Skip to main content

Showing 1–36 of 36 results for author: Schwinn, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.16527  [pdf, ps, other

    cs.LG

    Joint Relational Database Generation via Graph-Conditional Diffusion Models

    Authors: Mohamed Amine Ketata, David Lüdke, Leo Schwinn, Stephan Günnemann

    Abstract: Building generative models for relational databases (RDBs) is important for applications like privacy-preserving data release and augmenting real datasets. However, most prior work either focuses on single-table generation or relies on autoregressive factorizations that impose a fixed table order and generate tables sequentially. This approach limits parallelism, restricts flexibility in downstrea… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  2. arXiv:2505.14411  [pdf, other

    cs.LG

    Byte Pair Encoding for Efficient Time Series Forecasting

    Authors: Leon Götz, Marcel Kollovieh, Stephan Günnemann, Leo Schwinn

    Abstract: Existing time series tokenization methods predominantly encode a constant number of samples into individual tokens. This inflexible approach can generate excessive tokens for even simple patterns like extended constant values, resulting in substantial computational overhead. Inspired by the success of byte pair encoding, we propose the first pattern-centric tokenization scheme for time series anal… ▽ More

    Submitted 20 May, 2025; originally announced May 2025.

    Comments: 24 pages in total, 17 figures

  3. arXiv:2504.01739  [pdf, other

    cs.CV

    Understanding Cross-Model Perceptual Invariances Through Ensemble Metamers

    Authors: Lukas Boehm, Jonas Leo Mueller, Christoffer Loeffler, Leo Schwinn, Bjoern Eskofier, Dario Zanca

    Abstract: Understanding the perceptual invariances of artificial neural networks is essential for improving explainability and aligning models with human vision. Metamers - stimuli that are physically distinct yet produce identical neural activations - serve as a valuable tool for investigating these invariances. We introduce a novel approach to metamer generation by leveraging ensembles of artificial neura… ▽ More

    Submitted 4 April, 2025; v1 submitted 2 April, 2025; originally announced April 2025.

  4. arXiv:2503.02574  [pdf, other

    cs.CR cs.AI

    LLM-Safety Evaluations Lack Robustness

    Authors: Tim Beyer, Sophie Xhonneux, Simon Geisler, Gauthier Gidel, Leo Schwinn, Stephan Günnemann

    Abstract: In this paper, we argue that current safety alignment research efforts for large language models are hindered by many intertwined sources of noise, such as small datasets, methodological inconsistencies, and unreliable evaluation setups. This can, at times, make it impossible to evaluate and compare attacks and defenses fairly, thereby slowing progress. We systematically analyze the LLM safety eva… ▽ More

    Submitted 4 March, 2025; originally announced March 2025.

  5. arXiv:2503.02491  [pdf, other

    cs.CV cs.LG

    Joint Out-of-Distribution Filtering and Data Discovery Active Learning

    Authors: Sebastian Schmidt, Leonard Schenk, Leo Schwinn, Stephan Günnemann

    Abstract: As the data demand for deep learning models increases, active learning (AL) becomes essential to strategically select samples for labeling, which maximizes data efficiency and reduces training costs. Real-world scenarios necessitate the consideration of incomplete data knowledge within AL. Prior works address handling out-of-distribution (OOD) data, while another research direction has focused on… ▽ More

    Submitted 4 March, 2025; originally announced March 2025.

  6. arXiv:2502.16366  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    A generative approach to LLM harmfulness detection with special red flag tokens

    Authors: Sophie Xhonneux, David Dobre, Mehrnaz Mofakhami, Leo Schwinn, Gauthier Gidel

    Abstract: Most safety training methods for large language models (LLMs) based on fine-tuning rely on dramatically changing the output distribution of the model when faced with a harmful request, shifting it from an unsafe answer to a refusal to respond. These methods inherently compromise model capabilities and might make auto-regressive models vulnerable to attacks that make likely an initial token of affi… ▽ More

    Submitted 5 March, 2025; v1 submitted 22 February, 2025; originally announced February 2025.

