Zum Hauptinhalt springen

Showing 1–40 of 40 results for author: Croce, F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.19874  [pdf, other

    cs.CL cs.AI cs.LG

    Is In-Context Learning Sufficient for Instruction Following in LLMs?

    Authors: Hao Zhao, Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion

    Abstract: In-context learning (ICL) allows LLMs to learn from examples without changing their weights, which is a particularly promising capability for long-context LLMs that can potentially learn from many examples. Recently, Lin et al. (2024) proposed URIAL, a method using only three in-context examples to align base LLMs, achieving non-trivial instruction following performance. In this work, we show that… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: Preprint. Code at https://github.com/tml-epfl/icl-alignment

  2. arXiv:2404.14461  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Competition Report: Finding Universal Jailbreak Backdoors in Aligned LLMs

    Authors: Javier Rando, Francesco Croce, Kryštof Mitka, Stepan Shabalin, Maksym Andriushchenko, Nicolas Flammarion, Florian Tramèr

    Abstract: Large language models are aligned to be safe, preventing users from generating harmful content like misinformation or instructions for illegal activities. However, previous work has shown that the alignment process is vulnerable to poisoning attacks. Adversaries can manipulate the safety training data to inject backdoors that act like a universal sudo command: adding the backdoor string to any pro… ▽ More

    Submitted 6 June, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: Competition Report

  3. arXiv:2404.02151  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks

    Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion

    Abstract: We show that even the most recent safety-aligned LLMs are not robust to simple adaptive jailbreaking attacks. First, we demonstrate how to successfully leverage access to logprobs for jailbreaking: we initially design an adversarial prompt template (sometimes adapted to the target LLM), and then we apply random search on a suffix to maximize a target logprob (e.g., of the token ``Sure''), potentia… ▽ More

    Submitted 18 June, 2024; v1 submitted 2 April, 2024; originally announced April 2024.

    Comments: Updates in the v2: more models (Llama3, Phi-3, Nemotron-4-340B), jailbreak artifacts for all attacks are available, evaluation of generalization to a different judge (Llama-3-70B and Llama Guard 2), more experiments (convergence plots over iterations, ablation on the suffix length for random search), improved exposition of the paper, examples of jailbroken generation

  4. arXiv:2404.01318  [pdf, other

    cs.CR cs.LG

    JailbreakBench: An Open Robustness Benchmark for Jailbreaking Large Language Models

    Authors: Patrick Chao, Edoardo Debenedetti, Alexander Robey, Maksym Andriushchenko, Francesco Croce, Vikash Sehwag, Edgar Dobriban, Nicolas Flammarion, George J. Pappas, Florian Tramer, Hamed Hassani, Eric Wong

    Abstract: Jailbreak attacks cause large language models (LLMs) to generate harmful, unethical, or otherwise objectionable content. Evaluating these attacks presents a number of challenges, which the current collection of benchmarks and evaluation techniques do not adequately address. First, there is no clear standard of practice regarding jailbreaking evaluation. Second, existing works compute costs and suc… ▽ More

    Submitted 16 July, 2024; v1 submitted 27 March, 2024; originally announced April 2024.

    Comments: JailbreakBench v1.0: more attack artifacts, more test-time defenses, a more accurate jailbreak judge (Llama-3-70B with a custom prompt), a larger dataset of human preferences for selecting a jailbreak judge (300 examples), an over-refusal evaluation dataset (100 benign/borderline behaviors), a semantic refusal judge based on Llama-3-8B

  5. arXiv:2402.12336  [pdf, other

    cs.LG cs.AI cs.CV stat.ML

    Robust CLIP: Unsupervised Adversarial Fine-Tuning of Vision Embeddings for Robust Large Vision-Language Models

    Authors: Christian Schlarmann, Naman Deep Singh, Francesco Croce, Matthias Hein

    Abstract: Multi-modal foundation models like OpenFlamingo, LLaVA, and GPT-4 are increasingly used for various real-world tasks. Prior work has shown that these models are highly vulnerable to adversarial attacks on the vision modality. These attacks can be leveraged to spread fake information or defraud users, and thus pose a significant risk, which makes the robustness of large multi-modal foundation model… ▽ More

