable to attacks that elicit toxic responses. In this work, we introduce the Proxy-Guided Attack on LLMs (PAL), th… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  14. arXiv:2402.06363  [pdf, other

    cs.CR

    StruQ: Defending Against Prompt Injection with Structured Queries

    Authors: Sizhe Chen, Julien Piet, Chawin Sitawarin, David Wagner

    Abstract: Recent advances in Large Language Models (LLMs) enable exciting LLM-integrated applications, which perform text-based tasks by utilizing their advanced language understanding capabilities. However, as LLMs have improved, so have the attacks against them. Prompt injection attacks are an important threat: they trick the model to deviate from the original application's instructions and instead follow… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

    Comments: prompt injections, LLM security

  15. arXiv:2312.17673  [pdf, other

    cs.CR cs.AI cs.CL

    Jatmo: Prompt Injection Defense by Task-Specific Finetuning

    Authors: Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David Wagner

    Abstract: Large Language Models (LLMs) are attracting significant research attention due to their instruction-following abilities, allowing users and developers to leverage LLMs for a variety of tasks. However, LLMs are vulnerable to prompt-injection attacks: a class of attacks that hijack the model's instruction-following abilities, changing responses to prompts to undesired, possibly malicious ones. In th… ▽ More

    Submitted 8 January, 2024; v1 submitted 29 December, 2023; originally announced December 2023.

    Comments: 24 pages, 6 figures

  16. arXiv:2312.03632  [pdf, other

    cs.SD cs.LG eess.AS

    Multimodal Data and Resource Efficient Device-Directed Speech Detection with Large Foundation Models

    Authors: Dominik Wagner, Alexander Churchill, Siddharth Sigtia, Panayiotis Georgiou, Matt Mirsamadi, Aarshee Mishra, Erik Marchi

    Abstract: Interactions with virtual assistants typically start with a trigger phrase followed by a command. In this work, we explore the possibility of making these interactions more natural by eliminating the need for a trigger phrase. Our goal is to determine whether a user addressed the virtual assistant based on signals obtained from the streaming audio recorded by the device microphone. We address this… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

  17. arXiv:2312.00273  [pdf, other

    cs.CR cs.AI cs.CL

    Mark My Words: Analyzing and Evaluating Language Model Watermarks

    Authors: Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David Wagner

    Abstract: The capabilities of large language models have grown significantly in recent years and so too have concerns about their misuse. In this context, the ability to distinguish machine-generated text from human-authored content becomes important. Prior works have proposed numerous schemes to watermark text, which would benefit from a systematic evaluation framework. This work focuses on text watermarki… ▽ More

    Submitted 6 December, 2023; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: 18 pages, 11 figures

  18. arXiv:2311.04235  [pdf, other

    cs.AI cs.CL cs.LG

    Can LLMs Follow Simple Rules?

    Authors: Norman Mu, Sarah Chen, Zifan Wang, Sizhe Chen, David Karamardian, Lulwa Aljeraisy, Basel Alomair, Dan Hendrycks, David Wagner

    Abstract: As Large Language Models (LLMs) are deployed with increasing real-world responsibilities, it is important to be able to specify and constrain the behavior of these systems in a reliable manner. Model developers may wish to set explicit rules for the model, such as "do not generate abusive content", but these may be circumvented by jailbreaking techniques. Existing evaluations of adversarial attack… ▽ More

    Submitted 8 March, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

    Comments: Project website: https://eecs.berkeley.edu/~normanmu/llm_rules; revised content

  19. arXiv:2310.17645  [pdf, other

    cs.LG cs.AI cs.CR cs.CV

    PubDef: Defending Against Transfer Attacks From Public Models

    Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner

    Abstract: Adversarial attacks have been a looming and unaddressed threat in the industry. However, through a decade-long history of the robustness evaluation literature, we have learned that mounting a strong or optimal attack is challenging. It requires both machine learning and domain expertise. In other words, the white-box threat model, religiously assumed by a large majority of the past literature, is… ▽ More

    Submitted 17 March, 2024; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: ICLR 2024. Code available at https://github.com/wagner-group/pubdef

  20. arXiv:2306.06514  [pdf, other

    cs.SD eess.AS

    Vocoder-Free Non-Parallel Conversion of Whispered Speech With Masked Cycle-Consistent Generative Adversarial Networks

    Authors: Dominik Wagner, Ilja Baumann, Tobias Bocklet

    Abstract: Cycle-consistent generative adversarial networks have been widely used in non-parallel voice conversion (VC). Their ability to learn map**s between source and target features without relying on parallel training data eliminates the need for temporal alignments. However, most methods decouple the conversion of acoustic features from synthesizing the audio signal by using separate models for conve… ▽ More

    Submitted 10 June, 2023; originally announced June 2023.

