Skip to main content

Showing 1–25 of 25 results for author: Abraham, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.22685  [pdf, ps, other

    cs.LG cs.GR

    Mitigating Semantic Collapse in Generative Personalization with a Surprisingly Simple Test-Time Embedding Adjustment

    Authors: Anh Bui, Trang Vu, Trung Le, Junae Kim, Tamas Abraham, Rollin Omari, Amar Kaur, Dinh Phung

    Abstract: In this paper, we investigate the semantic collapsing problem in generative personalization, an under-explored topic where the learned visual concept ($V^*$) gradually shifts from its original textual meaning and comes to dominate other concepts in multi-concept input prompts. This issue not only reduces the semantic richness of complex input prompts like "a photo of $V^*$ wearing glasses and play… ▽ More

    Submitted 27 June, 2025; originally announced June 2025.

  2. arXiv:2504.11543  [pdf, ps, other

    cs.AI

    REAL: Benchmarking Autonomous Agents on Deterministic Simulations of Real Websites

    Authors: Divyansh Garg, Shaun VanWeelden, Diego Caples, Andis Draguns, Nikil Ravi, Pranav Putta, Naman Garg, Tomas Abraham, Michael Lara, Federico Lopez, James Liu, Atharva Gundawar, Prannay Hebbar, Youngchul Joo, Jindong Gu, Charles London, Christian Schroeder de Witt, Sumeet Motwani

    Abstract: We introduce REAL, a benchmark and framework for multi-turn agent evaluations on deterministic simulations of real-world websites. REAL comprises high-fidelity, deterministic replicas of 11 widely-used websites across domains such as e-commerce, travel, communication, and professional networking. We also release a benchmark consisting of 112 practical tasks that mirror everyday complex user intera… ▽ More

    Submitted 17 April, 2025; v1 submitted 15 April, 2025; originally announced April 2025.

    Comments: The websites, framework, and leaderboard are available at https://realevals.xyz and https://github.com/agi-inc/REAL

  3. arXiv:2501.18950  [pdf, other

    cs.LG cs.AI cs.CV

    Fantastic Targets for Concept Erasure in Diffusion Models and Where To Find Them

    Authors: Anh Bui, Trang Vu, Long Vuong, Trung Le, Paul Montague, Tamas Abraham, Junae Kim, Dinh Phung

    Abstract: Concept erasure has emerged as a promising technique for mitigating the risk of harmful content generation in diffusion models by selectively unlearning undesirable concepts. The common principle of previous works to remove a specific concept is to map it to a fixed generic concept, such as a neutral concept or just an empty text prompt. In this paper, we demonstrate that this fixed-target strateg… ▽ More

    Submitted 23 May, 2025; v1 submitted 31 January, 2025; originally announced January 2025.

    Journal ref: International Conference on Learning Representations 2025

  4. arXiv:2410.15618  [pdf, other

    cs.LG cs.CV

    Erasing Undesirable Concepts in Diffusion Models with Adversarial Preservation

    Authors: Anh Bui, Long Vuong, Khanh Doan, Trung Le, Paul Montague, Tamas Abraham, Dinh Phung

    Abstract: Diffusion models excel at generating visually striking content from text but can inadvertently produce undesirable or harmful content when trained on unfiltered internet data. A practical solution is to selectively removing target concepts from the model, but this may impact the remaining concepts. Prior approaches have tried to balance this by introducing a loss term to preserve neutral content o… ▽ More

    Submitted 23 May, 2025; v1 submitted 20 October, 2024; originally announced October 2024.

    Comments: Erasing Concepts, Generative Unlearning, NeurIPS 2024. arXiv admin note: text overlap with arXiv:2403.12326

  5. arXiv:2408.12122  [pdf, other

    cs.CR

    On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World

    Authors: Bao Gia Doan, Dang Quang Nguyen, Callum Lindquist, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: Object detectors are vulnerable to backdoor attacks. In contrast to classifiers, detectors possess unique characteristics, architecturally and in task execution; often operating in challenging conditions, for instance, detecting traffic signs in autonomous cars. But, our knowledge dominates attacks against classifiers and tests in the "digital domain". To address this critical gap, we conducted… ▽ More

    Submitted 30 October, 2024; v1 submitted 22 August, 2024; originally announced August 2024.