    Submitted 5 June, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: ICML 2024 Oral

  6. arXiv:2402.04833  [pdf, other

    cs.CL

    Long Is More for Alignment: A Simple but Tough-to-Beat Baseline for Instruction Fine-Tuning

    Authors: Hao Zhao, Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion

    Abstract: There is a consensus that instruction fine-tuning of LLMs requires high-quality data, but what are they? LIMA (NeurIPS 2023) and AlpaGasus (ICLR 2024) are state-of-the-art methods for selecting such high-quality examples, either via manual curation or using GPT-3.5-Turbo as a quality scorer. We show that the extremely simple baseline of selecting the 1,000 instructions with longest responses -- th… ▽ More

    Submitted 4 June, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

    Comments: Accepted at ICML 2024. This camera-ready version adds MT-Bench evaluations, a human study, more thorough analysis of length bias. Code at https://github.com/tml-epfl/long-is-more-for-alignment

  7. arXiv:2311.14450  [pdf, other

    cs.CV cs.CR cs.LG

    Segment (Almost) Nothing: Prompt-Agnostic Adversarial Attacks on Segmentation Models

    Authors: Francesco Croce, Matthias Hein

    Abstract: General purpose segmentation models are able to generate (semantic) segmentation masks from a variety of prompts, including visual (points, boxed, etc.) and textual (object names) ones. In particular, input images are pre-processed by an image encoder to obtain embedding vectors which are later used for mask predictions. Existing adversarial attacks target the end-to-end tasks, i.e. aim at alterin… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  8. arXiv:2306.12941  [pdf, other

    cs.CV cs.LG

    Towards Reliable Evaluation and Fast Training of Robust Semantic Segmentation Models

    Authors: Francesco Croce, Naman D Singh, Matthias Hein

    Abstract: Adversarial robustness has been studied extensively in image classification, especially for the $\ell_\infty$-threat model, but significantly less so for related tasks such as object detection and semantic segmentation, where attacks turn out to be a much harder optimization problem than for image classification. We propose several problem-specific novel attacks minimizing different metrics in acc… ▽ More

    Submitted 16 July, 2024; v1 submitted 22 June, 2023; originally announced June 2023.

    Comments: ECCV 2024

  9. arXiv:2303.01870  [pdf, other

    cs.CV cs.CR cs.LG

    Revisiting Adversarial Training for ImageNet: Architectures, Training and Generalization across Threat Models

    Authors: Naman D Singh, Francesco Croce, Matthias Hein

    Abstract: While adversarial training has been extensively studied for ResNet architectures and low resolution datasets like CIFAR, much less is known for ImageNet. Given the recent debate about whether transformers are more robust than convnets, we revisit adversarial training on ImageNet comparing ViTs and ConvNeXts. Extensive experiments show that minor changes in architecture, most notably replacing Patc… ▽ More

    Submitted 28 October, 2023; v1 submitted 3 March, 2023; originally announced March 2023.

    Comments: Accepted at NeurIPS 2023

  10. arXiv:2302.10826  [pdf, ps, other

    math.OC cs.DS

    ITERATED INSIDE OUT: a new exact algorithm for the transportation problem

    Authors: Roberto Bargetto, Federico Della Croce, Rosario Scatamacchia

    Abstract: We propose a novel exact algorithm for the transportation problem, one of the paradigmatic network optimization problems. The algorithm, denoted Iterated Inside Out, requires in input a basic feasible solution and is composed by two main phases that are iteratively repeated until an optimal basic feasible solution is reached. In the first "inside" phase, the algorithm progressively improves upon a… ▽ More

    Submitted 29 March, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

  11. arXiv:2302.10164  [pdf, other

    cs.LG cs.CV

    Seasoning Model Soups for Robustness to Adversarial and Natural Distribution Shifts

    Authors: Francesco Croce, Sylvestre-Alvise Rebuffi, Evan Shelhamer, Sven Gowal

    Abstract: Adversarial training is widely used to make classifiers robust to a specific threat or adversary, such as $\ell_p$-norm bounded perturbations of a given $p$-norm. However, existing methods for training classifiers robust to multiple threats require knowledge of all attacks during training and remain vulnerable to unseen distribution shifts. In this work, we describe how to obtain adversarially-rob… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