    Comments: 13 pages, 6 figures

  7. arXiv:2502.11910  [pdf, other

    cs.LG

    Adversarial Alignment for LLMs Requires Simpler, Reproducible, and More Measurable Objectives

    Authors: Leo Schwinn, Yan Scholten, Tom Wollschläger, Sophie Xhonneux, Stephen Casper, Stephan Günnemann, Gauthier Gidel

    Abstract: Misaligned research objectives have considerably hindered progress in adversarial robustness research over the past decade. For instance, an extensive focus on optimizing target metrics, while neglecting rigorous standardized evaluation, has led researchers to pursue ad-hoc heuristic defenses that were seemingly effective. Yet, most of these were exposed as flawed by subsequent evaluations, ultima… ▽ More

    Submitted 21 February, 2025; v1 submitted 17 February, 2025; originally announced February 2025.

  8. arXiv:2502.10487  [pdf, other

    cs.CR cs.AI

    Fast Proxies for LLM Robustness Evaluation

    Authors: Tim Beyer, Jan Schuchardt, Leo Schwinn, Stephan Günnemann

    Abstract: Evaluating the robustness of LLMs to adversarial attacks is crucial for safe deployment, yet current red-teaming methods are often prohibitively expensive. We compare the ability of fast proxy metrics to predict the real-world robustness of an LLM against a simulated attacker ensemble. This allows us to estimate a model's robustness to computationally expensive attacks without requiring runs of th… ▽ More

    Submitted 14 February, 2025; originally announced February 2025.

  9. arXiv:2411.02631  [pdf, other

    cs.CL cs.AI cs.LG

    Extracting Unlearned Information from LLMs with Activation Steering

    Authors: Atakan Seyitoğlu, Aleksei Kuvshinov, Leo Schwinn, Stephan Günnemann

    Abstract: An unintended consequence of the vast pretraining of Large Language Models (LLMs) is the verbatim memorization of fragments of their training data, which may contain sensitive or copyrighted information. In recent years, unlearning has emerged as a solution to effectively remove sensitive knowledge from models after training. Yet, recent work has shown that supposedly deleted information can still… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

    Comments: Accepted at NeurIPS 2024 Workshop Safe Generative AI

  10. arXiv:2410.03523  [pdf, other

    cs.LG cs.AI

    A Probabilistic Perspective on Unlearning and Alignment for Large Language Models

    Authors: Yan Scholten, Stephan Günnemann, Leo Schwinn

    Abstract: Comprehensive evaluation of Large Language Models (LLMs) is an open research problem. Existing evaluations rely on deterministic point estimates generated via greedy decoding. However, we find that deterministic evaluations fail to capture the whole output distribution of a model, yielding inaccurate estimations of model capabilities. This is particularly problematic in critical contexts such as u… ▽ More

    Submitted 1 March, 2025; v1 submitted 4 October, 2024; originally announced October 2024.

    Comments: Accepted at ICLR 2025 (Oral)

  11. arXiv:2410.03024  [pdf, other

    cs.LG cs.AI stat.ML

    Flow Matching with Gaussian Process Priors for Probabilistic Time Series Forecasting

    Authors: Marcel Kollovieh, Marten Lienen, David Lüdke, Leo Schwinn, Stephan Günnemann

    Abstract: Recent advancements in generative modeling, particularly diffusion models, have opened new directions for time series modeling, achieving state-of-the-art performance in forecasting and synthesis. However, the reliance of diffusion-based models on a simple, fixed prior complicates the generative process since the data and prior distributions differ significantly. We introduce TSFlow, a conditional… ▽ More

    Submitted 11 May, 2025; v1 submitted 3 October, 2024; originally announced October 2024.

  12. arXiv:2408.09948  [pdf, other

    cs.CV cs.AI

    Caption-Driven Explorations: Aligning Image and Text Embeddings through Human-Inspired Foveated Vision

    Authors: Dario Zanca, Andrea Zugarini, Simon Dietz, Thomas R. Altstidl, Mark A. Turban Ndjeuha, Leo Schwinn, Bjoern Eskofier

    Abstract: Understanding human attention is crucial for vision science and AI. While many models exist for free-viewing, less is known about task-driven image exploration. To address this, we introduce CapMIT1003, a dataset with captions and click-contingent image explorations, to study human attention during the captioning task. We also present NevaClip, a zero-shot method for predicting visual scanpaths by… ▽ More

    Submitted 19 August, 2024; originally announced August 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2305.12380

  13. arXiv:2407.15902  [pdf, ps, other

    cs.CR

    Revisiting the Robust Alignment of Circuit Breakers

    Authors: Leo Schwinn, Simon Geisler

    Abstract: Over the past decade, adversarial training has emerged as one of the few reliable methods for enhancing model robustness against adversarial attacks [Szegedy et al., 2014, Madry et al., 2018, Xhonneux et al., 2024], while many alternative approaches have failed to withstand rigorous subsequent evaluations. Recently, an alternative defense mechanism, namely "circuit breakers" [Zou et al., 2024], ha… ▽ More

    Submitted 2 August, 2024; v1 submitted 22 July, 2024; originally announced July 2024.