    Comments: Accepted to appear at the 40th Annual Computer Security Applications Conference (ACSAC 2024). Code and dataset are available at https://backdoordetectors.github.io/

  6. arXiv:2407.19216  [pdf, other

    cs.CR cs.AI cs.SE

    EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection

    Authors: Shigang Liu, Di Cao, Junae Kim, Tamas Abraham, Paul Montague, Seyit Camtepe, Jun Zhang, Yang Xiang

    Abstract: Recently, deep learning has demonstrated promising results in enhancing the accuracy of vulnerability detection and identifying vulnerabilities in software. However, these techniques are still vulnerable to attacks. Adversarial examples can exploit vulnerabilities within deep neural networks, posing a significant threat to system security. This study showcases the susceptibility of deep learning m… ▽ More

    Submitted 27 July, 2024; originally announced July 2024.

  7. arXiv:2403.18309  [pdf, other

    cs.CR

    Bayesian Learned Models Can Detect Adversarial Malware For Free

    Authors: Bao Gia Doan, Dang Quang Nguyen, Paul Montague, Tamas Abraham, Olivier De Vel, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: The vulnerability of machine learning-based malware detectors to adversarial attacks has prompted the need for robust solutions. Adversarial training is an effective method but is computationally expensive to scale up to large datasets and comes at the cost of sacrificing model performance for robustness. We hypothesize that adversarial malware exploits the low-confidence regions of models and can… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted to the 29th European Symposium on Research in Computer Security (ESORICS) 2024 Conference

  8. arXiv:2403.12326  [pdf, other

    cs.LG cs.CV

    Hiding and Recovering Knowledge in Text-to-Image Diffusion Models via Learnable Prompts

    Authors: Anh Bui, Khanh Doan, Trung Le, Paul Montague, Tamas Abraham, Dinh Phung

    Abstract: Diffusion models have demonstrated remarkable capability in generating high-quality visual content from textual descriptions. However, since these models are trained on large-scale internet data, they inevitably learn undesirable concepts, such as sensitive content, copyrighted material, and harmful or unethical elements. While previous works focus on permanently removing such concepts, this appro… ▽ More

    Submitted 16 February, 2025; v1 submitted 18 March, 2024; originally announced March 2024.

  9. arXiv:2403.11207  [pdf, other

    cs.CV cs.AI q-bio.NC

    MindEye2: Shared-Subject Models Enable fMRI-To-Image With 1 Hour of Data

    Authors: Paul S. Scotti, Mihir Tripathy, Cesar Kadir Torrico Villanueva, Reese Kneeland, Tong Chen, Ashutosh Narang, Charan Santhirasegaran, Jonathan Xu, Thomas Naselaris, Kenneth A. Norman, Tanishq Mathew Abraham

    Abstract: Reconstructions of visual perception from brain activity have improved tremendously, but the practical utility of such methods has been limited. This is because such models are trained independently per subject where each subject requires dozens of hours of expensive fMRI training data to attain high-quality results. The present work showcases high-quality reconstructions using only 1 hour of fMRI… ▽ More

    Submitted 15 June, 2024; v1 submitted 17 March, 2024; originally announced March 2024.

    Comments: In Forty-first International Conference on Machine Learning, 2024. Code at https://github.com/MedARC-AI/MindEyeV2. Published as a conference paper at ICML 2024

  10. arXiv:2401.12208  [pdf, other

    cs.CV cs.CL

    A Vision-Language Foundation Model to Enhance Efficiency of Chest X-ray Interpretation

    Authors: Zhihong Chen, Maya Varma, Justin Xu, Magdalini Paschali, Dave Van Veen, Andrew Johnston, Alaa Youssef, Louis Blankemeier, Christian Bluethgen, Stephan Altmayer, Jeya Maria Jose Valanarasu, Mohamed Siddig Eltayeb Muneer, Eduardo Pontes Reis, Joseph Paul Cohen, Cameron Olsen, Tanishq Mathew Abraham, Emily B. Tsai, Christopher F. Beaulieu, Jenia Jitsev, Sergios Gatidis, Jean-Benoit Delbrouck, Akshay S. Chaudhari, Curtis P. Langlotz