  12. arXiv:2302.07011  [pdf, other

    cs.LG

    A Modern Look at the Relationship between Sharpness and Generalization

    Authors: Maksym Andriushchenko, Francesco Croce, Maximilian Müller, Matthias Hein, Nicolas Flammarion

    Abstract: Sharpness of minima is a promising quantity that can correlate with generalization in deep networks and, when optimized during training, can improve generalization. However, standard sharpness is not invariant under reparametrizations of neural networks, and, to fix this, reparametrization-invariant sharpness definitions have been proposed, most prominently adaptive sharpness (Kwon et al., 2021).… ▽ More

    Submitted 7 June, 2023; v1 submitted 14 February, 2023; originally announced February 2023.

    Comments: The camera-ready version (accepted at ICML 2023)

  13. arXiv:2210.11841  [pdf, other

    cs.CV cs.LG

    Diffusion Visual Counterfactual Explanations

    Authors: Maximilian Augustin, Valentyn Boreiko, Francesco Croce, Matthias Hein

    Abstract: Visual Counterfactual Explanations (VCEs) are an important tool to understand the decisions of an image classifier. They are 'small' but 'realistic' semantic changes of the image changing the classifier decision. Current approaches for the generation of VCEs are restricted to adversarially robust models and often contain non-realistic artefacts, or are limited to image classification problems with… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: NeurIPS 2022

  14. arXiv:2210.04886  [pdf, other

    cs.CV cs.LG

    Revisiting adapters with adversarial training

    Authors: Sylvestre-Alvise Rebuffi, Francesco Croce, Sven Gowal

    Abstract: While adversarial training is generally used as a defense mechanism, recent works show that it can also act as a regularizer. By co-training a neural network on clean and adversarial inputs, it is possible to improve classification accuracy on the clean, non-adversarial inputs. We demonstrate that, contrary to previous findings, it is not necessary to separate batch statistics when co-training on… ▽ More

    Submitted 10 October, 2022; originally announced October 2022.

  15. arXiv:2209.06953  [pdf, other

    cs.CV cs.LG

    On the interplay of adversarial robustness and architecture components: patches, convolution and attention

    Authors: Francesco Croce, Matthias Hein

    Abstract: In recent years novel architecture components for image classification have been developed, starting with attention and patches used in transformers. While prior works have analyzed the influence of some aspects of architecture components on the robustness to adversarial attacks, in particular for vision transformers, the understanding of the main factors is still limited. We compare several (non)… ▽ More

    Submitted 14 September, 2022; originally announced September 2022.

    Comments: Presented at the "New Frontiers in Adversarial Machine Learning" Workshop at ICML 2022

  16. arXiv:2206.06182  [pdf, other

    cs.LG cs.DB

    AI-based Data Preparation and Data Analytics in Healthcare: The Case of Diabetes

    Authors: Marianna Maranghi, Aris Anagnostopoulos, Irene Cannistraci, Ioannis Chatzigiannakis, Federico Croce, Giulia Di Teodoro, Michele Gentile, Giorgio Grani, Maurizio Lenzerini, Stefano Leonardi, Andrea Mastropietro, Laura Palagi, Massimiliano Pappa, Riccardo Rosati, Riccardo Valentini, Paola Velardi

    Abstract: The Associazione Medici Diabetologi (AMD) collects and manages one of the largest worldwide-available collections of diabetic patient records, also known as the AMD database. This paper presents the initial results of an ongoing project whose focus is the application of Artificial Intelligence and Machine Learning techniques for conceptualizing, cleaning, and analyzing such an important and valuab… ▽ More

    Submitted 20 July, 2022; v1 submitted 13 June, 2022; originally announced June 2022.

