Skip to main content

Showing 1–39 of 39 results for author: Feizi, S

Searching in archive stat. Search in all archives.
.
  1. arXiv:2306.16415  [pdf, other

    cs.LG cs.AI cs.CR cs.CV stat.ML

    On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks

    Authors: Wenxiao Wang, Soheil Feizi

    Abstract: The increasing access to data poses both opportunities and risks in deep learning, as one can manipulate the behaviors of deep learning models with malicious training samples. Such attacks are known as data poisoning. Recent advances in defense strategies against data poisoning have highlighted the effectiveness of aggregation schemes in achieving state-of-the-art results in certified poisoning ro… ▽ More

    Submitted 28 June, 2023; originally announced June 2023.

    Comments: 15 pages

  2. arXiv:2303.16308  [pdf, other

    cs.LG stat.ML

    Provable Robustness for Streaming Models with a Sliding Window

    Authors: Aounon Kumar, Vinu Sankar Sadasivan, Soheil Feizi

    Abstract: The literature on provable robustness in machine learning has primarily focused on static prediction problems, such as image classification, in which input samples are assumed to be independent and model performance is measured as an expectation over the input distribution. Robustness certificates are derived for individual input instances with the assumption that the model is evaluated on each in… ▽ More

    Submitted 28 March, 2023; originally announced March 2023.

  3. arXiv:2302.03684  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Temporal Robustness against Data Poisoning

    Authors: Wenxiao Wang, Soheil Feizi

    Abstract: Data poisoning considers cases when an adversary manipulates the behavior of machine learning algorithms through malicious training data. Existing threat models of data poisoning center around a single metric, the number of poisoned samples. In consequence, if attackers can poison more samples than expected with affordable overhead, as in many practical scenarios, they may be able to render existi… ▽ More

    Submitted 6 December, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: 37th Conference on Neural Information Processing Systems (NeurIPS 2023)

  4. arXiv:2208.03309  [pdf, other

    cs.LG cs.AI cs.CR cs.CV stat.ML

    Lethal Dose Conjecture on Data Poisoning

    Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi

    Abstract: Data poisoning considers an adversary that distorts the training set of machine learning algorithms for malicious purposes. In this work, we bring to light one conjecture regarding the fundamentals of data poisoning, which we call the Lethal Dose Conjecture. The conjecture states: If $n$ clean training samples are needed for accurate predictions, then in a size-$N$ training set, only $Θ(N/n)$ pois… ▽ More

    Submitted 18 October, 2022; v1 submitted 5 August, 2022; originally announced August 2022.

    Comments: 36th Conference on Neural Information Processing Systems (NeurIPS 2022)

  5. arXiv:2202.02628  [pdf, other

    cs.LG cs.CR stat.ML

    Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation

    Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi

    Abstract: Data poisoning attacks aim at manipulating model behaviors through distorting training data. Previously, an aggregation-based certified defense, Deep Partition Aggregation (DPA), was proposed to mitigate this threat. DPA predicts through an aggregation of base classifiers trained on disjoint subsets of data, thus restricting its sensitivity to dataset distortions. In this work, we propose an impro… ▽ More

    Submitted 14 July, 2022; v1 submitted 5 February, 2022; originally announced February 2022.

    Comments: International Conference on Machine Learning (ICML), 2022

    Journal ref: Proceedings of the 39th International Conference on Machine Learning, PMLR 162:22769-22783, 2022

  6. arXiv:2104.05605  [pdf, other

    cs.LG stat.ML

    Understanding Overparameterization in Generative Adversarial Networks

    Authors: Yogesh Balaji, Mohammadmahdi Sajedi, Neha Mukund Kalibhat, Mucong Ding, Dominik Stöger, Mahdi Soltanolkotabi, Soheil Feizi

    Abstract: A broad class of unsupervised deep learning methods such as Generative Adversarial Networks (GANs) involve training of overparameterized models where the number of parameters of the model exceeds a certain threshold. A large body of work in supervised learning have shown the importance of model overparameterization in the convergence of the gradient descent (GD) to globally optimal solutions. In c… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

    Comments: Accepted in ICLR 2021

  7. arXiv:2010.13924  [pdf, other

    cs.LG stat.ML

    Benchmarking Deep Learning Interpretability in Time Series Predictions

    Authors: Aya Abdelsalam Ismail, Mohamed Gunady, Héctor Corrada Bravo, Soheil Feizi