  21. arXiv:2305.19255  [pdf, other

    eess.AS cs.CL cs.SD

    A Stutter Seldom Comes Alone -- Cross-Corpus Stuttering Detection as a Multi-label Problem

    Authors: Sebastian P. Bayerl, Dominik Wagner, Ilja Baumann, Florian Hönig, Tobias Bocklet, Elmar Nöth, Korbinian Riedhammer

    Abstract: Most stuttering detection and classification research has viewed stuttering as a multi-class classification problem or a binary detection task for each dysfluency type; however, this does not match the nature of stuttering, in which one dysfluency seldom comes alone but rather co-occurs with others. This paper explores multi-language and cross-corpus end-to-end stuttering detection as a multi-labe… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: Accepted for presentation at Interspeech 2023. arXiv admin note: substantial text overlap with arXiv:2210.15982

  22. arXiv:2304.00409  [pdf, other

    cs.CR cs.AI cs.LG cs.SE

    DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection

    Authors: Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner

    Abstract: We propose and release a new vulnerable source code dataset. We curate the dataset by crawling security issue websites, extracting vulnerability-fixing commits and source codes from the corresponding projects. Our new dataset contains 18,945 vulnerable functions spanning 150 CWEs and 330,492 non-vulnerable functions extracted from 7,514 commits. Our dataset covers 295 more projects than all previo… ▽ More

    Submitted 8 August, 2023; v1 submitted 1 April, 2023; originally announced April 2023.

    Comments: Published at RAID 2023

  23. arXiv:2303.05904  [pdf, ps, other

    cs.LG

    Deep Anomaly Detection on Tennessee Eastman Process Data

    Authors: Fabian Hartung, Billy Joe Franks, Tobias Michels, Dennis Wagner, Philipp Liznerski, Steffen Reithermann, Sophie Fellenz, Fabian Jirasek, Maja Rudolph, Daniel Neider, Heike Leitte, Chen Song, Benjamin Kloepper, Stephan Mandt, Michael Bortz, Jakob Burger, Hans Hasse, Marius Kloft

    Abstract: This paper provides the first comprehensive evaluation and analysis of modern (deep-learning) unsupervised anomaly detection methods for chemical process data. We focus on the Tennessee Eastman process dataset, which has been a standard litmus test to benchmark anomaly detection methods for nearly three decades. Our extensive study will facilitate choosing appropriate anomaly detection methods in… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

  24. arXiv:2302.04332  [pdf, other

    cs.CR cs.AI

    Continuous Learning for Android Malware Detection

    Authors: Yizheng Chen, Zhoujie Ding, David Wagner

    Abstract: Machine learning methods can detect Android malware with very high accuracy. However, these classifiers have an Achilles heel, concept drift: they rapidly become out of date and ineffective, due to the evolution of malware apps and benign apps. Our research finds that, after training an Android malware classifier on one year's worth of data, the F1 score quickly dropped from 0.99 to 0.76 after 6 m… ▽ More

    Submitted 14 June, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: Published at USENIX Security Symposium 2023

  25. arXiv:2301.03415  [pdf, other

    cs.PL cs.LG

    Fast and Correct Gradient-Based Optimisation for Probabilistic Programming via Smoothing

    Authors: Basim Khajwal, C. -H. Luke Ong, Dominik Wagner

    Abstract: We study the foundations of variational inference, which frames posterior inference as an optimisation problem, for probabilistic programming. The dominant approach for optimisation in practice is stochastic gradient descent. In particular, a variant using the so-called reparameterisation gradient estimator exhibits fast convergence in a traditional statistics setting. Unfortunately, discontinuiti… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

  26. arXiv:2212.05680  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    REAP: A Large-Scale Realistic Adversarial Patch Benchmark

    Authors: Nabeel Hingun, Chawin Sitawarin, Jerry Li, David Wagner

    Abstract: Machine learning models are known to be susceptible to adversarial perturbation. One famous attack is the adversarial patch, a sticker with a particularly crafted pattern that makes the model incorrectly predict the object it is placed on. This attack presents a critical threat to cyber-physical systems that rely on cameras such as autonomous cars. Despite the significance of the problem, conducti… ▽ More

    Submitted 18 August, 2023; v1 submitted 11 December, 2022; originally announced December 2022.