  14. arXiv:2407.11764  [pdf, other

    cs.LG

    Relaxing Graph Transformers for Adversarial Attacks

    Authors: Philipp Foth, Lukas Gosch, Simon Geisler, Leo Schwinn, Stephan Günnemann

    Abstract: Existing studies have shown that Graph Neural Networks (GNNs) are vulnerable to adversarial attacks. Even though Graph Transformers (GTs) surpassed Message-Passing GNNs on several benchmarks, their adversarial robustness properties are unexplored. However, attacking GTs is challenging due to their Positional Encodings (PEs) and special attention mechanisms which can be difficult to differentiate.… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

  15. arXiv:2406.13283  [pdf, other

    cs.LG

    Large-Scale Dataset Pruning in Adversarial Training through Data Importance Extrapolation

    Authors: Björn Nieth, Thomas Altstidl, Leo Schwinn, Björn Eskofier

    Abstract: Their vulnerability to small, imperceptible attacks limits the adoption of deep learning models to real-world systems. Adversarial training has proven to be one of the most promising strategies against these attacks, at the expense of a substantial increase in training time. With the ongoing trend of integrating large-scale synthetic data this is only expected to increase even further. Thus, the n… ▽ More

    Submitted 11 July, 2024; v1 submitted 19 June, 2024; originally announced June 2024.

    Comments: 8 pages, 5 figures, 3 tables, to be published in ICML: DMLR workshop

  16. arXiv:2405.17951  [pdf, ps, other

    cs.LG

    Efficient Time Series Processing for Transformers and State-Space Models through Token Merging

    Authors: Leon Götz, Marcel Kollovieh, Stephan Günnemann, Leo Schwinn

    Abstract: Despite recent advances in subquadratic attention mechanisms or state-space models, processing long token sequences still imposes significant computational requirements. Token merging has emerged as a solution to increase computational efficiency in computer vision architectures. In this work, we perform the first investigations of token merging in time series analysis on both transformers and sta… ▽ More

    Submitted 5 June, 2025; v1 submitted 28 May, 2024; originally announced May 2024.

    Comments: 21 pages in total, 20 figures

  17. arXiv:2405.15589  [pdf, other

    cs.LG cs.CR

    Efficient Adversarial Training in LLMs with Continuous Attacks

    Authors: Sophie Xhonneux, Alessandro Sordoni, Stephan Günnemann, Gauthier Gidel, Leo Schwinn

    Abstract: Large language models (LLMs) are vulnerable to adversarial attacks that can bypass their safety guardrails. In many domains, adversarial training has proven to be one of the most promising methods to reliably improve robustness against such attacks. Yet, in the context of LLMs, current methods for adversarial training are hindered by the high computational costs required to perform discrete advers… ▽ More

    Submitted 1 November, 2024; v1 submitted 24 May, 2024; originally announced May 2024.

    Comments: 19 pages, 4 figures

  18. arXiv:2405.11337  [pdf, other

    cs.CV

    A Unified Approach Towards Active Learning and Out-of-Distribution Detection

    Authors: Sebastian Schmidt, Leonard Schenk, Leo Schwinn, Stephan Günnemann

    Abstract: When applying deep learning models in open-world scenarios, active learning (AL) strategies are crucial for identifying label candidates from a nearly infinite amount of unlabeled data. In this context, robust out-of-distribution (OOD) detection mechanisms are essential for handling data outside the target distribution of the application. However, current works investigate both problems separately… ▽ More

    Submitted 25 May, 2024; v1 submitted 18 May, 2024; originally announced May 2024.

