Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Souri, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.16365  [pdf, other

    cs.LG cs.CR cs.CV

    Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion

    Authors: Hossein Souri, Arpit Bansal, Hamid Kazemi, Liam Fowl, Aniruddha Saha, Jonas Geiping, Andrew Gordon Wilson, Rama Chellappa, Tom Goldstein, Micah Goldblum

    Abstract: Modern neural networks are often trained on massive datasets that are web scraped with minimal human inspection. As a result of this insecure curation pipeline, an adversary can poison or backdoor the resulting model by uploading malicious data to the internet and waiting for a victim to scrape and train on it. Existing approaches for creating poisons and backdoors start with randomly sampled clea… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  2. arXiv:2310.19909  [pdf, other

    cs.CV cs.LG

    Battle of the Backbones: A Large-Scale Comparison of Pretrained Models across Computer Vision Tasks

    Authors: Micah Goldblum, Hossein Souri, Renkun Ni, Manli Shu, Viraj Prabhu, Gowthami Somepalli, Prithvijit Chattopadhyay, Mark Ibrahim, Adrien Bardes, Judy Hoffman, Rama Chellappa, Andrew Gordon Wilson, Tom Goldstein

    Abstract: Neural network based computer vision systems are typically built on a backbone, a pretrained or randomly initialized feature extractor. Several years ago, the default option was an ImageNet-trained convolutional neural network. However, the recent past has seen the emergence of countless backbones pretrained using various algorithms and datasets. While this abundance of choice has led to performan… ▽ More

    Submitted 19 November, 2023; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: Accepted to NeurIPS 2023

  3. arXiv:2210.09305  [pdf, other

    cs.LG cs.CR

    Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning

    Authors: Yuxin Wen, Jonas Geiping, Liam Fowl, Hossein Souri, Rama Chellappa, Micah Goldblum, Tom Goldstein

    Abstract: Federated learning is particularly susceptible to model poisoning and backdoor attacks because individual users have direct control over the training data and model updates. At the same time, the attack power of an individual user is limited because their updates are quickly drowned out by those of many other users. Existing attacks do not account for future behaviors of other users, and thus requ… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: Code is available at \url{https://github.com/YuxinWenRick/thinking-two-moves-ahead}

  4. arXiv:2205.10279  [pdf, other

    cs.LG cs.CV

    Pre-Train Your Loss: Easy Bayesian Transfer Learning with Informative Priors

    Authors: Ravid Shwartz-Ziv, Micah Goldblum, Hossein Souri, Sanyam Kapoor, Chen Zhu, Yann LeCun, Andrew Gordon Wilson

    Abstract: Deep learning is increasingly moving towards a transfer learning paradigm whereby large foundation models are fine-tuned on downstream tasks, starting from an initialization learned on the source task. But an initialization contains relatively little information about the source task. Instead, we show that we can learn highly informative posteriors from the source task, through supervised or self-… ▽ More

    Submitted 20 May, 2022; originally announced May 2022.

    Comments: Code available at https://github.com/hsouri/BayesianTransferLearning

  5. arXiv:2203.08235  [pdf, other

    cs.CV cs.LG

    A Deep Dive into Dataset Imbalance and Bias in Face Identification

    Authors: Valeriia Cherepanova, Steven Reich, Samuel Dooley, Hossein Souri, Micah Goldblum, Tom Goldstein

    Abstract: As the deployment of automated face recognition (FR) systems proliferates, bias in these systems is not just an academic question, but a matter of public concern. Media portrayals often center imbalance as the main source of bias, i.e., that FR models perform worse on images of non-white people or women because these demographic groups are underrepresented in training data. Recent academic researc… ▽ More

    Submitted 15 March, 2022; originally announced March 2022.

