Skip to main content

Showing 1–4 of 4 results for author: Madaan, D

Searching in archive stat. Search in all archives.
.
  1. arXiv:2006.12135  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    Learning to Generate Noise for Multi-Attack Robustness

    Authors: Divyam Madaan, Jinwoo Shin, Sung Ju Hwang

    Abstract: Adversarial learning has emerged as one of the successful techniques to circumvent the susceptibility of existing methods against adversarial perturbations. However, the majority of existing defense methods are tailored to defend against a single category of adversarial perturbation (e.g. $\ell_\infty$-attack). In safety-critical applications, this makes these methods extraneous as the attacker ca… ▽ More

    Submitted 24 June, 2021; v1 submitted 22 June, 2020; originally announced June 2020.

    Comments: Accepted to ICML 2021. Code available at https://github.com/divyam3897/MNG_AC

  2. arXiv:1908.04355  [pdf, other

    cs.LG cs.CR cs.CV cs.NE stat.ML

    Adversarial Neural Pruning with Latent Vulnerability Suppression

    Authors: Divyam Madaan, Jinwoo Shin, Sung Ju Hwang

    Abstract: Despite the remarkable performance of deep neural networks on various computer vision tasks, they are known to be susceptible to adversarial perturbations, which makes it challenging to deploy them in real-world safety-critical applications. In this paper, we conjecture that the leading cause of adversarial vulnerability is the distortion in the latent feature space, and provide methods to suppres… ▽ More

    Submitted 2 July, 2020; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: Accepted to ICML 2020. Code available at https://github.com/divyam3897/ANP_VS

  3. arXiv:1905.13678  [pdf, other

    cs.LG stat.ML

    Learning Sparse Networks Using Targeted Dropout

    Authors: Aidan N. Gomez, Ivan Zhang, Siddhartha Rao Kamalakara, Divyam Madaan, Kevin Swersky, Yarin Gal, Geoffrey E. Hinton

    Abstract: Neural networks are easier to optimise when they have many more weights than are required for modelling the mapping from inputs to outputs. This suggests a two-stage learning procedure that first learns a large net and then prunes away connections or hidden units. But standard training does not necessarily encourage nets to be amenable to pruning. We introduce targeted dropout, a method for traini… ▽ More

    Submitted 9 September, 2019; v1 submitted 31 May, 2019; originally announced May 2019.

  4. arXiv:1801.08852  [pdf, other

    stat.ME q-fin.MF

    Calibration for Weak Variance-Alpha-Gamma Processes

    Authors: Boris Buchmann, Kevin W. Lu, Dilip B. Madan

    Abstract: The weak variance-alpha-gamma process is a multivariate Lévy process constructed by weakly subordinating Brownian motion, possibly with correlated components with an alpha-gamma subordinator. It generalises the variance-alpha-gamma process of Semeraro constructed by traditional subordination. We compare three calibration methods for the weak variance-alpha-gamma process, method of moments, maximum… ▽ More

    Submitted 27 July, 2018; v1 submitted 26 January, 2018; originally announced January 2018.

    MSC Class: 60G51; 62F10; 60E10