Zum Hauptinhalt springen

Showing 1–13 of 13 results for author: Nakka, K K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.02960  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    ObfuscaTune: Obfuscated Offsite Fine-tuning and Inference of Proprietary LLMs on Private Datasets

    Authors: Ahmed Frikha, Nassim Walha, Ricardo Mendes, Krishna Kanth Nakka, Xue Jiang, Xuebing Zhou

    Abstract: This work addresses the timely yet underexplored problem of performing inference and finetuning of a proprietary LLM owned by a model provider entity on the confidential/private data of another data owner entity, in a way that ensures the confidentiality of both the model and the data. Hereby, the finetuning is conducted offsite, i.e., on the computation infrastructure of a third-party cloud provi… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: Preprint

  2. arXiv:2407.02956  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    IncogniText: Privacy-enhancing Conditional Text Anonymization via LLM-based Private Attribute Randomization

    Authors: Ahmed Frikha, Nassim Walha, Krishna Kanth Nakka, Ricardo Mendes, Xue Jiang, Xuebing Zhou

    Abstract: In this work, we address the problem of text anonymization where the goal is to prevent adversaries from correctly inferring private attributes of the author, while keeping the text utility, i.e., meaning and semantics. We propose IncogniText, a technique that anonymizes the text to mislead a potential adversary into predicting a wrong private attribute value. Our empirical evaluation shows a redu… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: Preprint

  3. arXiv:2407.02943  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    PII-Compass: Guiding LLM training data extraction prompts towards the target PII via grounding

    Authors: Krishna Kanth Nakka, Ahmed Frikha, Ricardo Mendes, Xue Jiang, Xuebing Zhou

    Abstract: The latest and most impactful advances in large models stem from their increased size. Unfortunately, this translates into an improved memorization capacity, raising data privacy concerns. Specifically, it has been shown that models can output personal identifiable information (PII) contained in their training data. However, reported PIII extraction performance varies widely, and there is no conse… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: Accepted at ACL 2024

  4. arXiv:2309.11667  [pdf, other

    cs.CV

    Understanding Pose and Appearance Disentanglement in 3D Human Pose Estimation

    Authors: Krishna Kanth Nakka, Mathieu Salzmann

    Abstract: As 3D human pose estimation can now be achieved with very high accuracy in the supervised learning scenario, tackling the case where 3D pose annotations are not available has received increasing attention. In particular, several methods have proposed to learn image representations in a self-supervised fashion so as to disentangle the appearance information from the pose one. The methods then only… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  5. arXiv:2012.15183  [pdf, other

    cs.CV

    Temporally-Transferable Perturbations: Efficient, One-Shot Adversarial Attacks for Online Visual Object Trackers

    Authors: Krishna Kanth Nakka, Mathieu Salzmann

    Abstract: In recent years, the trackers based on Siamese networks have emerged as highly effective and efficient for visual object tracking (VOT). While these methods were shown to be vulnerable to adversarial attacks, as most deep networks for visual recognition tasks, the existing attacks for VOT trackers all require perturbing the search region of every input frame to be effective, which comes at a non-n… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

  6. arXiv:2006.06028  [pdf, other

    cs.CV

    Towards Robust Fine-grained Recognition by Maximal Separation of Discriminative Features

    Authors: Krishna Kanth Nakka, Mathieu Salzmann

    Abstract: Adversarial attacks have been widely studied for general classification tasks, but remain unexplored in the context of fine-grained recognition, where the inter-class similarities facilitate the attacker's task. In this paper, we identify the proximity of the latent representations of different classes in fine-grained recognition networks as a key factor to the success of adversarial attacks. We t… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

  7. arXiv:1911.13038  [pdf, other

    cs.CV

    Indirect Local Attacks for Context-aware Semantic Segmentation Networks

    Authors: Krishna Kanth Nakka, Mathieu Salzmann

    Abstract: Recently, deep networks have achieved impressive semantic segmentation performance, in particular thanks to their use of larger contextual information. In this paper, we show that the resulting networks are sensitive not only to global attacks, where perturbations affect the entire input image, but also to indirect local attacks where perturbations are confined to a small image region that does no… ▽ More

    Submitted 2 December, 2019; v1 submitted 29 November, 2019; originally announced November 2019.