  6. Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses

    Authors: Chun Pong Lau, Jiang Liu, Hossein Souri, Wei-An Lin, Soheil Feizi, Rama Chellappa

    Abstract: Adversarial training (AT) is considered to be one of the most reliable defenses against adversarial attacks. However, models trained with AT sacrifice standard accuracy and do not generalize well to novel attacks. Recent works show generalization improvement with adversarial samples under novel threat models such as on-manifold threat model or neural perceptual threat model. However, the former re… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

    Comments: Under submission

  7. Mutual Adversarial Training: Learning together is better than going alone

    Authors: Jiang Liu, Chun Pong Lau, Hossein Souri, Soheil Feizi, Rama Chellappa

    Abstract: Recent studies have shown that robustness to adversarial attacks can be transferred across networks. In other words, we can make a weak model more robust with the help of a strong teacher model. We ask if instead of learning from a static teacher, can models "learn together" and "teach each other" to achieve better robustness? In this paper, we study how interactions among models affect robustness… ▽ More

    Submitted 9 December, 2021; originally announced December 2021.

    Comments: Under submission

  8. arXiv:2110.06802  [pdf, other

    cs.LG cs.CR cs.CV

    Identification of Attack-Specific Signatures in Adversarial Examples

    Authors: Hossein Souri, Pirazh Khorramshahi, Chun Pong Lau, Micah Goldblum, Rama Chellappa

    Abstract: The adversarial attack literature contains a myriad of algorithms for crafting perturbations which yield pathological behavior in neural networks. In many cases, multiple algorithms target the same tasks and even enforce the same constraints. In this work, we show that different attack algorithms produce adversarial examples which are distinct not only in their effectiveness but also in how they q… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  9. arXiv:2106.08970  [pdf, other

    cs.LG cs.CR cs.CV

    Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

    Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein

    Abstract: As the curation of data for machine learning becomes increasingly automated, dataset tampering is a mounting threat. Backdoor attackers tamper with training data to embed a vulnerability in models that are trained on that data. This vulnerability is then activated at inference time by placing a "trigger" into the model's input. Typical backdoor attacks insert the trigger directly into the training… ▽ More

    Submitted 13 October, 2022; v1 submitted 16 June, 2021; originally announced June 2021.

    Comments: NeurIPS 2022

  10. arXiv:2009.11921  [pdf, other

    cs.LG cs.IT eess.SP stat.ML

    GANs with Variational Entropy Regularizers: Applications in Mitigating the Mode-Collapse Issue

    Authors: Pirazh Khorramshahi, Hossein Souri, Rama Chellappa, Soheil Feizi

    Abstract: Building on the success of deep learning, Generative Adversarial Networks (GANs) provide a modern approach to learn a probability distribution from observed samples. GANs are often formulated as a zero-sum game between two sets of functions; the generator and the discriminator. Although GANs have shown great potentials in learning complex distributions such as images, they often suffer from the mo… ▽ More

    Submitted 24 September, 2020; originally announced September 2020.

  11. arXiv:2006.07845  [pdf, other

    cs.CV

    Towards Gender-Neutral Face Descriptors for Mitigating Bias in Face Recognition

    Authors: Prithviraj Dhar, Joshua Gleason, Hossein Souri, Carlos D. Castillo, Rama Chellappa

    Abstract: State-of-the-art deep networks implicitly encode gender information while being trained for face recognition. Gender is often viewed as an important attribute with respect to identifying faces. However, the implicit encoding of gender information in face descriptors has two major issues: (a.) It makes the descriptors susceptible to privacy leakage, i.e. a malicious agent can be trained to predict… ▽ More

    Submitted 17 September, 2020; v1 submitted 14 June, 2020; originally announced June 2020.

    Comments: Under submission

  12. ATFaceGAN: Single Face Image Restoration and Recognition from Atmospheric Turbulence

    Authors: Chun Pong Lau, Hossein Souri, Rama Chellappa

    Abstract: Image degradation due to atmospheric turbulence is common while capturing images at long ranges. To mitigate the degradation due to turbulence which includes deformation and blur, we propose a generative single frame restoration algorithm which disentangles the blur and deformation due to turbulence and reconstructs a restored image. The disentanglement is achieved by decomposing the distortion du… ▽ More

    Submitted 8 May, 2020; v1 submitted 7 October, 2019; originally announced October 2019.

    Comments: 8 pages, 7 figures