Skip to main content

Showing 1–9 of 9 results for author: Harikumar, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.06048  [pdf, ps, other

    cs.LG cs.AI cs.CV

    TRUST: Test-time Resource Utilization for Superior Trustworthiness

    Authors: Haripriya Harikumar, Santu Rana

    Abstract: Standard uncertainty estimation techniques, such as dropout, often struggle to clearly distinguish reliable predictions from unreliable ones. We attribute this limitation to noisy classifier weights, which, while not impairing overall class-level predictions, render finer-level statistics less informative. To address this, we propose a novel test-time optimization method that accounts for the impa… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

  2. arXiv:2503.13623  [pdf, other

    cs.LG cs.CV

    A Convex formulation for linear discriminant analysis

    Authors: Sai Vijay Kumar Surineela, Prathyusha Kanakamalla, Harigovind Harikumar, Tomojit Ghosh

    Abstract: We present a supervised dimensionality reduction technique called Convex Linear Discriminant Analysis (ConvexLDA). The proposed model optimizes a multi-objective cost function by balancing two complementary terms. The first term pulls the samples of a class towards its centroid by minimizing a sample's distance from its class-centroid in low dimensional space. The second term pushes the classes fa… ▽ More

    Submitted 17 March, 2025; originally announced March 2025.

    Comments: Total pages 29 including references, six figures, seven tables. Submitted to an Elsevier journal

  3. arXiv:2406.13411  [pdf, other

    cs.CV cs.LG

    Composite Concept Extraction through Backdooring

    Authors: Banibrata Ghosh, Haripriya Harikumar, Khoa D Doan, Svetha Venkatesh, Santu Rana

    Abstract: Learning composite concepts, such as \textquotedbl red car\textquotedbl , from individual examples -- like a white car representing the concept of \textquotedbl car\textquotedbl{} and a red strawberry representing the concept of \textquotedbl red\textquotedbl -- is inherently challenging. This paper introduces a novel method called Composite Concept Extractor (CoCE), which leverages techniques fro… ▽ More

    Submitted 21 June, 2024; v1 submitted 19 June, 2024; originally announced June 2024.

  4. arXiv:2402.03577  [pdf, other

    cs.LG

    Revisiting the Dataset Bias Problem from a Statistical Perspective

    Authors: Kien Do, Dung Nguyen, Hung Le, Thao Le, Dang Nguyen, Haripriya Harikumar, Truyen Tran, Santu Rana, Svetha Venkatesh

    Abstract: In this paper, we study the "dataset bias" problem from a statistical standpoint, and identify the main cause of the problem as the strong correlation between a class attribute u and a non-class attribute b in the input x, represented by p(u|b) differing significantly from p(u). Since p(u|b) appears as part of the sampling distributions in the standard maximum log-likelihood (MLL) objective, a mod… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  5. arXiv:2209.10359  [pdf, other

    cs.CV cs.AI

    Momentum Adversarial Distillation: Handling Large Distribution Shifts in Data-Free Knowledge Distillation

    Authors: Kien Do, Hung Le, Dung Nguyen, Dang Nguyen, Haripriya Harikumar, Truyen Tran, Santu Rana, Svetha Venkatesh

    Abstract: Data-free Knowledge Distillation (DFKD) has attracted attention recently thanks to its appealing capability of transferring knowledge from a teacher network to a student network without using training data. The main idea is to use a generator to synthesize data for training the student. As the generator gets updated, the distribution of synthetic data will change. Such distribution shift could be… ▽ More

    Submitted 21 September, 2022; originally announced September 2022.

    Comments: Accepted to NeurIPS 2022

  6. arXiv:2207.03895  [pdf, other

    cs.CV

    Defense Against Multi-target Trojan Attacks

    Authors: Haripriya Harikumar, Santu Rana, Kien Do, Sunil Gupta, Wei Zong, Willy Susilo, Svetha Venkastesh

    Abstract: Adversarial attacks on deep learning-based models pose a significant threat to the current AI infrastructure. Among them, Trojan attacks are the hardest to defend against. In this paper, we first introduce a variation of the Badnet kind of attacks that introduces Trojan backdoors to multiple target classes and allows triggers to be placed anywhere in the image. The former makes it more potent and… ▽ More

    Submitted 8 July, 2022; originally announced July 2022.

  7. arXiv:2202.12154  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    Towards Effective and Robust Neural Trojan Defenses via Input Filtering

    Authors: Kien Do, Haripriya Harikumar, Hung Le, Dung Nguyen, Truyen Tran, Santu Rana, Dang Nguyen, Willy Susilo, Svetha Venkatesh

    Abstract: Trojan attacks on deep neural networks are both dangerous and surreptitious. Over the past few years, Trojan attacks have advanced from using only a single input-agnostic trigger and targeting only one class to using multiple, input-specific triggers and targeting multiple classes. However, Trojan defenses have not caught up with this development. Most defense methods still make inadequate assumpt… ▽ More

    Submitted 14 February, 2023; v1 submitted 24 February, 2022; originally announced February 2022.

    Comments: Accepted to ECCV 2022

  8. arXiv:2110.13414  [pdf, ps, other

    cs.CV cs.CR

    Semantic Host-free Trojan Attack

    Authors: Haripriya Harikumar, Kien Do, Santu Rana, Sunil Gupta, Svetha Venkatesh

    Abstract: In this paper, we propose a novel host-free Trojan attack with triggers that are fixed in the semantic space but not necessarily in the pixel space. In contrast to existing Trojan attacks which use clean input images as hosts to carry small, meaningless trigger patterns, our attack considers triggers as full-sized images belonging to a semantically meaningful object class. Since in our attack, the… ▽ More

    Submitted 26 October, 2021; originally announced October 2021.

  9. arXiv:2006.05646  [pdf, ps, other

    cs.CV

    Scalable Backdoor Detection in Neural Networks

    Authors: Haripriya Harikumar, Vuong Le, Santu Rana, Sourangshu Bhattacharya, Sunil Gupta, Svetha Venkatesh

    Abstract: Recently, it has been shown that deep learning models are vulnerable to Trojan attacks, where an attacker can install a backdoor during training time to make the resultant model misidentify samples contaminated with a small trigger patch. Current backdoor detection methods fail to achieve good detection performance and are computationally expensive. In this paper, we propose a novel trigger revers… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.