    Abstract: Over 1.4 billion chest X-rays (CXRs) are performed annually due to their cost-effectiveness as an initial diagnostic test. This scale of radiological studies provides a significant opportunity to streamline CXR interpretation and documentation. While foundation models are a promising solution, the lack of publicly available large-scale datasets and benchmarks inhibits their iterative development a… ▽ More

    Submitted 18 December, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

    Comments: 26 pages, 8 figures

  11. arXiv:2401.11605  [pdf, other

    cs.CV cs.AI cs.LG

    Scalable High-Resolution Pixel-Space Image Synthesis with Hourglass Diffusion Transformers

    Authors: Katherine Crowson, Stefan Andreas Baumann, Alex Birch, Tanishq Mathew Abraham, Daniel Z. Kaplan, Enrico Shippole

    Abstract: We present the Hourglass Diffusion Transformer (HDiT), an image generative model that exhibits linear scaling with pixel count, supporting training at high-resolution (e.g. $1024 \times 1024$) directly in pixel-space. Building on the Transformer architecture, which is known to scale to billions of parameters, it bridges the gap between the efficiency of convolutional U-Nets and the scalability of… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

    Comments: 20 pages, 13 figures, project page and code available at https://crowsonkb.github.io/hourglass-diffusion-transformers/

  12. arXiv:2306.00548  [pdf

    eess.IV cs.CV cs.LG physics.med-ph q-bio.QM

    Label- and slide-free tissue histology using 3D epi-mode quantitative phase imaging and virtual H&E staining

    Authors: Tanishq Mathew Abraham, Paloma Casteleiro Costa, Caroline Filan, Zhe Guang, Zhaobin Zhang, Stewart Neill, Jeffrey J. Olson, Richard Levenson, Francisco E. Robles

    Abstract: Histological staining of tissue biopsies, especially hematoxylin and eosin (H&E) staining, serves as the benchmark for disease diagnosis and comprehensive clinical assessment of tissue. However, the process is laborious and time-consuming, often limiting its usage in crucial applications such as surgical margin assessment. To address these challenges, we combine an emerging 3D quantitative phase i… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: 30 pages, 9 main figures, 1 table, 5 supplementary figures

  13. arXiv:2305.18274  [pdf, other

    cs.CV cs.AI q-bio.NC

    Reconstructing the Mind's Eye: fMRI-to-Image with Contrastive Learning and Diffusion Priors

    Authors: Paul S. Scotti, Atmadeep Banerjee, Jimmie Goode, Stepan Shabalin, Alex Nguyen, Ethan Cohen, Aidan J. Dempster, Nathalie Verlinde, Elad Yundler, David Weisberg, Kenneth A. Norman, Tanishq Mathew Abraham

    Abstract: We present MindEye, a novel fMRI-to-image approach to retrieve and reconstruct viewed images from brain activity. Our model comprises two parallel submodules that are specialized for retrieval (using contrastive learning) and reconstruction (using a diffusion prior). MindEye can map fMRI brain activity to any high dimensional multimodal latent space, like CLIP image space, enabling image reconstru… ▽ More

    Submitted 7 October, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

    Comments: Project Page at https://medarc.ai/mindeye. Code at https://github.com/MedARC-AI/fMRI-reconstruction-NSD/. Published as a conference paper at NeurIPS 2023

  14. arXiv:2301.12680  [pdf, other

    cs.CR

    Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

    Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe

    Abstract: We present a new algorithm to train a robust malware detector. Modern malware detectors rely on machine learning algorithms. Now, the adversarial objective is to devise alterations to the malware code to decrease the chance of being detected whilst preserving the functionality and realism of the malware. Adversarial learning is effective in improving robustness but generating functional and realis… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: Accepted to AAAI 2023 conference

  15. arXiv:2211.12737  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    RoentGen: Vision-Language Foundation Model for Chest X-ray Generation