    Comments: ICCV 2023. Code and benchmark can be found at https://github.com/wagner-group/reap-benchmark

  27. Generative Models for Improved Naturalness, Intelligibility, and Voicing of Whispered Speech

    Authors: Dominik Wagner, Sebastian P. Bayerl, Hector A. Cordourier Maruri, Tobias Bocklet

    Abstract: This work adapts two recent architectures of generative models and evaluates their effectiveness for the conversion of whispered speech to normal speech. We incorporate the normal target speech into the training criterion of vector-quantized variational autoencoders (VQ-VAEs) and MelGANs, thereby conditioning the systems to recover voiced speech from whispered inputs. Objective and subjective qual… ▽ More

    Submitted 30 January, 2023; v1 submitted 4 December, 2022; originally announced December 2022.

    Comments: Accepted at SLT 2022

  28. arXiv:2211.08774  [pdf, other

    cs.SD eess.AS

    Speaker Adaptation for End-To-End Speech Recognition Systems in Noisy Environments

    Authors: Dominik Wagner, Ilja Baumann, Sebastian P. Bayerl, Korbinian Riedhammer, Tobias Bocklet

    Abstract: We analyze the impact of speaker adaptation in end-to-end automatic speech recognition models based on transformers and wav2vec 2.0 under different noise conditions. By including speaker embeddings obtained from x-vector and ECAPA-TDNN systems, as well as i-vectors, we achieve relative word error rate improvements of up to 16.3% on LibriSpeech and up to 14.5% on Switchboard. We show that the prove… ▽ More

    Submitted 7 December, 2023; v1 submitted 16 November, 2022; originally announced November 2022.

    Comments: Accepted at ASRU 2023

  29. arXiv:2210.15982  [pdf, other

    eess.AS cs.SD

    Dysfluencies Seldom Come Alone -- Detection as a Multi-Label Problem

    Authors: Sebastian P. Bayerl, Dominik Wagner, Florian Hönig, Tobias Bocklet, Elmar Nöth, Korbinian Riedhammer

    Abstract: Specially adapted speech recognition models are necessary to handle stuttered speech. For these to be used in a targeted manner, stuttered speech must be reliably detected. Recent works have treated stuttering as a multi-class classification problem or viewed detecting each dysfluency type as an isolated task; that does not capture the nature of stuttering, where one dysfluency seldom comes alone,… ▽ More

    Submitted 28 October, 2022; originally announced October 2022.

    Comments: Submitted to ICASSP 2023

  30. arXiv:2210.15941  [pdf, other

    eess.AS cs.SD

    Influence of Utterance and Speaker Characteristics on the Classification of Children with Cleft Lip and Palate

    Authors: Ilja Baumann, Dominik Wagner, Franziska Braun, Sebastian P. Bayerl, Elmar Nöth, Korbinian Riedhammer, Tobias Bocklet

    Abstract: Recent findings show that pre-trained wav2vec 2.0 models are reliable feature extractors for various speaker characteristics classification tasks. We show that latent representations extracted at different layers of a pre-trained wav2vec 2.0 system can be used as features for binary classification to distinguish between children with Cleft Lip and Palate (CLP) and a healthy control group. The resu… ▽ More

    Submitted 1 August, 2023; v1 submitted 28 October, 2022; originally announced October 2022.

    Comments: INTERSPEECH 2023

  31. arXiv:2210.15336  [pdf, ps, other

    eess.AS cs.SD

    Multi-class Detection of Pathological Speech with Latent Features: How does it perform on unseen data?

    Authors: Dominik Wagner, Ilja Baumann, Franziska Braun, Sebastian P. Bayerl, Elmar Nöth, Korbinian Riedhammer, Tobias Bocklet

    Abstract: The detection of pathologies from speech features is usually defined as a binary classification task with one class representing a specific pathology and the other class representing healthy speech. In this work, we train neural networks, large margin classifiers, and tree boosting machines to distinguish between four pathologies: Parkinson's disease, laryngeal cancer, cleft lip and palate, and or… ▽ More

    Submitted 1 August, 2023; v1 submitted 27 October, 2022; originally announced October 2022.