    Abstract: Saliency methods are used extensively to highlight the importance of input features in model predictions. These methods are mostly used in vision and language tasks, and their applications to time series data is relatively unexplored. In this paper, we set out to extensively compare the performance of various saliency-based interpretability methods across diverse neural architectures, including Re… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Journal ref: NeurIPS 2020

  8. arXiv:2010.10549  [pdf, other

    cs.LG stat.ML

    Tight Second-Order Certificates for Randomized Smoothing

    Authors: Alexander Levine, Aounon Kumar, Thomas Goldstein, Soheil Feizi

    Abstract: Randomized smoothing is a popular way of providing robustness guarantees against adversarial attacks: randomly-smoothed functions have a universal Lipschitz-like bound, allowing for robustness certificates to be easily computed. In this work, we show that there also exists a universal curvature-like bound for Gaussian random smoothing: given the exact value and gradient of a smoothed function, we… ▽ More

    Submitted 14 December, 2020; v1 submitted 20 October, 2020; originally announced October 2020.

    Comments: Updated to reference and reflect results of concurrent work, Mohapatra et al., which shows that second-order certificates are possible using sqrt(d) samples

  9. arXiv:2009.11921  [pdf, other

    cs.LG cs.IT eess.SP stat.ML

    GANs with Variational Entropy Regularizers: Applications in Mitigating the Mode-Collapse Issue

    Authors: Pirazh Khorramshahi, Hossein Souri, Rama Chellappa, Soheil Feizi

    Abstract: Building on the success of deep learning, Generative Adversarial Networks (GANs) provide a modern approach to learn a probability distribution from observed samples. GANs are often formulated as a zero-sum game between two sets of functions; the generator and the discriminator. Although GANs have shown great potentials in learning complex distributions such as images, they often suffer from the mo… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

  10. arXiv:2009.08061  [pdf, other

    cs.LG stat.ML

    Certifying Confidence via Randomized Smoothing

    Authors: Aounon Kumar, Alexander Levine, Soheil Feizi, Tom Goldstein

    Abstract: Randomized smoothing has been shown to provide good certified-robustness guarantees for high-dimensional classification problems. It uses the probabilities of predicting the top two most-likely classes around an input point under a smoothing distribution to generate a certified radius for a classifier's prediction. However, most smoothing methods do not give us any information about the confidence… ▽ More

    Submitted 22 October, 2020; v1 submitted 17 September, 2020; originally announced September 2020.

  11. arXiv:2006.14768  [pdf, other

    cs.LG stat.ML

    Deep Partition Aggregation: Provable Defense against General Poisoning Attacks

    Authors: Alexander Levine, Soheil Feizi

    Abstract: Adversarial poisoning attacks distort training data in order to corrupt the test-time behavior of a classifier. A provable defense provides a certificate for each test sample, which is a lower bound on the magnitude of any adversarial distortion of the training set that can corrupt the test sample's classification. We propose two novel provable defenses against poisoning attacks: (i) Deep Partitio… ▽ More

    Submitted 18 March, 2021; v1 submitted 25 June, 2020; originally announced June 2020.

    Comments: ICLR 2021

  12. arXiv:2006.14651  [pdf, other

    cs.LG stat.ML

    Influence Functions in Deep Learning Are Fragile

    Authors: Samyadeep Basu, Philip Pope, Soheil Feizi

    Abstract: Influence functions approximate the effect of training samples in test-time predictions and have a wide variety of applications in machine learning interpretability and uncertainty estimation. A commonly-used (first-order) influence function can be implemented efficiently as a post-hoc method requiring access only to the gradients and Hessian of the model. For linear models, influence functions ar… ▽ More

    Submitted 10 February, 2021; v1 submitted 25 June, 2020; originally announced June 2020.

    Comments: ICLR 2021

  13. arXiv:2006.12655  [pdf, other

    cs.LG cs.CV stat.ML

    Perceptual Adversarial Robustness: Defense Against Unseen Threat Models

    Authors: Cassidy Laidlaw, Sahil Singla, Soheil Feizi

    Abstract: A key challenge in adversarial robustness is the lack of a precise mathematical characterization of human perception, used in the very definition of adversarial attacks that are imperceptible to human eyes. Most current attacks and defenses try to avoid this issue by considering restrictive adversarial threat models such as those bounded by $L_2$ or $L_\infty$ distance, spatial perturbations, etc.… ▽ More

    Submitted 4 July, 2021; v1 submitted 22 June, 2020; originally announced June 2020.