    Authors: Pierre Chambon, Christian Bluethgen, Jean-Benoit Delbrouck, Rogier Van der Sluijs, Małgorzata Połacin, Juan Manuel Zambrano Chaves, Tanishq Mathew Abraham, Shivanshu Purohit, Curtis P. Langlotz, Akshay Chaudhari

    Abstract: Multimodal models trained on large natural image-text pair datasets have exhibited astounding abilities in generating high-quality images. Medical imaging data is fundamentally different to natural images, and the language used to succinctly capture relevant details in medical data uses a different, narrow but semantically rich, domain-specific vocabulary. Not surprisingly, multi-modal models trai… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

    Comments: 19 pages

  16. arXiv:2207.00425  [pdf, other

    cs.CR cs.AI cs.LG

    Transferable Graph Backdoor Attack

    Authors: Shuiqiao Yang, Bao Gia Doan, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Damith C. Ranasinghe, Salil S. Kanhere

    Abstract: Graph Neural Networks (GNNs) have achieved tremendous success in many graph mining tasks benefitting from the message passing strategy that fuses the local structure and node features for better graph representation learning. Despite the success of GNNs, and similar to other types of deep neural networks, GNNs are found to be vulnerable to unnoticeable perturbations on both graph structure and nod… ▽ More

    Submitted 4 July, 2022; v1 submitted 21 June, 2022; originally announced July 2022.

    Comments: Accepted by the 25th International Symposium on Research in Attacks, Intrusions, and Defenses

  17. Identifying Ventricular Arrhythmias and Their Predictors by Applying Machine Learning Methods to Electronic Health Records in Patients With Hypertrophic Cardiomyopathy(HCM-VAr-Risk Model)

    Authors: Moumita Bhattacharya, Dai-Yin Lu, Shibani M Kudchadkar, Gabriela Villarreal Greenland, Prasanth Lingamaneni, Celia P Corona-Villalobos, Yufan Guan, Joseph E Marine, Jeffrey E Olgin, Stefan Zimmerman, Theodore P Abraham, Hagit Shatkay, Maria Roselle Abraham

    Abstract: Clinical risk stratification for sudden cardiac death (SCD) in hypertrophic cardiomyopathy (HC) employs rules derived from American College of Cardiology Foundation/American Heart Association (ACCF/AHA) guidelines or the HCM Risk-SCD model (C-index of 0.69), which utilize a few clinical variables. We assessed whether data-driven machine learning methods that consider a wider range of variables can… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Journal ref: The American Journal of Cardiology, Volume 123, Issue 10, 15 May 2019, Pages 1681-1689

  18. Machine Learning Methods for Identifying Atrial Fibrillation Cases and Their Predictors in Patients With Hypertrophic Cardiomyopathy: The HCM-AF-Risk Model

    Authors: Moumita Bhattacharya, Dai-Yin Lu, Ioannis Ventoulis, Gabriela V. Greenland, Hulya Yalcin, Yufan Guan, Joseph E. Marine, Jeffrey E. Olgin, Stefan L. Zimmerman, Theodore P. Abraham, M. Roselle Abraham, Hagit Shatkay

    Abstract: Hypertrophic cardiomyopathy (HCM) patients have a high incidence of atrial fibrillation (AF) and increased stroke risk, even with low risk of congestive heart failure, hypertension, age, diabetes, previous stroke/transient ischemic attack scores. Hence, there is a need to understand the pathophysiology of AF and stroke in HCM. In this retrospective study, we develop and apply a data-driven, machin… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Journal ref: CJC Open, Volume 3, Issue 6, June 2021, Pages 801-813

  19. arXiv:2010.06131  [pdf, other

    cs.CV cs.CR cs.LG

    Learning to Attack with Fewer Pixels: A Probabilistic Post-hoc Framework for Refining Arbitrary Dense Adversarial Attacks

    Authors: He Zhao, Thanh Nguyen, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung

    Abstract: Deep neural network image classifiers are reported to be susceptible to adversarial evasion attacks, which use carefully crafted images created to mislead a classifier. Many adversarial attacks belong to the category of dense attacks, which generate adversarial examples by perturbing all the pixels of a natural image. To generate sparse perturbations, sparse attacks have been recently developed, w… ▽ More

    Submitted 21 February, 2022; v1 submitted 12 October, 2020; originally announced October 2020.

