Skip to main content

Showing 1–11 of 11 results for author: Noack, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.12576  [pdf, other

    cs.DC cs.AI

    Harnessing Deep Learning and HPC Kernels via High-Level Loop and Tensor Abstractions on CPU Architectures

    Authors: Evangelos Georganas, Dhiraj Kalamkar, Kirill Voronin, Abhisek Kundu, Antonio Noack, Hans Pabst, Alexander Breuer, Alexander Heinecke

    Abstract: During the past decade, Deep Learning (DL) algorithms, programming systems and hardware have converged with the High Performance Computing (HPC) counterparts. Nevertheless, the programming methodology of DL and HPC systems is stagnant, relying on highly-optimized, yet platform-specific and inflexible vendor-optimized libraries. Such libraries provide close-to-peak performance on specific platforms… ▽ More

    Submitted 15 March, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

  2. arXiv:2210.12233  [pdf, other

    cs.LG

    TCAB: A Large-Scale Text Classification Attack Benchmark

    Authors: Kalyani Asthana, Zhouhang Xie, Wencong You, Adam Noack, Jonathan Brophy, Sameer Singh, Daniel Lowd

    Abstract: We introduce the Text Classification Attack Benchmark (TCAB), a dataset for analyzing, understanding, detecting, and labeling adversarial attacks against text classifiers. TCAB includes 1.5 million attack instances, generated by twelve adversarial attacks targeting three classifiers trained on six source datasets for sentiment analysis and abuse detection in English. Unlike standard text classific… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 32 pages, 7 figures, and 14 tables

  3. arXiv:2201.08555  [pdf, other

    cs.CL cs.CR cs.LG

    Identifying Adversarial Attacks on Text Classifiers

    Authors: Zhouhang Xie, Jonathan Brophy, Adam Noack, Wencong You, Kalyani Asthana, Carter Perkins, Sabrina Reis, Sameer Singh, Daniel Lowd

    Abstract: The landscape of adversarial attacks against text classifiers continues to grow, with new attacks developed every year and many of them available in standard toolkits, such as TextAttack and OpenAttack. In response, there is a growing body of work on robust learning, which reduces vulnerability to these attacks, though sometimes at a high cost in compute time or accuracy. In this paper, we take an… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  4. arXiv:1912.03430  [pdf, other

    cs.LG stat.ML

    An Empirical Study on the Relation between Network Interpretability and Adversarial Robustness

    Authors: Adam Noack, Isaac Ahern, Dejing Dou, Boyang Li

    Abstract: Deep neural networks (DNNs) have had many successes, but they suffer from two major issues: (1) a vulnerability to adversarial examples and (2) a tendency to elude human interpretation. Interestingly, recent empirical and theoretical evidence suggests these two seemingly disparate issues are actually connected. In particular, robust models tend to provide more interpretable gradients than non-robu… ▽ More

    Submitted 3 December, 2020; v1 submitted 6 December, 2019; originally announced December 2019.

    Comments: Accepted by the journal Springer Nature Computer Science

  5. arXiv:1909.04200  [pdf, other

    cs.LG stat.ML

    NormLime: A New Feature Importance Metric for Explaining Deep Neural Networks

    Authors: Isaac Ahern, Adam Noack, Luis Guzman-Nateras, Dejing Dou, Boyang Li, Jun Huan

    Abstract: The problem of explaining deep learning models, and model predictions generally, has attracted intensive interest recently. Many successful approaches forgo global approximations in order to provide more faithful local interpretations of the model's behavior. LIME develops multiple interpretable models, each approximating a large neural network on a small region of the data manifold and SP-LIME ag… ▽ More

    Submitted 15 October, 2019; v1 submitted 9 September, 2019; originally announced September 2019.

  6. arXiv:1808.03374  [pdf, other

    math.NA cs.CE q-bio.GN stat.AP

    Fast computation of the principal components of genotype matrices in Julia

    Authors: Jiahao Chen, Andreas Noack, Alan Edelman

    Abstract: Finding the largest few principal components of a matrix of genetic data is a common task in genome-wide association studies (GWASs), both for dimensionality reduction and for identifying unwanted factors of variation. We describe a simple random matrix model for matrices that arise in GWASs, showing that the singular values have a bulk behavior that obeys a Marchenko-Pastur distributed with a han… ▽ More

    Submitted 9 August, 2018; originally announced August 2018.