    Comments: The work has been presented at the conference Ital-IA 2022 (https://www.ital-ia2022.it/)

  17. Sparse Visual Counterfactual Explanations in Image Space

    Authors: Valentyn Boreiko, Maximilian Augustin, Francesco Croce, Philipp Berens, Matthias Hein

    Abstract: Visual counterfactual explanations (VCEs) in image space are an important tool to understand decisions of image classifiers as they show under which changes of the image the decision of the classifier would change. Their generation in image space is challenging and requires robust models due to the problem of adversarial examples. Existing techniques to generate VCEs in image space suffer from spu… ▽ More

    Submitted 29 September, 2022; v1 submitted 16 May, 2022; originally announced May 2022.

    Journal ref: GCPR 2022

  18. arXiv:2202.13711  [pdf, other

    cs.LG cs.CR cs.CV

    Evaluating the Adversarial Robustness of Adaptive Test-time Defenses

    Authors: Francesco Croce, Sven Gowal, Thomas Brunner, Evan Shelhamer, Matthias Hein, Taylan Cemgil

    Abstract: Adaptive defenses, which optimize at test time, promise to improve adversarial robustness. We categorize such adaptive test-time defenses, explain their potential benefits and drawbacks, and evaluate a representative variety of the latest adaptive defenses for image classification. Unfortunately, none significantly improve upon static defenses when subjected to our careful case study evaluation. S… ▽ More

    Submitted 13 July, 2022; v1 submitted 28 February, 2022; originally announced February 2022.

    Comments: ICML'22

  19. arXiv:2108.10021  [pdf, ps, other

    cs.AI

    QDEF and Its Approximations in OBDM

    Authors: Gianluca Cima, Federico Croce, Maurizio Lenzerini

    Abstract: Given an input dataset (i.e., a set of tuples), query definability in Ontology-based Data Management (OBDM) amounts to find a query over the ontology whose certain answers coincide with the tuples in the given dataset. We refer to such a query as a characterization of the dataset with respect to the OBDM system. Our first contribution is to propose approximations of perfect characterizations in te… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: A more compact version of this paper will be published at the proceedings of the 30th ACM International Conference on Information and Knowledge Management. The associated DOI is: https://doi.org/10.1145/3459637.34824661

  20. arXiv:2105.12508  [pdf, other

    cs.LG cs.CR cs.CV

    Adversarial Robustness against Multiple and Single $l_p$-Threat Models via Quick Fine-Tuning of Robust Classifiers

    Authors: Francesco Croce, Matthias Hein

    Abstract: A major drawback of adversarially robust models, in particular for large scale datasets like ImageNet, is the extremely long training time compared to standard ones. Moreover, models should be robust not only to one $l_p$-threat model but ideally to all of them. In this paper we propose Extreme norm Adversarial Training (E-AT) for multiple-norm robustness which is based on geometric properties of… ▽ More

    Submitted 7 August, 2022; v1 submitted 26 May, 2021; originally announced May 2021.

    Comments: ICML 2022

  21. arXiv:2103.01208  [pdf, other

    cs.LG cs.CV

    Mind the box: $l_1$-APGD for sparse adversarial attacks on image classifiers

    Authors: Francesco Croce, Matthias Hein

    Abstract: We show that when taking into account also the image domain $[0,1]^d$, established $l_1$-projected gradient descent (PGD) attacks are suboptimal as they do not consider that the effective threat model is the intersection of the $l_1$-ball and $[0,1]^d$. We study the expected sparsity of the steepest descent step for this effective threat model and show that the exact projection onto this set is co… ▽ More

    Submitted 24 November, 2023; v1 submitted 1 March, 2021; originally announced March 2021.

    Comments: In ICML 2021. Fixed typos in Eq. (3) and Eq. (4)

  22. arXiv:2010.09670  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    RobustBench: a standardized adversarial robustness benchmark

    Authors: Francesco Croce, Maksym Andriushchenko, Vikash Sehwag, Edoardo Debenedetti, Nicolas Flammarion, Mung Chiang, Prateek Mittal, Matthias Hein

    Abstract: As a research community, we are still lacking a systematic understanding of the progress on adversarial robustness which often makes it hard to identify the most promising ideas in training robust models. A key challenge in benchmarking robustness is that its evaluation is often error-prone leading to robustness overestimation. Our goal is to establish a standardized benchmark of adversarial robus… ▽ More

    Submitted 31 October, 2021; v1 submitted 19 October, 2020; originally announced October 2020.