  19. arXiv:2402.09063  [pdf, other

    cs.LG

    Soft Prompt Threats: Attacking Safety Alignment and Unlearning in Open-Source LLMs through the Embedding Space

    Authors: Leo Schwinn, David Dobre, Sophie Xhonneux, Gauthier Gidel, Stephan Gunnemann

    Abstract: Current research in adversarial robustness of LLMs focuses on discrete input manipulations in the natural language space, which can be directly transferred to closed-source models. However, this approach neglects the steady progression of open-source models. As open-source models advance in capability, ensuring their safety also becomes increasingly imperative. Yet, attacks tailored to open-source… ▽ More

    Submitted 16 April, 2025; v1 submitted 14 February, 2024; originally announced February 2024.

    Comments: Trigger Warning: the appendix contains LLM-generated text with violence and harassment

  20. arXiv:2310.19737  [pdf, other

    cs.AI

    Adversarial Attacks and Defenses in Large Language Models: Old and New Threats

    Authors: Leo Schwinn, David Dobre, Stephan Günnemann, Gauthier Gidel

    Abstract: Over the past decade, there has been extensive research aimed at enhancing the robustness of neural networks, yet this problem remains vastly unsolved. Here, one major impediment has been the overestimation of the robustness of new defense approaches due to faulty defense evaluations. Flawed robustness evaluations necessitate rectifications in subsequent works, dangerously slowing down the researc… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

  21. arXiv:2310.04285  [pdf, other

    cs.CV cs.AI cs.LG stat.ML

    Assessing Robustness via Score-Based Adversarial Image Generation

    Authors: Marcel Kollovieh, Lukas Gosch, Marten Lienen, Yan Scholten, Leo Schwinn, Stephan Günnemann

    Abstract: Most adversarial attacks and defenses focus on perturbations within small $\ell_p$-norm constraints. However, $\ell_p$ threat models cannot capture all relevant semantics-preserving perturbations, and hence, the scope of robustness evaluations is limited. In this work, we introduce Score-Based Adversarial Generation (ScoreAG), a novel framework that leverages the advancements in score-based genera… ▽ More

    Submitted 4 March, 2025; v1 submitted 6 October, 2023; originally announced October 2023.

  22. arXiv:2305.12380  [pdf, other

    cs.CV cs.AI

    Contrastive Language-Image Pretrained Models are Zero-Shot Human Scanpath Predictors

    Authors: Dario Zanca, Andrea Zugarini, Simon Dietz, Thomas R. Altstidl, Mark A. Turban Ndjeuha, Leo Schwinn, Bjoern Eskofier

    Abstract: Understanding the mechanisms underlying human attention is a fundamental challenge for both vision science and artificial intelligence. While numerous computational models of free-viewing have been proposed, less is known about the mechanisms underlying task-driven image exploration. To address this gap, we present CapMIT1003, a database of captions and click-contingent image explorations collecte… ▽ More

    Submitted 23 May, 2023; v1 submitted 21 May, 2023; originally announced May 2023.

  23. arXiv:2305.10388  [pdf, other

    cs.LG cs.CR cs.CV

    Raising the Bar for Certified Adversarial Robustness with Diffusion Models

    Authors: Thomas Altstidl, David Dobre, Björn Eskofier, Gauthier Gidel, Leo Schwinn

    Abstract: Certified defenses against adversarial attacks offer formal guarantees on the robustness of a model, making them more reliable than empirical methods such as adversarial training, whose effectiveness is often later reduced by unseen attacks. Still, the limited certified robustness that is currently achievable has been a bottleneck for their practical adoption. Gowal et al. and Wang et al. have sho… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  24. arXiv:2305.03022  [pdf, other

    cs.LG cs.AI stat.ML

    FastAMI -- a Monte Carlo Approach to the Adjustment for Chance in Clustering Comparison Metrics

    Authors: Kai Klede, Leo Schwinn, Dario Zanca, Björn Eskofier

    Abstract: Clustering is at the very core of machine learning, and its applications proliferate with the increasing availability of data. However, as datasets grow, comparing clusterings with an adjustment for chance becomes computationally difficult, preventing unbiased ground-truth comparisons and solution selection. We propose FastAMI, a Monte Carlo-based method to efficiently approximate the Adjusted Mut… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: Accepted at AAAI 2023

    ACM Class: I.2.0

    Journal ref: Proceedings of the AAAI Conference on Artificial Intelligence, 37(7), 2023, 8317-8324