    Comments: Published in ICLR 2021. Code and data are available at https://github.com/cassidylaidlaw/perceptual-advex

  14. arXiv:2006.00731  [pdf, other

    cs.LG stat.ML

    Second-Order Provable Defenses against Adversarial Attacks

    Authors: Sahil Singla, Soheil Feizi

    Abstract: A robustness certificate is the minimum distance of a given input to the decision boundary of the classifier (or its lower bound). For {\it any} input perturbations with a magnitude smaller than the certificate value, the classification output will provably remain unchanged. Exactly computing the robustness certificates for neural networks is difficult since it requires solving a non-convex optimi… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Journal ref: Proceedings of the 37th International Conference on Machine Learning, 2020

  15. arXiv:2003.10713  [pdf, other

    cs.LG stat.ML

    Unsupervised Anomaly Detection with Adversarial Mirrored AutoEncoders

    Authors: Gowthami Somepalli, Yexin Wu, Yogesh Balaji, Bhanukiran Vinzamuri, Soheil Feizi

    Abstract: Detecting out of distribution (OOD) samples is of paramount importance in all Machine Learning applications. Deep generative modeling has emerged as a dominant paradigm to model complex data distributions without labels. However, prior work has shown that generative models tend to assign higher likelihoods to OOD samples compared to the data distribution on which they were trained. First, we propo… ▽ More

    Submitted 3 January, 2021; v1 submitted 24 March, 2020; originally announced March 2020.

    Comments: Updated the paper with more OOD detection baselines. Performed ablation analysis on various components of AMA

  16. arXiv:2003.00652  [pdf, other

    cs.LG stat.ML

    GANs with Conditional Independence Graphs: On Subadditivity of Probability Divergences

    Authors: Mucong Ding, Constantinos Daskalakis, Soheil Feizi

    Abstract: Generative Adversarial Networks (GANs) are modern methods to learn the underlying distribution of a data set. GANs have been widely used in sample synthesis, de-noising, domain transfer, etc. GANs, however, are designed in a model-free fashion where no additional information about the underlying distribution is available. In many applications, however, practitioners have access to the underlying i… ▽ More

    Submitted 25 February, 2021; v1 submitted 1 March, 2020; originally announced March 2020.

  17. arXiv:2002.10733  [pdf, other

    cs.LG cs.CV stat.ML

    (De)Randomized Smoothing for Certifiable Defense against Patch Attacks

    Authors: Alexander Levine, Soheil Feizi

    Abstract: Patch adversarial attacks on images, in which the attacker can distort pixels within a region of bounded size, are an important threat model since they provide a quantitative model for physical adversarial attacks. In this paper, we introduce a certifiable defense against patch attacks that guarantees for a given image and patch attack size, no patch adversarial examples exist. Our method is relat… ▽ More

    Submitted 8 January, 2021; v1 submitted 25 February, 2020; originally announced February 2020.

    Comments: NeurIPS 2020

  18. arXiv:2002.03239  [pdf, other

    cs.LG stat.ML

    Curse of Dimensionality on Randomized Smoothing for Certifiable Robustness

    Authors: Aounon Kumar, Alexander Levine, Tom Goldstein, Soheil Feizi

    Abstract: Randomized smoothing, using just a simple isotropic Gaussian distribution, has been shown to produce good robustness guarantees against $\ell_2$-norm bounded adversaries. In this work, we show that extending the smoothing technique to defend against other attack models can be challenging, especially in the high-dimensional regime. In particular, for a vast class of i.i.d.~smoothing distributions,… ▽ More

    Submitted 14 August, 2020; v1 submitted 8 February, 2020; originally announced February 2020.