    Comments: The camera-ready version accepted at the NeurIPS'21 Datasets and Benchmarks Track: 120+ evaluations, 80+ models, 7 leaderboards (Linf, L2, common corruptions; CIFAR-10, CIFAR-100, ImageNet), significantly expanded analysis part (calibration, fairness, privacy leakage, smoothness, transferability)

  23. arXiv:2006.12834  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Sparse-RS: a versatile framework for query-efficient sparse black-box adversarial attacks

    Authors: Francesco Croce, Maksym Andriushchenko, Naman D. Singh, Nicolas Flammarion, Matthias Hein

    Abstract: We propose a versatile framework based on random search, Sparse-RS, for score-based sparse targeted and untargeted attacks in the black-box setting. Sparse-RS does not rely on substitute models and achieves state-of-the-art success rate and query efficiency for multiple sparse attack models: $l_0$-bounded perturbations, adversarial patches, and adversarial frames. The $l_0$-version of untargeted S… ▽ More

    Submitted 7 February, 2022; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: Accepted at AAAI 2022. This version contains considerably extended results in the L0 threat model

  24. arXiv:2005.06225  [pdf, ps, other

    cs.DS

    An improved solution approach for the Budget constrained Fuel Treatment Scheduling problem

    Authors: Federico Della Croce, Marco Ghirardi, Rosario Scatamacchia

    Abstract: This paper considers the budget constrained fuel treatment scheduling (BFTS) problem where, in the context of wildfire mitigation, the goal is to inhibit the potential of fire spread in a landscape by proper fuel treatment activities. Given a time horizon represented by consecutive unit periods, the landscape is divided into cells and represented as a grid graph where each cell has a fuel age that… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

  25. arXiv:2003.12460  [pdf, ps, other

    cs.DS math.CO

    An enhanced pinwheel algorithm for the bamboo garden trimming problem

    Authors: Federico Della Croce

    Abstract: In the Bamboo Garden Trimming Problem (BGT), there is a garden populated by n bamboos b(1), b(2), ... , b(n)$ with daily growth rates h(1) >= h(2) >= ... >= h(n). We assume that the initial heights of bamboos are zero. A gardener is in charge of the bamboos and trims them to height zero according to some schedule. The objective is to design a perpetual schedule of trimming so as to maintain the he… ▽ More

    Submitted 3 June, 2020; v1 submitted 27 March, 2020; originally announced March 2020.

  26. arXiv:2003.01690  [pdf, other

    cs.LG cs.CV stat.ML

    Reliable evaluation of adversarial robustness with an ensemble of diverse parameter-free attacks

    Authors: Francesco Croce, Matthias Hein

    Abstract: The field of defense strategies against adversarial attacks has significantly grown over the last years, but progress is hampered as the evaluation of adversarial defenses is often insufficient and thus gives a wrong impression of robustness. Many promising defenses could be broken later on, making it difficult to identify the state-of-the-art. Frequent pitfalls in the evaluation are improper tuni… ▽ More

    Submitted 4 August, 2020; v1 submitted 3 March, 2020; originally announced March 2020.

    Comments: In ICML 2020

  27. arXiv:1912.00049  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Square Attack: a query-efficient black-box adversarial attack via random search

    Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein

    Abstract: We propose the Square Attack, a score-based black-box $l_2$- and $l_\infty$-adversarial attack that does not rely on local gradient information and thus is not affected by gradient masking. Square Attack is based on a randomized search scheme which selects localized square-shaped updates at random positions so that at each iteration the perturbation is situated approximately at the boundary of the… ▽ More

    Submitted 29 July, 2020; v1 submitted 29 November, 2019; originally announced December 2019.

