Skip to main content

Showing 1–8 of 8 results for author: Diochnos, D I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.07221  [pdf, other

    cs.CV cs.LG

    A Review of Pseudo-Labeling for Computer Vision

    Authors: Patrick Kage, Jay C. Rothenberger, Pavlos Andreadis, Dimitrios I. Diochnos

    Abstract: Deep neural models have achieved state of the art performance on a wide range of problems in computer science, especially in computer vision. However, deep neural networks often require large datasets of labeled samples to generalize effectively, and an important area of active research is semi-supervised learning, which attempts to instead utilize large quantities of (easily acquired) unlabeled s… ▽ More

    Submitted 23 May, 2025; v1 submitted 13 August, 2024; originally announced August 2024.

    Comments: 40 pages, 4 figures, 2 tables

    ACM Class: I.2.0; I.5.4; I.4.0

  2. arXiv:2311.18083  [pdf, other

    cs.CV cs.LG

    Meta Co-Training: Two Views are Better than One

    Authors: Jay C. Rothenberger, Dimitrios I. Diochnos

    Abstract: In many critical computer vision scenarios unlabeled data is plentiful, but labels are scarce and difficult to obtain. As a result, semi-supervised learning which leverages unlabeled data to boost the performance of supervised classifiers have received significant attention in recent literature. One representative class of semi-supervised algorithms are co-training algorithms. Co-training algorith… ▽ More

    Submitted 27 May, 2025; v1 submitted 29 November, 2023; originally announced November 2023.

    Comments: 16 pages, 16 figures, 11 tables, for implementation see https://github.com/JayRothenberger/Meta-Co-Training

    ACM Class: I.2.6; I.4.10

  3. arXiv:1906.05815  [pdf, ps, other

    cs.LG cs.CC cs.CR stat.ML

    Lower Bounds for Adversarially Robust PAC Learning

    Authors: Dimitrios I. Diochnos, Saeed Mahloujifar, Mohammad Mahmoody

    Abstract: In this work, we initiate a formal study of probably approximately correct (PAC) learning under evasion attacks, where the adversary's goal is to \emph{misclassify} the adversarially perturbed sample point $\widetilde{x}$, i.e., $h(\widetilde{x})\neq c(\widetilde{x})$, where $c$ is the ground truth concept and $h$ is the learned hypothesis. Previous work on PAC learning of adversarial examples hav… ▽ More

    Submitted 13 June, 2019; originally announced June 2019.

  4. arXiv:1810.12272  [pdf, ps, other

    cs.LG cs.CC cs.CR stat.ML

    Adversarial Risk and Robustness: General Definitions and Implications for the Uniform Distribution

    Authors: Dimitrios I. Diochnos, Saeed Mahloujifar, Mohammad Mahmoody

    Abstract: We study adversarial perturbations when the instances are uniformly distributed over $\{0,1\}^n$. We study both "inherent" bounds that apply to any problem and any classifier for such a problem as well as bounds that apply to specific problems and specific hypothesis classes. As the current literature contains multiple definitions of adversarial risk and robustness, we start by giving a taxonomy… ▽ More

    Submitted 29 October, 2018; originally announced October 2018.

    Comments: Full version of a work with the same title that will appear in NIPS 2018, 31 pages containing 5 figures, 1 table, 2 algorithms

  5. arXiv:1809.03063  [pdf, ps, other

    cs.LG cs.CC cs.CR stat.ML

    The Curse of Concentration in Robust Learning: Evasion and Poisoning Attacks from Concentration of Measure

    Authors: Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody

    Abstract: Many modern machine learning classifiers are shown to be vulnerable to adversarial perturbations of the instances. Despite a massive amount of work focusing on making classifiers robust, the task seems quite challenging. In this work, through a theoretical study, we investigate the adversarial risk and robustness of classifiers and draw a connection to the well-known phenomenon of concentration of… ▽ More

    Submitted 5 November, 2018; v1 submitted 9 September, 2018; originally announced September 2018.

  6. arXiv:1711.03707  [pdf, ps, other

    cs.LG cs.CR

    Learning under $p$-Tampering Attacks

    Authors: Saeed Mahloujifar, Dimitrios I. Diochnos, Mohammad Mahmoody

    Abstract: Recently, Mahloujifar and Mahmoody (TCC'17) studied attacks against learning algorithms using a special case of Valiant's malicious noise, called $p$-tampering, in which the adversary gets to change any training example with independent probability $p$ but is limited to only choose malicious examples with correct labels. They obtained $p$-tampering attacks that increase the error probability in th… ▽ More

    Submitted 27 November, 2018; v1 submitted 10 November, 2017; originally announced November 2017.

  7. arXiv:1304.5863  [pdf, ps, other

    cs.AI cs.SI

    Commonsense Reasoning and Large Network Analysis: A Computational Study of ConceptNet 4

    Authors: Dimitrios I. Diochnos

    Abstract: In this report a computational study of ConceptNet 4 is performed using tools from the field of network analysis. Part I describes the process of extracting the data from the SQL database that is available online, as well as how the closure of the input among the assertions in the English language is computed. This part also performs a validation of the input as well as checks for the consistency… ▽ More

    Submitted 23 June, 2013; v1 submitted 22 April, 2013; originally announced April 2013.

    Comments: 152 pages, 99 tables, 23 figures (76 sub-figures)

  8. arXiv:1203.1017  [pdf, ps, other

    cs.SC cs.DS cs.MS math.AG math.NA

    On the asymptotic and practical complexity of solving bivariate systems over the reals

    Authors: Dimitrios I. Diochnos, Ioannis Z. Emiris, Elias P. Tsigaridas

    Abstract: This paper is concerned with exact real solving of well-constrained, bivariate polynomial systems. The main problem is to isolate all common real roots in rational rectangles, and to determine their intersection multiplicities. We present three algorithms and analyze their asymptotic bit complexity, obtaining a bound of $\sOB(N^{14})$ for the purely projection-based method, and $\sOB(N^{12})$ for… ▽ More

    Submitted 5 March, 2012; originally announced March 2012.

    Comments: 17 pages, 4 algorithms, 1 table, and 1 figure with 2 sub-figures

    Journal ref: J. Symb. Comput. 44(7): 818-835 (2009)