  19. arXiv:1911.11253  [pdf, other

    cs.LG cs.AI stat.ML

    Playing it Safe: Adversarial Robustness with an Abstain Option

    Authors: Cassidy Laidlaw, Soheil Feizi

    Abstract: We explore adversarial robustness in the setting in which it is acceptable for a classifier to abstain---that is, output no class---on adversarial examples. Adversarial examples are small perturbations of normal inputs to a classifier that cause the classifier to give incorrect output; they present security and safety challenges for machine learning systems. In many safety-critical applications, i… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

  20. arXiv:1911.10258  [pdf, other

    cs.LG stat.ML

    Fantastic Four: Differentiable Bounds on Singular Values of Convolution Layers

    Authors: Sahil Singla, Soheil Feizi

    Abstract: In deep neural networks, the spectral norm of the Jacobian of a layer bounds the factor by which the norm of a signal changes during forward/backward propagation. Spectral norm regularizations have been shown to improve generalization, robustness and optimization of deep learning methods. Existing methods to compute the spectral norm of convolution layers either rely on heuristics that are efficie… ▽ More

    Submitted 12 June, 2021; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted at ICLR, 2021

  21. arXiv:1911.09272  [pdf, other

    cs.LG stat.ML

    Robustness Certificates for Sparse Adversarial Attacks by Randomized Ablation

    Authors: Alexander Levine, Soheil Feizi

    Abstract: Recently, techniques have been developed to provably guarantee the robustness of a classifier to adversarial perturbations of bounded L_1 and L_2 magnitudes by using randomized smoothing: the robust classification is a consensus of base classifications on randomly noised samples where the noise is additive. In this paper, we extend this technique to the L_0 threat model. We propose an efficient an… ▽ More

    Submitted 20 November, 2019; originally announced November 2019.

  22. arXiv:1911.08654  [pdf, other

    cs.LG stat.ML

    Adversarial Robustness of Flow-Based Generative Models

    Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi

    Abstract: Flow-based generative models leverage invertible generator functions to fit a distribution to the training data using maximum likelihood. Despite their use in several application domains, robustness of these models to adversarial attacks has hardly been explored. In this paper, we study adversarial robustness of flow-based generative models both theoretically (for some simple models) and empirical… ▽ More

    Submitted 19 November, 2019; originally announced November 2019.

  23. arXiv:1911.00418  [pdf, other

    cs.LG stat.ML

    On Second-Order Group Influence Functions for Black-Box Predictions

    Authors: Samyadeep Basu, Xuchen You, Soheil Feizi

    Abstract: With the rapid adoption of machine learning systems in sensitive applications, there is an increasing need to make black-box models explainable. Often we want to identify an influential group of training samples in a particular test prediction for a given machine learning model. Existing influence functions tackle this problem by using first-order approximations of the effect of removing a sample… ▽ More

    Submitted 6 July, 2020; v1 submitted 1 November, 2019; originally announced November 2019.

    Comments: To Appear in ICML 2020

  24. arXiv:1910.12370  [pdf, other

    cs.LG stat.ML

    Input-Cell Attention Reduces Vanishing Saliency of Recurrent Neural Networks

    Authors: Aya Abdelsalam Ismail, Mohamed Gunady, Luiz Pessoa, Héctor Corrada Bravo, Soheil Feizi

    Abstract: Recent efforts to improve the interpretability of deep neural networks use saliency to characterize the importance of input features to predictions made by models. Work on interpretability using saliency-based methods on Recurrent Neural Networks (RNNs) has mostly targeted language tasks, and their applicability to time series data is less understood. In this work we analyze saliency-based methods… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

    Journal ref: Neurips 2019

  25. arXiv:1910.10783  [pdf, other

    cs.LG stat.ML

    Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks

    Authors: Alexander Levine, Soheil Feizi

    Abstract: In the last couple of years, several adversarial attack methods based on different threat models have been proposed for the image classification problem. Most existing defenses consider additive threat models in which sample perturbations have bounded L_p norms. These defenses, however, can be vulnerable against adversarial attacks under non-additive threat models. An example of an attack method b… ▽ More

    Submitted 23 October, 2019; originally announced October 2019.

  26. arXiv:1905.12864  [pdf, other

    cs.LG cs.CL stat.ML

    Interpretable Adversarial Training for Text

    Authors: Samuel Barham, Soheil Feizi

    Abstract: Generating high-quality and interpretable adversarial examples in the text domain is a much more daunting task than it is in the image domain. This is due partly to the discrete nature of text, partly to the problem of ensuring that the adversarial examples are still probable and interpretable, and partly to the problem of maintaining label invariance under input perturbations. In order to address… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

  27. arXiv:1905.12105  [pdf, other

    cs.LG stat.ML

    Certifiably Robust Interpretation in Deep Learning

    Authors: Alexander Levine, Sahil Singla, Soheil Feizi

    Abstract: Deep learning interpretation is essential to explain the reasoning behind model predictions. Understanding the robustness of interpretation methods is important especially in sensitive domains such as medical applications since interpretation results are often used in downstream tasks. Although gradient-based saliency maps are popular methods for deep learning interpretation, recent works show tha… ▽ More

    Submitted 17 October, 2019; v1 submitted 28 May, 2019; originally announced May 2019.