    Comments: Accepted at ECCV 2020; added imperceptible perturbations, analysis of examples that require more queries, results on dilated CNNs

  28. arXiv:1909.05040  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Sparse and Imperceivable Adversarial Attacks

    Authors: Francesco Croce, Matthias Hein

    Abstract: Neural networks have been proven to be vulnerable to a variety of adversarial attacks. From a safety perspective, highly sparse adversarial attacks are particularly dangerous. On the other hand the pixelwise perturbations of sparse attacks are typically large and thus can be potentially detected. We propose a new black-box technique to craft adversarial examples aiming at minimizing $l_0$-distance… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

    Comments: Accepted to ICCV 2019

  29. arXiv:1907.02044  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack

    Authors: Francesco Croce, Matthias Hein

    Abstract: The evaluation of robustness against adversarial manipulation of neural networks-based classifiers is mainly tested with empirical attacks as methods for the exact computation, even when available, do not scale to large networks. We propose in this paper a new white-box adversarial attack wrt the $l_p$-norms for $p \in \{1,2,\infty\}$ aiming at finding the minimal perturbation necessary to change… ▽ More

    Submitted 20 July, 2020; v1 submitted 3 July, 2019; originally announced July 2019.

  30. arXiv:1905.11213  [pdf, other

    cs.LG cs.CR stat.ML

    Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$

    Authors: Francesco Croce, Matthias Hein

    Abstract: In recent years several adversarial attacks and defenses have been proposed. Often seemingly robust models turn out to be non-robust when more sophisticated attacks are used. One way out of this dilemma are provable robustness guarantees. While provably robust models for specific $l_p$-perturbation models have been developed, we show that they do not come with any guarantee against other $l_q$-per… ▽ More

    Submitted 24 April, 2020; v1 submitted 27 May, 2019; originally announced May 2019.

  31. arXiv:1903.11359  [pdf, other

    cs.LG cs.CR cs.CV cs.NE stat.ML

    Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks

    Authors: Francesco Croce, Jonas Rauber, Matthias Hein

    Abstract: Modern neural networks are highly non-robust against adversarial manipulation. A significant amount of work has been invested in techniques to compute lower bounds on robustness through formal guarantees and to build provably robust models. However, it is still difficult to get guarantees for larger networks or robustness against larger perturbations. Thus attack strategies are needed to provide t… ▽ More

    Submitted 25 September, 2019; v1 submitted 27 March, 2019; originally announced March 2019.

    Comments: Accepted at International Journal of Computer Vision

  32. arXiv:1811.11493  [pdf, other

    cs.LG cs.CR stat.ML

    A randomized gradient-free attack on ReLU networks

    Authors: Francesco Croce, Matthias Hein

    Abstract: It has recently been shown that neural networks but also other classifiers are vulnerable to so called adversarial attacks e.g. in object recognition an almost non-perceivable change of the image changes the decision of the classifier. Relatively fast heuristics have been proposed to produce these adversarial inputs but the problem of finding the optimal adversarial input, that is with the minimal… ▽ More

    Submitted 28 November, 2018; originally announced November 2018.

    Comments: In GCPR 2018

  33. Iterated local search and very large neighborhoods for the parallel-machines total tardiness problem

    Authors: F Croce, Thierry Garaix, A. Grosso

    Abstract: We present computational results with a heuristic algorithm for the parallel machines total weighted tardiness problem. The algorithm combines generalized pairwise interchange neighborhoods, dynasearch optimization and a new machine-based neighborhood whose size is non-polynomial in the number of machines. The computational results significantly improve over the current state of the art for this p… ▽ More

    Submitted 26 October, 2018; originally announced November 2018.

    Journal ref: Computers \& Operations Research, 2012, 39 (6), pp.1213 - 1217

  34. arXiv:1811.02822  [pdf, other

    cs.GT cs.DS

    A new exact approach for the Bilevel Knapsack with Interdiction Constraints

    Authors: Federico Della Croce, Rosario Scatamacchia

    Abstract: We consider the Bilevel Knapsack with Interdiction Constraints, an extension of the classic 0-1 knapsack problem formulated as a Stackelberg game with two agents, a leader and a follower, that choose items from a common set and hold their own private knapsacks. First, the leader selects some items to be interdicted for the follower while satisfying a capacity constraint. Then the follower packs a… ▽ More

    Submitted 12 November, 2018; v1 submitted 7 November, 2018; originally announced November 2018.