  20. arXiv:2009.09612  [pdf, other

    cs.CV cs.LG

    Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness

    Authors: Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier deVel, Tamas Abraham, Dinh Phung

    Abstract: Ensemble-based adversarial training is a principled approach to achieve robustness against adversarial attacks. An important technique of this approach is to control the transferability of adversarial examples among ensemble members. We propose in this work a simple yet effective strategy to collaborate among committee models of an ensemble model. This is achieved via the secure and insecure sets… ▽ More

    Submitted 4 February, 2022; v1 submitted 21 September, 2020; originally announced September 2020.

  21. arXiv:2008.08579  [pdf, other

    eess.IV cs.CV cs.LG

    Slide-free MUSE Microscopy to H&E Histology Modality Conversion via Unpaired Image-to-Image Translation GAN Models

    Authors: Tanishq Abraham, Andrew Shaw, Daniel O'Connor, Austin Todd, Richard Levenson

    Abstract: MUSE is a novel slide-free imaging technique for histological examination of tissues that can serve as an alternative to traditional histology. In order to bridge the gap between MUSE and traditional histology, we aim to convert MUSE images to resemble authentic hematoxylin- and eosin-stained (H&E) images. We evaluated four models: a non-machine-learning-based color-mapping unmixing-based tool, Cy… ▽ More

    Submitted 19 August, 2020; originally announced August 2020.

    Comments: 4 pages plus 1 page references. Presented at the ICML Computational Biology Workshop 2020

  22. arXiv:2007.05123  [pdf, other

    cs.LG cs.CV cs.NE stat.ML

    Improving Adversarial Robustness by Enforcing Local and Global Compactness

    Authors: Anh Bui, Trung Le, He Zhao, Paul Montague, Olivier deVel, Tamas Abraham, Dinh Phung

    Abstract: The fact that deep neural networks are susceptible to crafted perturbations severely impacts the use of deep learning in certain domains of application. Among many developed defense models against such attacks, adversarial training emerges as the most successful method that consistently resists a wide range of attacks. In this work, based on an observation from a previous study that the representa… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

    Comments: Proceeding of the European Conference on Computer Vision (ECCV) 2020

  23. arXiv:1910.01329  [pdf, other

    cs.LG cs.CR stat.ML

    Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions

    Authors: He Zhao, Trung Le, Paul Montague, Olivier De Vel, Tamas Abraham, Dinh Phung

    Abstract: Deep neural network image classifiers are reported to be susceptible to adversarial evasion attacks, which use carefully crafted images created to mislead a classifier. Recently, various kinds of adversarial attack methods have been proposed, most of which focus on adding small perturbations to input images. Despite the success of existing approaches, the way to generate realistic adversarial imag… ▽ More

    Submitted 3 October, 2019; originally announced October 2019.

  24. arXiv:1902.09062  [pdf, other

    stat.ML cs.CR cs.LG

    Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence

    Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani

    Abstract: Recent studies have demonstrated that reinforcement learning (RL) agents are susceptible to adversarial manipulation, similar to vulnerabilities previously demonstrated in the supervised learning setting. While most existing work studies the problem in the context of computer vision or console games, this paper focuses on reinforcement learning in autonomous cyber defence under partial observabili… ▽ More

    Submitted 16 August, 2020; v1 submitted 24 February, 2019; originally announced February 2019.

    Comments: 8 pages, 4 figures

  25. arXiv:1808.05770  [pdf, other

    cs.CR cs.AI cs.LG stat.ML

    Reinforcement Learning for Autonomous Defence in Software-Defined Networking

    Authors: Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier De Vel, Sarah Erfani, David Hubczenko, Christopher Leckie, Paul Montague

    Abstract: Despite the successful application of machine learning (ML) in a wide range of domains, adaptability---the very property that makes machine learning desirable---can be exploited by adversaries to contaminate training and evade classification. In this paper, we investigate the feasibility of applying a specific class of machine learning algorithms, namely, reinforcement learning (RL) algorithms, fo… ▽ More

    Submitted 17 August, 2018; originally announced August 2018.

    Comments: 20 pages, 8 figures