    Comments: 15 pages, 6 figures, 3 tables, repository at https://github.com/jiahao/paper-copper-2016

    MSC Class: 15A18 ACM Class: G.1.3

  7. arXiv:1801.10277  [pdf, other

    cs.DC astro-ph.IM

    Cataloging the Visible Universe through Bayesian Inference at Petascale

    Authors: Jeffrey Regier, Kiran Pamnany, Keno Fischer, Andreas Noack, Maximilian Lam, Jarrett Revels, Steve Howard, Ryan Giordano, David Schlegel, Jon McAuliffe, Rollin Thomas, Prabhat

    Abstract: Astronomical catalogs derived from wide-field imaging surveys are an important tool for understanding the Universe. We construct an astronomical catalog from 55 TB of imaging data using Celeste, a Bayesian variational inference code written entirely in the high-productivity programming language Julia. Using over 1.3 million threads on 650,000 Intel Xeon Phi cores of the Cori Phase II supercomputer… ▽ More

    Submitted 30 January, 2018; originally announced January 2018.

    Comments: accepted to IPDPS 2018

    MSC Class: 85A35; 68W10; 62P35 ACM Class: J.2; D.1.3; G.3; I.2; D.2

  8. Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking

    Authors: Emmanouil Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan

    Abstract: Nowadays, mobile users have a vast number of applications and services at their disposal. Each of these might impose some privacy threats on users' "Personally Identifiable Information" (PII). Location privacy is a crucial part of PII, and as such, privacy-aware users wish to maximize it. This privacy can be, for instance, threatened by a company, which collects users' traces and shares them with… ▽ More

    Submitted 2 January, 2016; originally announced January 2016.

    Comments: 8 pages, 7 figures, In Proceedings of 2015 IEEE Trustcom/BigDataSE/ISPA

  9. arXiv:0812.4073  [pdf, other

    cs.DS cond-mat.stat-mech cs.DM physics.soc-ph

    Multi-level algorithms for modularity clustering

    Authors: Andreas Noack, Randolf Rotta

    Abstract: Modularity is one of the most widely used quality measures for graph clusterings. Maximizing modularity is NP-hard, and the runtime of exact algorithms is prohibitive for large graphs. A simple and effective class of heuristics coarsens the graph by iteratively merging clusters (starting from singletons), and optionally refines the resulting clustering by iteratively moving individual vertices b… ▽ More

    Submitted 29 December, 2008; v1 submitted 22 December, 2008; originally announced December 2008.

    Comments: 12 pages, 10 figures, see http://www.informatik.tu-cottbus.de/~rrotta/ for downloading the graph clustering software

    ACM Class: G.2.2; G.2.3; I.5.3

    Journal ref: Proceedings of the 8th International Symposium on Experimental Algorithms (SEA 2009). Lecture Notes in Computer Science 5526, Springer (2009) 257-268

  10. arXiv:0807.4052  [pdf, ps, other

    cs.DM cs.CG physics.soc-ph

    Modularity clustering is force-directed layout

    Authors: Andreas Noack

    Abstract: Two natural and widely used representations for the community structure of networks are clusterings, which partition the vertex set into disjoint subsets, and layouts, which assign the vertices to positions in a metric space. This paper unifies prominent characterizations of layout quality and clustering quality, by showing that energy models of pairwise attraction and repulsion subsume Newman a… ▽ More

    Submitted 9 December, 2008; v1 submitted 25 July, 2008; originally announced July 2008.

    Comments: 9 pages, 7 figures, see http://code.google.com/p/linloglayout/ for downloading the graph clustering and layout software

    ACM Class: G.2.2; G.2.3; I.5.3

    Journal ref: Phys. Rev. E 79, 026102 (2009)

  11. arXiv:cs/0409009  [pdf, ps, other

    cs.PL cs.DM cs.DS cs.SE

    CrocoPat 2.1 Introduction and Reference Manual

    Authors: Dirk Beyer, Andreas Noack

    Abstract: CrocoPat is an efficient, powerful and easy-to-use tool for manipulating relations of arbitrary arity, including directed graphs. This manual provides an introduction to and a reference for CrocoPat and its programming language RML. It includes several application examples, in particular from the analysis of structural models of software systems.

    Submitted 7 September, 2004; originally announced September 2004.

    Comments: 19 pages + cover, 2 eps figures, uses llncs.cls and cs_techrpt_cover.sty, for downloading the source code, binaries, and RML examples, see http://www.software-systemtechnik.de/CrocoPat/

    Report number: UCB//CSD-04-1338 ACM Class: D.1.6; G.2.2.a; E.1.d; D.2.7m