  35. arXiv:1810.07481  [pdf, other

    cs.LG stat.ML

    Provable Robustness of ReLU networks via Maximization of Linear Regions

    Authors: Francesco Croce, Maksym Andriushchenko, Matthias Hein

    Abstract: It has been shown that neural network classifiers are not robust. This raises concerns about their usage in safety-critical systems. We propose in this paper a regularization scheme for ReLU networks which provably improves the robustness of the classifier by maximizing the linear regions of the classifier as well as the distance to the decision boundary. Our techniques allow even to find the mini… ▽ More

    Submitted 8 March, 2019; v1 submitted 17 October, 2018; originally announced October 2018.

    Comments: In AISTATS 2019. Conference version with the following modifications: improved readability, comparison to Xiao et al (2018) added, section on visualizations extended

  36. arXiv:1801.05489  [pdf, ps, other

    cs.DS

    Longest Processing Time rule for identical parallel machines revisited

    Authors: Federico Della Croce, Rosario Scatamacchia

    Abstract: We consider the Pm || Cmax scheduling problem where the goal is to schedule n jobs on m identical parallel machines to minimize makespan. We revisit the famous Longest Processing Time (LPT) rule proposed by Graham in 1969. LPT requires to sort jobs in non-ascending order of processing times and then to assign one job at a time to the machine whose load is smallest so far. We provide new insights o… ▽ More

    Submitted 16 January, 2018; originally announced January 2018.

  37. arXiv:1801.04801  [pdf, ps, other

    cs.DS

    Approximating the Incremental Knapsack Problem

    Authors: Federico Della Croce, Ulrich Pferschy, Rosario Scatamacchia

    Abstract: We consider the 0-1 Incremental Knapsack Problem (IKP) where the capacity grows over time periods and if an item is placed in the knapsack in a certain period, it cannot be removed afterwards. The contribution of a packed item in each time period depends on its profit as well as on a time factor which reflects the importance of the period in the objective function. The problem calls for maximizing… ▽ More

    Submitted 15 January, 2018; originally announced January 2018.

  38. arXiv:1709.00252  [pdf, other

    cs.DS

    MILP and Max-Clique based heuristics for the Eternity II puzzle

    Authors: Fabio Salassa, Wim Vancroonenburg, Tony Wauters, Federico Della Croce, Greet Vanden Berghe

    Abstract: The present paper considers a hybrid local search approach to the Eternity II puzzle and to unsigned, rectangular, edge matching puzzles in general. Both an original mixed-integer linear programming (MILP) formulation and a novel Max-Clique formulation are presented for this NP-hard problem. Although the presented formulations remain computationally intractable for medium and large sized instances… ▽ More

    Submitted 5 October, 2017; v1 submitted 1 September, 2017; originally announced September 2017.

  39. arXiv:1707.02849  [pdf, other

    cs.DM

    No-idle, no-wait: when shop scheduling meets dominoes, eulerian and hamiltonian paths

    Authors: Jean-Charles Billaut, Federico Della Croce, Fabio Salassa, Vincent T'kindt

    Abstract: In shop scheduling, several applications exist where it is required that some components perform consecutively. We refer to no-idle schedules if machines are required to operate with no inserted idle time and no-wait schedules if tasks cannot wait between the end of an operation and the start of the following one. We consider here no-idle/no-wait shop scheduling problems with makespan as performan… ▽ More

    Submitted 10 July, 2017; originally announced July 2017.

  40. arXiv:1702.04211  [pdf, ps, other

    cs.DS

    Dynamic programming algorithms, efficient solution of the LP-relaxation and approximation schemes for the Penalized Knapsack Problem

    Authors: Federico Della Croce, Ulrich Pferschy, Rosario Scatamacchia

    Abstract: We consider the 0-1 Penalized Knapsack Problem (PKP). Each item has a profit, a weight and a penalty and the goal is to maximize the sum of the profits minus the greatest penalty value of the items included in a solution. We propose an exact approach relying on a procedure which narrows the relevant range of penalties, on the identification of a core problem and on dynamic programming. The propose… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.