  8. arXiv:1901.02229  [pdf, other

    cs.CV

    Interpretable BoW Networks for Adversarial Example Detection

    Authors: Krishna Kanth Nakka, Mathieu Salzmann

    Abstract: The standard approach to providing interpretability to deep convolutional neural networks (CNNs) consists of visualizing either their feature maps, or the image regions that contribute the most to the prediction. In this paper, we introduce an alternative strategy to interpret the results of a CNN. To this end, we leverage a Bag of visual Word representation within the network and associate a visu… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

  9. arXiv:1805.07442  [pdf, other

    cs.CV

    My camera can see through fences: A deep learning approach for image de-fencing

    Authors: Sankaraganesh Jonna, Krishna Kanth Nakka, Rajiv R. Sahay

    Abstract: In recent times, the availability of inexpensive image capturing devices such as smartphones/tablets has led to an exponential increase in the number of images/videos captured. However, sometimes the amateur photographer is hindered by fences in the scene which have to be removed after the image has been captured. Conventional approaches to image de-fencing suffer from inaccurate and non-robust fe… ▽ More

    Submitted 18 May, 2018; originally announced May 2018.

    Comments: ACPR 2015, Kuala Lumpur

  10. arXiv:1805.05389  [pdf, other

    cs.CV

    Deep Attentional Structured Representation Learning for Visual Recognition

    Authors: Krishna Kanth Nakka, Mathieu Salzmann

    Abstract: Structured representations, such as Bags of Words, VLAD and Fisher Vectors, have proven highly effective to tackle complex visual recognition tasks. As such, they have recently been incorporated into deep architectures. However, while effective, the resulting deep structured representation learning strategies typically aggregate local features from the entire image, ignoring the fact that, in comp… ▽ More

    Submitted 14 May, 2018; originally announced May 2018.

  11. arXiv:1612.03273  [pdf, other

    cs.CV

    Towards an Automated Image De-fencing Algorithm Using Sparsity

    Authors: Sankaraganesh Jonna, Krishna K. Nakka, Rajiv R. Sahay

    Abstract: Conventional approaches to image de-fencing suffer from non-robust fence detection and are limited to processing images of static scenes. In this position paper, we propose an automatic de-fencing algorithm for images of dynamic scenes. We divide the problem of image de-fencing into the tasks of automated fence detection, motion estimation and fusion of data from multiple frames of a captured vide… ▽ More

    Submitted 10 December, 2016; originally announced December 2016.

    Comments: The paper was accepted in VISAPP-2015

  12. arXiv:1610.06924  [pdf, other

    cs.CV

    Automatic Image De-fencing System

    Authors: Krishna Kanth Nakka

    Abstract: Tourists and Wild-life photographers are often hindered in capturing their cherished images or videos by a fence that limits accessibility to the scene of interest. The situation has been exacerbated by growing concerns of security at public places and a need exists to provide a tool that can be used for post-processing such fenced videos to produce a de-fenced image. There are several challenges… ▽ More

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: Master Thesis, EE IIT KGP, May 2015. arXiv admin note: text overlap with arXiv:1405.3531 by other authors

  13. arXiv:1609.07727  [pdf, other

    cs.CV

    Deep learning based fence segmentation and removal from an image using a video sequence

    Authors: Sankaraganesh Jonna, Krishna K. Nakka, Rajiv R. Sahay

    Abstract: Conventional approaches to image de-fencing use multiple adjacent frames for segmentation of fences in the reference image and are limited to restoring images of static scenes only. In this paper, we propose a de-fencing algorithm for images of dynamic scenes using an occlusion-aware optical flow method. We divide the problem of image de-fencing into the tasks of automated fence segmentation from… ▽ More

    Submitted 21 October, 2016; v1 submitted 25 September, 2016; originally announced September 2016.