  25. arXiv:2211.12100  [pdf, other

    cs.CV

    Simulating Human Gaze with Neural Visual Attention

    Authors: Leo Schwinn, Doina Precup, Bjoern Eskofier, Dario Zanca

    Abstract: Existing models of human visual attention are generally unable to incorporate direct task guidance and therefore cannot model an intent or goal when exploring a scene. To integrate guidance of any downstream visual task into attention modeling, we propose the Neural Visual Attention (NeVA) algorithm. To this end, we impose to neural networks the biological constraint of foveated vision and train a… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

  26. arXiv:2211.10288  [pdf, other

    cs.CV

    Just a Matter of Scale? Reevaluating Scale Equivariance in Convolutional Neural Networks

    Authors: Thomas Altstidl, An Nguyen, Leo Schwinn, Franz Köferl, Christopher Mutschler, Björn Eskofier, Dario Zanca

    Abstract: The widespread success of convolutional neural networks may largely be attributed to their intrinsic property of translation equivariance. However, convolutions are not equivariant to variations in scale and fail to generalize to objects of different sizes. Despite recent advances in this field, it remains unclear how well current methods generalize to unobserved scales on real-world data and to w… ▽ More

    Submitted 18 November, 2022; originally announced November 2022.

  27. arXiv:2205.09619  [pdf, other

    cs.LG

    Improving Robustness against Real-World and Worst-Case Distribution Shifts through Decision Region Quantification

    Authors: Leo Schwinn, Leon Bungert, An Nguyen, René Raab, Falk Pulsmeyer, Doina Precup, Björn Eskofier, Dario Zanca

    Abstract: The reliability of neural networks is essential for their use in safety-critical applications. Existing approaches generally aim at improving the robustness of neural networks to either real-world distribution shifts (e.g., common corruptions and perturbations, spatial transformations, and natural adversarial examples) or worst-case distribution shifts (e.g., optimized adversarial examples). In th… ▽ More

    Submitted 19 May, 2022; originally announced May 2022.

  28. arXiv:2204.09093  [pdf, other

    cs.CV cs.AI

    Behind the Machine's Gaze: Neural Networks with Biologically-inspired Constraints Exhibit Human-like Visual Attention

    Authors: Leo Schwinn, Doina Precup, Björn Eskofier, Dario Zanca

    Abstract: By and large, existing computational models of visual attention tacitly assume perfect vision and full access to the stimulus and thereby deviate from foveated biological vision. Moreover, modeling top-down attention is generally reduced to the integration of semantic features without incorporating the signal of a high-level visual tasks that have been shown to partially guide human attention. We… ▽ More

    Submitted 19 November, 2022; v1 submitted 19 April, 2022; originally announced April 2022.

    Comments: 31 pages, 14 figures, 4 tables

    Journal ref: Transactions on Machine Learning Research, October 2022, Open Access

  29. arXiv:2105.10304  [pdf, other

    cs.LG

    Exploring Misclassifications of Robust Neural Networks to Enhance Adversarial Attacks

    Authors: Leo Schwinn, René Raab, An Nguyen, Dario Zanca, Bjoern Eskofier

    Abstract: Progress in making neural networks more robust against adversarial attacks is mostly marginal, despite the great efforts of the research community. Moreover, the robustness evaluation is often imprecise, making it difficult to identify promising approaches. We analyze the classification decisions of 19 different state-of-the-art neural networks trained to be robust against adversarial attacks. Our… ▽ More

    Submitted 25 May, 2021; v1 submitted 21 May, 2021; originally announced May 2021.

  30. arXiv:2103.12531  [pdf, other

    cs.LG math.OC stat.ML

    CLIP: Cheap Lipschitz Training of Neural Networks

    Authors: Leon Bungert, René Raab, Tim Roith, Leo Schwinn, Daniel Tenbrinck

    Abstract: Despite the large success of deep neural networks (DNN) in recent years, most neural networks still lack mathematical guarantees in terms of stability. For instance, DNNs are vulnerable to small or even imperceptible input perturbations, so called adversarial examples, that can cause false predictions. This instability can have severe consequences in applications which influence the health and saf… ▽ More

    Submitted 31 October, 2022; v1 submitted 23 March, 2021; originally announced March 2021.