    Comments: INTERSPEECH 2023

  32. arXiv:2209.09117  [pdf, other

    cs.CV cs.CR cs.LG

    Part-Based Models Improve Adversarial Robustness

    Authors: Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David Wagner

    Abstract: We show that combining human prior knowledge with end-to-end learning can improve the robustness of deep neural networks by introducing a part-based model for object classification. We believe that the richer form of annotation helps guide neural networks to learn more robust features without requiring more samples or larger models. Our model combines a part segmentation model with a tiny classifi… ▽ More

    Submitted 8 March, 2023; v1 submitted 15 September, 2022; originally announced September 2022.

    Comments: Published in ICLR 2023 (poster). Code can be found at https://github.com/chawins/adv-part-model

  33. arXiv:2207.07875  [pdf, other

    cs.LG cs.AI cs.CV

    On the Importance of Hyperparameters and Data Augmentation for Self-Supervised Learning

    Authors: Diane Wagner, Fabio Ferreira, Danny Stoll, Robin Tibor Schirrmeister, Samuel Müller, Frank Hutter

    Abstract: Self-Supervised Learning (SSL) has become a very active area of Deep Learning research where it is heavily used as a pre-training method for classification and other tasks. However, the rapid pace of advancements in this area comes at a price: training pipelines vary significantly across papers, which presents a potentially crucial confounding factor. Here, we show that, indeed, the choice of hype… ▽ More

    Submitted 16 July, 2022; originally announced July 2022.

    Comments: Accepted at the ICML 2022 Pre-training Workshop

  34. arXiv:2207.03574  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Demystifying the Adversarial Robustness of Random Transformation Defenses

    Authors: Chawin Sitawarin, Zachary Golan-Strieb, David Wagner

    Abstract: Neural networks' lack of robustness against attacks raises concerns in security-sensitive settings such as autonomous vehicles. While many countermeasures may look promising, only a few withstand rigorous evaluation. Defenses using random transformations (RT) have shown impressive results, particularly BaRT (Raff et al., 2019) on ImageNet. However, this type of defense has not been rigorously eval… ▽ More

    Submitted 15 July, 2022; v1 submitted 18 June, 2022; originally announced July 2022.

    Comments: ICML 2022 (short presentation), AAAI 2022 AdvML Workshop (best paper, oral presentation)

  35. arXiv:2206.08058  [pdf, other

    eess.AS cs.CL cs.SD

    Nonwords Pronunciation Classification in Language Development Tests for Preschool Children

    Authors: Ilja Baumann, Dominik Wagner, Sebastian Bayerl, Tobias Bocklet

    Abstract: This work aims to automatically evaluate whether the language development of children is age-appropriate. Validated speech and language tests are used for this purpose to test the auditory memory. In this work, the task is to determine whether spoken nonwords have been uttered correctly. We compare different approaches that are motivated to model specific language structures: Low-level features (F… ▽ More

    Submitted 17 June, 2022; v1 submitted 16 June, 2022; originally announced June 2022.

    Comments: Accepted at Interspeech 2022

  36. arXiv:2206.03400  [pdf, ps, other

    eess.AS cs.CL cs.SD

    The Influence of Dataset Partitioning on Dysfluency Detection Systems

    Authors: Sebastian P. Bayerl, Dominik Wagner, Elmar Nöth, Tobias Bocklet, Korbinian Riedhammer

    Abstract: This paper empirically investigates the influence of different data splits and splitting strategies on the performance of dysfluency detection systems. For this, we perform experiments using wav2vec 2.0 models with a classification head as well as support vector machines (SVM) in conjunction with the features extracted from the wav2vec 2.0 model to detect dysfluencies. We train and evaluate the sy… ▽ More

    Submitted 7 June, 2022; originally announced June 2022.

    Comments: Accepted at the 25th International Conference on Text, Speech and Dialogue (TSD 2022)

  37. arXiv:2205.14017  [pdf, other

    cs.CR cs.AR

    BASALISC: Programmable Hardware Accelerator for BGV Fully Homomorphic Encryption

    Authors: Robin Geelen, Michiel Van Beirendonck, Hilder V. L. Pereira, Brian Huffman, Tynan McAuley, Ben Selfridge, Daniel Wagner, Georgios Dimou, Ingrid Verbauwhede, Frederik Vercauteren, David W. Archer

    Abstract: Fully Homomorphic Encryption (FHE) allows for secure computation on encrypted data. Unfortunately, huge memory size, computational cost and bandwidth requirements limit its practicality. We present BASALISC, an architecture family of hardware accelerators that aims to substantially accelerate FHE computations in the cloud. BASALISC is the first to implement the BGV scheme with fully-packed bootstr… ▽ More

    Submitted 25 July, 2023; v1 submitted 27 May, 2022; originally announced May 2022.