  28. arXiv:1905.09747  [pdf, other

    cs.LG cs.CV stat.ML

    Adversarially Robust Distillation

    Authors: Micah Goldblum, Liam Fowl, Soheil Feizi, Tom Goldstein

    Abstract: Knowledge distillation is effective for producing small, high-performance neural networks for classification, but these small networks are vulnerable to adversarial attacks. This paper studies how adversarial robustness transfers from teacher to student during knowledge distillation. We find that a large amount of robustness may be inherited by the student even when distilled on only clean images.… ▽ More

    Submitted 2 December, 2019; v1 submitted 23 May, 2019; originally announced May 2019.

    Comments: Accepted to AAAI Conference on Artificial Intelligence, 2020

  29. arXiv:1902.01235  [pdf, other

    cs.LG stat.ML

    Robustness Certificates Against Adversarial Examples for ReLU Networks

    Authors: Sahil Singla, Soheil Feizi

    Abstract: While neural networks have achieved high performance in different learning tasks, their accuracy drops significantly in the presence of small adversarial perturbations to inputs. Defenses based on regularization and adversarial training are often followed by new attacks to defeat them. In this paper, we propose attack-agnostic robustness certificates for a multi-label classification problem using… ▽ More

    Submitted 5 February, 2019; v1 submitted 1 February, 2019; originally announced February 2019.

  30. arXiv:1902.00415  [pdf, other

    cs.LG stat.ML

    Normalized Wasserstein Distance for Mixture Distributions with Applications in Adversarial Learning and Domain Adaptation

    Authors: Yogesh Balaji, Rama Chellappa, Soheil Feizi

    Abstract: Understanding proper distance measures between distributions is at the core of several learning tasks such as generative models, domain adaptation, clustering, etc. In this work, we focus on mixture distributions that arise naturally in several application domains where the data contains different sub-populations. For mixture distributions, established distance measures such as the Wasserstein dis… ▽ More

    Submitted 29 October, 2019; v1 submitted 1 February, 2019; originally announced February 2019.

    Comments: Accepted at ICCV 2019

  31. arXiv:1902.00407  [pdf, other

    cs.LG stat.ML

    Understanding Impacts of High-Order Loss Approximations and Features in Deep Learning Interpretation

    Authors: Sahil Singla, Eric Wallace, Shi Feng, Soheil Feizi

    Abstract: Current methods to interpret deep learning models by generating saliency maps generally rely on two key assumptions. First, they use first-order approximations of the loss function neglecting higher-order terms such as the loss curvatures. Second, they evaluate each feature's importance in isolation, ignoring their inter-dependencies. In this work, we study the effect of relaxing these two assumpt… ▽ More

    Submitted 30 May, 2019; v1 submitted 1 February, 2019; originally announced February 2019.

    Comments: Proceedings of the 36th International Conference on Machine Learning, 2019

  32. arXiv:1902.00159  [pdf, other

    cs.LG stat.ML

    Compressing GANs using Knowledge Distillation

    Authors: Angeline Aguinaldo, **-Yeh Chiang, Alex Gain, Ameya Patil, Kolten Pearson, Soheil Feizi

    Abstract: Generative Adversarial Networks (GANs) have been used in several machine learning tasks such as domain transfer, super resolution, and synthetic data generation. State-of-the-art GANs often use tens of millions of parameters, making them expensive to deploy for applications in low SWAP (size, weight, and power) hardware, such as mobile devices, and for applications with real time capabilities. The… ▽ More

    Submitted 31 January, 2019; originally announced February 2019.

  33. arXiv:1810.04147  [pdf, other

    cs.LG stat.ML

    Entropic GANs meet VAEs: A Statistical Approach to Compute Sample Likelihoods in GANs

    Authors: Yogesh Balaji, Hamed Hassani, Rama Chellappa, Soheil Feizi

    Abstract: Building on the success of deep learning, two modern approaches to learn a probability model from the data are Generative Adversarial Networks (GANs) and Variational AutoEncoders (VAEs). VAEs consider an explicit probability model for the data and compute a generative distribution by maximizing a variational lower-bound on the log-likelihood function. GANs, however, compute a generative model by m… ▽ More

    Submitted 5 June, 2019; v1 submitted 9 October, 2018; originally announced October 2018.

