Skip to main content

Showing 1–8 of 8 results for author: Chin, P

Searching in archive stat. Search in all archives.
.
  1. arXiv:2402.02441  [pdf, other

    cs.LG cs.AI cs.MS stat.CO

    TopoX: A Suite of Python Packages for Machine Learning on Topological Domains

    Authors: Mustafa Hajij, Mathilde Papillon, Florian Frantzen, Jens Agerberg, Ibrahem AlJabea, Rubén Ballester, Claudio Battiloro, Guillermo Bernárdez, Tolga Birdal, Aiden Brent, Peter Chin, Sergio Escalera, Simone Fiorellino, Odin Hoff Gardaa, Gurusankar Gopalakrishnan, Devendra Govil, Josef Hoppe, Maneel Reddy Karri, Jude Khouja, Manuel Lecha, Neal Livesay, Jan Meißner, Soham Mukherjee, Alexander Nikitin, Theodore Papamarkou , et al. (18 additional authors not shown)

    Abstract: We introduce TopoX, a Python software suite that provides reliable and user-friendly building blocks for computing and machine learning on topological domains that extend graphs: hypergraphs, simplicial, cellular, path and combinatorial complexes. TopoX consists of three packages: TopoNetX facilitates constructing and computing on these domains, including working with nodes, edges and higher-order… ▽ More

    Submitted 8 December, 2024; v1 submitted 4 February, 2024; originally announced February 2024.

  2. arXiv:1908.07116  [pdf, other

    cs.LG cs.CV stat.ML

    Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses

    Authors: Xiao Wang, Siyue Wang, Pin-Yu Chen, Yanzhi Wang, Brian Kulis, Xue Lin, Peter Chin

    Abstract: Despite achieving remarkable success in various domains, recent studies have uncovered the vulnerability of deep neural networks to adversarial perturbations, creating concerns on model generalizability and new threats such as prediction-evasive misclassification or stealthy reprogramming. Among different defense proposals, stochastic network defenses such as random neuron activation pruning or ra… ▽ More

    Submitted 19 August, 2019; originally announced August 2019.

    Comments: Published as Conference Paper @ IJCAI 2019

  3. arXiv:1908.00449  [pdf, other

    cs.LG cs.CL stat.ML

    Tree-Transformer: A Transformer-Based Method for Correction of Tree-Structured Data

    Authors: Jacob Harer, Chris Reale, Peter Chin

    Abstract: Many common sequential data sources, such as source code and natural language, have a natural tree-structured representation. These trees can be generated by fitting a sequence to a grammar, yielding a hierarchical ordering of the tokens in the sequence. This structure encodes a high degree of syntactic information, making it ideal for problems such as grammar correction. However, little work has… ▽ More

    Submitted 1 August, 2019; originally announced August 2019.

  4. arXiv:1812.08808  [pdf, other

    stat.ML cs.LG

    Reducing Sampling Ratios Improves Bagging in Sparse Regression

    Authors: Luoluo Liu, Sang Peter Chin, Trac D. Tran

    Abstract: Bagging, a powerful ensemble method from machine learning, improves the performance of unstable predictors. Although the power of Bagging has been shown mostly in classification problems, we demonstrate the success of employing Bagging in sparse regression over the baseline method (L1 minimization). The framework employs the generalized version of the original Bagging with various bootstrap ratios… ▽ More

    Submitted 1 May, 2019; v1 submitted 20 December, 2018; originally announced December 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1810.03743

  5. arXiv:1810.03743  [pdf, other

    stat.ML cs.LG eess.SP

    JOBS: Joint-Sparse Optimization from Bootstrap Samples

    Authors: Luoluo Liu, Sang Peter Chin, Trac D. Tran

    Abstract: Classical signal recovery based on $\ell_1$ minimization solves the least squares problem with all available measurements via sparsity-promoting regularization. In practice, it is often the case that not all measurements are available or required for recovery. Measurements might be corrupted/missing or they arrive sequentially in streaming fashion. In this paper, we propose a global sparse recover… ▽ More

    Submitted 10 December, 2018; v1 submitted 8 October, 2018; originally announced October 2018.

  6. arXiv:1809.05165  [pdf, other

    cs.CR cs.CV cs.LG stat.ML

    Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks

    Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin

    Abstract: Deep neural networks (DNNs) are known vulnerable to adversarial attacks. That is, adversarial examples, obtained by adding delicately crafted distortions onto original legal inputs, can mislead a DNN to classify them as any target labels. This work provides a solution to hardening DNNs under adversarial attacks through defensive dropout. Besides using dropout during training for the best test accu… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

    Comments: Accepted as conference paper on ICCAD 2018

  7. arXiv:1805.07475  [pdf, other

    cs.CL cs.LG cs.NE stat.ML

    Learning to Repair Software Vulnerabilities with Generative Adversarial Networks

    Authors: Jacob Harer, Onur Ozdemir, Tomo Lazovich, Christopher P. Reale, Rebecca L. Russell, Louis Y. Kim, Peter Chin

    Abstract: Motivated by the problem of automated repair of software vulnerabilities, we propose an adversarial learning approach that maps from one discrete source domain to another target domain without requiring paired labeled examples or source and target domains to be bijections. We demonstrate that the proposed adversarial learning approach is an effective technique for repairing software vulnerabilitie… ▽ More

    Submitted 28 October, 2018; v1 submitted 18 May, 2018; originally announced May 2018.

    Comments: Presented at 32nd Conference on Neural Information Processing Systems (nips 2018), Montreal Canada

  8. arXiv:1803.04497  [pdf, other

    cs.SE cs.LG stat.ML

    Automated software vulnerability detection with machine learning

    Authors: Jacob A. Harer, Louis Y. Kim, Rebecca L. Russell, Onur Ozdemir, Leonard R. Kosta, Akshay Rangamani, Lei H. Hamilton, Gabriel I. Centeno, Jonathan R. Key, Paul M. Ellingwood, Erik Antelman, Alan Mackay, Marc W. McConley, Jeffrey M. Opper, Peter Chin, Tomo Lazovich

    Abstract: Thousands of security vulnerabilities are discovered in production software each year, either reported publicly to the Common Vulnerabilities and Exposures database or discovered internally in proprietary code. Vulnerabilities often manifest themselves in subtle ways that are not obvious to code reviewers or the developers themselves. With the wealth of open source code available for analysis, the… ▽ More

    Submitted 2 August, 2018; v1 submitted 14 February, 2018; originally announced March 2018.