  38. arXiv:2205.13202  [pdf, other

    cs.DS cs.LG

    More Recent Advances in (Hyper)Graph Partitioning

    Authors: Ümit V. Çatalyürek, Karen D. Devine, Marcelo Fonseca Faraj, Lars Gottesbüren, Tobias Heuer, Henning Meyerhenke, Peter Sanders, Sebastian Schlag, Christian Schulz, Daniel Seemaier, Dorothea Wagner

    Abstract: In recent years, significant advances have been made in the design and evaluation of balanced (hyper)graph partitioning algorithms. We survey trends of the last decade in practical algorithms for balanced (hyper)graph partitioning together with future research directions. Our work serves as an update to a previous survey on the topic. In particular, the survey extends the previous survey by also c… ▽ More

    Submitted 30 June, 2022; v1 submitted 26 May, 2022; originally announced May 2022.

  39. arXiv:2204.03428  [pdf, other

    eess.AS cs.CL cs.SD

    Detecting Vocal Fatigue with Neural Embeddings

    Authors: Sebastian P. Bayerl, Dominik Wagner, Ilja Baumann, Korbinian Riedhammer, Tobias Bocklet

    Abstract: Vocal fatigue refers to the feeling of tiredness and weakness of voice due to extended utilization. This paper investigates the effectiveness of neural embeddings for the detection of vocal fatigue. We compare x-vectors, ECAPA-TDNN, and wav2vec 2.0 embeddings on a corpus of academic spoken English. Low-dimensional map**s of the data reveal that neural embeddings capture information about the cha… ▽ More

    Submitted 17 January, 2023; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted for Publication in the Journal of Voice

  40. Detecting Dysfluencies in Stuttering Therapy Using wav2vec 2.0

    Authors: Sebastian P. Bayerl, Dominik Wagner, Elmar Nöth, Korbinian Riedhammer

    Abstract: Stuttering is a varied speech disorder that harms an individual's communication ability. Persons who stutter (PWS) often use speech therapy to cope with their condition. Improving speech recognition systems for people with such non-typical speech or tracking the effectiveness of speech therapy would require systems that can detect dysfluencies while at the same time being able to detect speech tec… ▽ More

    Submitted 16 June, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

    Comments: Accepted at Interspeech 2022

  41. arXiv:2201.04351  [pdf, other

    cs.CR

    Diffix Elm: Simple Diffix

    Authors: Paul Francis, Sebastian Probst-Eide, David Wagner, Felix Bauer, Cristian Berneanu, Edon Gashi

    Abstract: Historically, strong data anonymization requires substantial domain expertise and custom design for the given data set and use case. Diffix is an anonymization framework designed to make strong data anonymization available to non-experts. This paper describes Diffix Elm, a version of Diffix that is very easy to use at the expense of query features. We describe Diffix Elm, and show that it provides… ▽ More

    Submitted 20 June, 2022; v1 submitted 12 January, 2022; originally announced January 2022.

  42. arXiv:2112.12750  [pdf, other

    cs.CV

    SLIP: Self-supervision meets Language-Image Pre-training

    Authors: Norman Mu, Alexander Kirillov, David Wagner, Saining Xie

    Abstract: Recent work has shown that self-supervised pre-training leads to improvements over supervised learning on challenging visual recognition tasks. CLIP, an exciting new approach to learning with language supervision, demonstrates promising performance on a wide variety of benchmarks. In this work, we explore whether self-supervised learning can aid in the use of language supervision for visual repres… ▽ More

    Submitted 23 December, 2021; originally announced December 2021.

    Comments: Code: https://github.com/facebookresearch/SLIP

  43. arXiv:2111.00487  [pdf, other

    cs.CV cs.LG

    Smart(Sampling)Augment: Optimal and Efficient Data Augmentation for Semantic Segmentation

    Authors: Misgana Negassi, Diane Wagner, Alexander Reiterer

    Abstract: Data augmentation methods enrich datasets with augmented data to improve the performance of neural networks. Recently, automated data augmentation methods have emerged, which automatically design augmentation strategies. Existing work focuses on image classification and object detection, whereas we provide the first study on semantic image segmentation and introduce two new approaches: \textit{Sma… ▽ More

    Submitted 31 October, 2021; originally announced November 2021.