    Comments: 12 pages, 2 figures, fixed a small mistake in the proof of Proposition 3, published at SSVM 2021

    MSC Class: 65K10; 68T07

    Journal ref: International Conference on Scale Space and Variational Methods in Computer Vision, 307-319, 2021

  31. arXiv:2102.12196  [pdf, other

    cs.LG stat.ML

    Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis

    Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier

    Abstract: The susceptibility of deep neural networks to untrustworthy predictions, including out-of-distribution (OOD) data and adversarial examples, still prevent their widespread use in safety-critical applications. Most existing methods either require a re-training of a given model to achieve robust identification of adversarial attacks or are limited to out-of-distribution sample detection only. In this… ▽ More

    Submitted 24 February, 2021; originally announced February 2021.

  32. System Design for a Data-driven and Explainable Customer Sentiment Monitor

    Authors: An Nguyen, Stefan Foerstel, Thomas Kittler, Andrey Kurzyukov, Leo Schwinn, Dario Zanca, Tobias Hipp, Da Jun Sun, Michael Schrapp, Eva Rothgang, Bjoern Eskofier

    Abstract: The most important goal of customer services is to keep the customer satisfied. However, service resources are always limited and must be prioritized. Therefore, it is important to identify customers who potentially become unsatisfied and might lead to escalations. Today this prioritization of customers is often done manually. Data science on IoT data (esp. log data) for machine health monitoring,… ▽ More

    Submitted 11 January, 2021; originally announced January 2021.

    Journal ref: IEEE Access 9 (2021): 117140-117152

  33. Dynamically Sampled Nonlocal Gradients for Stronger Adversarial Attacks

    Authors: Leo Schwinn, An Nguyen, René Raab, Dario Zanca, Bjoern Eskofier, Daniel Tenbrinck, Martin Burger

    Abstract: The vulnerability of deep neural networks to small and even imperceptible perturbations has become a central topic in deep learning research. Although several sophisticated defense mechanisms have been introduced, most were later shown to be ineffective. However, a reliable evaluation of model robustness is mandatory for deployment in safety-critical scenarios. To overcome this problem we propose… ▽ More

    Submitted 27 September, 2021; v1 submitted 5 November, 2020; originally announced November 2020.

  34. arXiv:2010.11719  [pdf, other

    cs.AI

    Conformance Checking for a Medical Training Process Using Petri net Simulation and Sequence Alignment

    Authors: An Nguyen, Wenyu Zhang, Leo Schwinn, Bjoern Eskofier

    Abstract: Process Mining has recently gained popularity in healthcare due to its potential to provide a transparent, objective and data-based view on processes. Conformance checking is a sub-discipline of process mining that has the potential to answer how the actual process executions deviate from existing guidelines. In this work, we analyze a medical training process for a surgical procedure. Ten student… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  35. arXiv:2010.00889  [pdf, other

    cs.LG cs.AI

    Time Matters: Time-Aware LSTMs for Predictive Business Process Monitoring

    Authors: An Nguyen, Srijeet Chatterjee, Sven Weinzierl, Leo Schwinn, Martin Matzner, Bjoern Eskofier

    Abstract: Predictive business process monitoring (PBPM) aims to predict future process behavior during ongoing process executions based on event log data. Especially, techniques for the next activity and timestamp prediction can help to improve the performance of operational business processes. Recently, many PBPM solutions based on deep learning were proposed by researchers. Due to the sequential nature of… ▽ More

    Submitted 5 November, 2020; v1 submitted 2 October, 2020; originally announced October 2020.

    Comments: 12 pages, 4 figures, to be published in post-workshop proceedings volume in the series Lecture Notes in Business Information Processing (LNBIP) - 1st International Workshop on Leveraging Machine Learning in Process Mining (ML4PM) @ ICPM 2020

    MSC Class: 68T07 ACM Class: I.2.1; I.2.6; J.1

  36. arXiv:2002.10097  [pdf, other

    cs.LG stat.ML

    Towards Rapid and Robust Adversarial Training with One-Step Attacks

    Authors: Leo Schwinn, René Raab, Björn Eskofier

    Abstract: Adversarial training is the most successful empirical method for increasing the robustness of neural networks against adversarial attacks. However, the most effective approaches, like training with Projected Gradient Descent (PGD) are accompanied by high computational complexity. In this paper, we present two ideas that, in combination, enable adversarial training with the computationally less exp… ▽ More

    Submitted 17 March, 2020; v1 submitted 24 February, 2020; originally announced February 2020.

    Comments: 16 pages, 5 figures