  34. arXiv:1809.02104  [pdf, other

    cs.LG cs.CV stat.ML

    Are adversarial examples inevitable?

    Authors: Ali Shafahi, W. Ronny Huang, Christoph Studer, Soheil Feizi, Tom Goldstein

    Abstract: A wide range of defenses have been proposed to harden neural networks against adversarial attacks. However, a pattern has emerged in which the majority of adversarial defenses are quickly broken by new attacks. Given the lack of success at generating robust defenses, we are led to ask a fundamental question: Are adversarial attacks inevitable? This paper analyzes adversarial examples from a theore… ▽ More

    Submitted 3 February, 2020; v1 submitted 6 September, 2018; originally announced September 2018.

    Journal ref: International Conference on Learning Representations, 2019. https://openreview.net/forum?id=r1lWUoA9FQ

  35. arXiv:1710.10793  [pdf, other

    stat.ML cs.IT cs.LG

    Understanding GANs: the LQG Setting

    Authors: Soheil Feizi, Farzan Farnia, Tony Ginart, David Tse

    Abstract: Generative Adversarial Networks (GANs) have become a popular method to learn a probability model from data. In this paper, we aim to provide an understanding of some of the basic issues surrounding GANs including their formulation, generalization and stability on a simple benchmark where the data has a high-dimensional Gaussian distribution. Even in this simple benchmark, the GAN problem has not b… ▽ More

    Submitted 22 October, 2018; v1 submitted 30 October, 2017; originally announced October 2017.

  36. arXiv:1710.02196  [pdf, other

    stat.ML cs.LG

    Porcupine Neural Networks: (Almost) All Local Optima are Global

    Authors: Soheil Feizi, Hamid Javadi, Jesse Zhang, David Tse

    Abstract: Neural networks have been used prominently in several machine learning and statistics applications. In general, the underlying optimization of neural networks is non-convex which makes their performance analysis challenging. In this paper, we take a novel approach to this problem by asking whether one can constrain neural network weights to make its optimization landscape have good theoretical pro… ▽ More

    Submitted 5 October, 2017; originally announced October 2017.

  37. arXiv:1702.05471  [pdf, other

    stat.ML cs.IT cs.LG

    Maximally Correlated Principal Component Analysis

    Authors: Soheil Feizi, David Tse

    Abstract: In the era of big data, reducing data dimensionality is critical in many areas of science. Widely used Principal Component Analysis (PCA) addresses this problem by computing a low dimensional data embedding that maximally explain variance of the data. However, PCA has two major weaknesses. Firstly, it only considers linear correlations among variables (features), and secondly it is not suitable fo… ▽ More

    Submitted 21 February, 2017; v1 submitted 17 February, 2017; originally announced February 2017.

    Comments: 35 pages, 5 figures

  38. arXiv:1606.04789  [pdf, other

    stat.ML

    Network Maximal Correlation

    Authors: Soheil Feizi, Ali Makhdoumi, Ken Duffy, Muriel Medard, Manolis Kellis

    Abstract: We introduce Network Maximal Correlation (NMC) as a multivariate measure of nonlinear association among random variables. NMC is defined via an optimization that infers transformations of variables by maximizing aggregate inner products between transformed variables. For finite discrete and jointly Gaussian random variables, we characterize a solution of the NMC optimization using basis expansion… ▽ More

    Submitted 9 February, 2017; v1 submitted 15 June, 2016; originally announced June 2016.

    Comments: 17 pages, 5 figures

  39. arXiv:1510.00850  [pdf, other

    stat.ML

    Maximum Likelihood Latent Space Embedding of Logistic Random Dot Product Graphs

    Authors: Luke O'Connor, Muriel Médard, Soheil Feizi

    Abstract: A latent space model for a family of random graphs assigns real-valued vectors to nodes of the graph such that edge probabilities are determined by latent positions. Latent space models provide a natural statistical framework for graph visualizing and clustering. A latent space model of particular interest is the Random Dot Product Graph (RDPG), which can be fit using an efficient spectral method;… ▽ More

    Submitted 30 August, 2017; v1 submitted 3 October, 2015; originally announced October 2015.