    Comments: Negassi and Wagner provided an equal contribution

  44. arXiv:2105.13442  [pdf, other

    cs.CR

    Hopper: Modeling and Detecting Lateral Movement (Extended Report)

    Authors: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement based on commonly available enterprise logs. Hopper constructs a graph of login activity among internal machines and then identifies suspicious seque… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Usenix Security Symposium 2021

  45. Learning Security Classifiers with Verified Global Robustness Properties

    Authors: Yizheng Chen, Shiqi Wang, Yue Qin, Xiao**g Liao, Suman Jana, David Wagner

    Abstract: Many recent works have proposed methods to train classifiers with local robustness properties, which can provably eliminate classes of evasion attacks for most inputs, but not all inputs. Since data distribution shift is very common in security applications, e.g., often observed for malware detection, local robustness cannot guarantee that the property holds for unseen inputs at the time of deploy… ▽ More

    Submitted 1 December, 2021; v1 submitted 24 May, 2021; originally announced May 2021.

    Comments: ACM Conference on Computer and Communications Security (CCS) 2021 Best Paper Award Runner-Up

  46. arXiv:2105.08714  [pdf, other

    cs.LG cs.CR cs.CV

    Fighting Gradients with Gradients: Dynamic Defenses against Adversarial Attacks

    Authors: Dequan Wang, An Ju, Evan Shelhamer, David Wagner, Trevor Darrell

    Abstract: Adversarial attacks optimize against models to defeat defenses. Existing defenses are static, and stay the same once trained, even while attacks change. We argue that models should fight back, and optimize their defenses against attacks at test time. We propose dynamic defenses, to adapt the model and input during testing, by defensive entropy minimization (dent). Dent alters testing, but not trai… ▽ More

    Submitted 18 May, 2021; originally announced May 2021.

  47. arXiv:2104.14175  [pdf, other

    cs.LO

    Initial Limit Datalog: a New Extensible Class of Decidable Constrained Horn Clauses

    Authors: Toby Cathcart Burn, Luke Ong, Steven Ramsay, Dominik Wagner

    Abstract: We present initial limit Datalog, a new extensible class of constrained Horn clauses for which the satisfiability problem is decidable. The class may be viewed as a generalisation to higher-order logic (with a simple restriction on types) of the first-order language limit Datalog$_Z$ (a fragment of Datalog modulo linear integer arithmetic), but can be instantiated with any suitable background theo… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Comments: 18 pages. To be published in LICS 2021

  48. arXiv:2103.10359  [pdf, other

    cs.DS

    Nearest-Neighbor Queries in Customizable Contraction Hierarchies and Applications

    Authors: Valentin Buchhold, Dorothea Wagner

    Abstract: Customizable contraction hierarchies are one of the most popular route planning frameworks in practice, due to their simplicity and versatility. In this work, we present a novel algorithm for finding k-nearest neighbors in customizable contraction hierarchies by systematically exploring the associated separator decomposition tree. Compared to previous bucket-based approaches, our algorithm require… ▽ More

    Submitted 18 March, 2021; originally announced March 2021.

    Comments: Will be presented at the 19th International Symposium on Experimental Algorithms (SEA'21)

  49. arXiv:2103.00663  [pdf, other

    cs.CV

    Model-Agnostic Defense for Lane Detection against Adversarial Attack

    Authors: Henry Xu, An Ju, David Wagner

    Abstract: Susceptibility of neural networks to adversarial attack prompts serious safety concerns for lane detection efforts, a domain where such models have been widely applied. Recent work on adversarial road patches have successfully induced perception of lane lines with arbitrary form, presenting an avenue for rogue control of vehicle behavior. In this paper, we propose a modular lane verification syste… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

    Comments: 6 pages, 6 figures, 3 tables. Part of AutoSec 2021 proceedings

  50. Modeling and Engineering Constrained Shortest Path Algorithms for Battery Electric Vehicles

    Authors: Moritz Baum, Julian Dibbelt, Dorothea Wagner, Tobias Zündorf

    Abstract: We study the problem of computing constrained shortest paths for battery electric vehicles. Since battery capacities are limited, fastest routes are often infeasible. Instead, users are interested in fast routes on which the energy consumption does not exceed the battery capacity. For that, drivers can deliberately reduce speed to save energy. Hence, route planning should provide both path and spe… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

    Journal ref: In Transportation Science volume 54(6), pages 1571-1600, 2020