+
PDF
Chat
|
Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection
|
2024
|
Hang Wang
Zhen Xiang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
On Trojans in Refined Language Models
|
2024
|
Jayaram Raghuram
George Kesidis
David J. Miller
|
+
PDF
Chat
|
Universal Post-Training Reverse-Engineering Defense Against Backdoors in
Deep Neural Networks
|
2024
|
Xi Li
Hang Wang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers
|
2023
|
Xi Li
David J. Miller
Zhen Xiang
George Kesidis
|
+
|
References
|
2023
|
David J. Miller
Zhen Xiang
George Kesidis
|
+
|
Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation Learning
|
2023
|
Hang Wang
Sahar Karami
Ousmane Dia
Hippolyt Ritter
Ehsan Emamjomeh-Zadeh
Jiahui Chen
Zhen Xiang
David J. Miller
George Kesidis
|
+
|
Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection
|
2023
|
Hang Wang
Zhen Xiang
David J. Miller
George Kesidis
|
+
|
Backdoor Mitigation by Correcting the Distribution of Neural Activations
|
2023
|
Xi Li
Zhen Xiang
David J. Miller
George Kesidis
|
+
|
Post-Training Overfitting Mitigation in DNN Classifiers
|
2023
|
Hang Wang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
Anomaly detection of adversarial examples using class-conditional generative adversarial networks
|
2022
|
Hang Wang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
Detecting Backdoor Attacks against Point Cloud Classifiers
|
2022
|
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
George Kesidis
|
+
|
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
|
2022
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
|
Improved Constraints on Effective Top Quark Interactions using Edge
Convolution Networks
|
2021
|
Oliver Atkinson
Akanksha Bhardwaj
S. G. R. Brown
Christoph Englert
David J. Miller
Panagiotis Stylianou
|
+
PDF
Chat
|
A Backdoor Attack against 3D Point Cloud Classifiers
|
2021
|
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
George Kesidis
|
+
|
Anomaly Detection of Test-Time Evasion Attacks using Class-conditional Generative Adversarial Networks.
|
2021
|
Hang Wang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set
|
2021
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing
|
2021
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
A Backdoor Attack against 3D Point Cloud Classifiers
|
2021
|
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
George Kesidis
|
+
|
A Backdoor Attack against 3D Point Cloud Classifiers
|
2021
|
Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
George Kesidis
|
+
|
A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers
|
2021
|
Xi Li
David J. Miller
Zhen Xiang
George Kesidis
|
+
|
Robust and Active Learning for Deep Neural Network Regression
|
2021
|
Xi Li
George Kesidis
David J. Miller
Maxime Bergeron
Ryan Ferguson
Vladimir Lucic
|
+
|
Backdoor Attack and Defense for Deep Regression
|
2021
|
Xi Li
George Kesidis
David J. Miller
Vladimir Lucic
|
+
|
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks
|
2021
|
Xi Li
Zhen Xiang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
Detection of Backdoors in Trained Classifiers Without Access to the Training Set
|
2020
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
|
2020
|
Haoti Zhong
Cong Liao
Anna Squicciarini
Sencun Zhu
David J. Miller
|
+
|
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing
|
2020
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
|
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set
|
2020
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
|
Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification
|
2019
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time
|
2019
|
David J. Miller
Yujia Wang
George Kesidis
|
+
PDF
Chat
|
When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers
|
2019
|
Yujia Wang
David J. Miller
George Kesidis
|
+
PDF
Chat
|
Learned Neural Iterative Decoding for Lossy Image Compression Systems
|
2019
|
Alexander G. Ororbia
Ankur Mali
Jian Wu
Scott O'Connell
William Dreese
David J. Miller
C. Lee Giles
|
+
|
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks
|
2019
|
David J. Miller
Zhen Xiang
George Kesidis
|
+
|
Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic
|
2019
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
|
Notes on Margin Training and Margin p-Values for Deep Neural Network Classifiers
|
2019
|
George Kesidis
David J. Miller
Zhen Xiang
|
+
|
Detection of Backdoors in Trained Classifiers Without Access to the Training Set
|
2019
|
Zhen Xiang
David J. Miller
George Kesidis
|
+
|
A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters
|
2018
|
David J. Miller
Xinyi Hu
Zhen Xiang
George Kesidis
|
+
|
Constrained maximum entropy models to select genotype interactions associated with censored failure times
|
2018
|
Aotian Yang
David J. Miller
Qing Pan
|
+
|
Learned Iterative Decoding for Lossy Image Compression Systems.
|
2018
|
Alexander G. Ororbia
Ankur Mali
Jian Wu
Scott O'Connell
David J. Miller
C. Lee Giles
|
+
|
Learned Neural Iterative Decoding for Lossy Image Compression Systems
|
2018
|
Alexander G. Ororbia
Ankur Mali
Jian Wu
Scott O'Connell
David J. Miller
C. Lee Giles
|
+
|
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
|
2018
|
Cong Liao
Haoti Zhong
Anna Squicciarini
Sencun Zhu
David J. Miller
|
+
|
When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers
|
2018
|
Yujia Wang
David J. Miller
George Kesidis
|
+
|
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time
|
2017
|
David J. Miller
Yulia Wang
George Kesidis
|
+
PDF
Chat
|
Adversarial learning: A critical review and active learning study
|
2017
|
David J. Miller
Xingbo Hu
ZhenâBin Qiu
George Kesidis
|
+
|
Adversarial Learning: A Critical Review and Active Learning Study
|
2017
|
David J. Miller
Xinyi Hu
Zhicong Qiu
George Kesidis
|
+
|
Adversarial Learning: A Critical Review and Active Learning Study
|
2017
|
David J. Miller
Xinyi Hu
Zhicong Qiu
George Kesidis
|
+
PDF
Chat
|
Convex Analysis of Mixtures for Separating Non-negative Well-grounded Sources
|
2016
|
Yitan Zhu
Niya Wang
David J. Miller
Yue Wang
|
+
PDF
Chat
|
ATD: Anomalous Topic Discovery in High Dimensional Discrete Data
|
2016
|
Hossein Soleimani
David J. Miller
|
+
PDF
Chat
|
Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data
|
2015
|
Zhicong Qiu
David J. Miller
George Kesidis
|
+
PDF
Chat
|
RESISTANCE SCALING FACTOR OF THE PILLOW AND FRACTALINA FRACTALS
|
2015
|
Michael J. Ignatowich
Daniel J. Kelleher
Catherine E. Maloney
David J. Miller
Khrystyna Serhiyenko
|
+
|
Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data
|
2015
|
Zhicong Qiu
David J. Miller
George Kesidis
|
+
PDF
Chat
|
Parsimonious Topic Models with Salient Word Discovery
|
2014
|
Hossein Soleimani
David J. Miller
|
+
|
Generation bidding game with flexible demand
|
2014
|
Yuquan Shan
Jayaram Raghuram
George Kesidis
Christopher Griffin
Karl Levitt
David J. Miller
Jeff Rowe
Anna Scaglione
|
+
|
Convex Analysis of Mixtures for Separating Non-negative Well-grounded Sources
|
2014
|
Yitan Zhu
Niya Wang
David J. Miller
Yue Wang
|
+
|
Generation bidding game with flexible demand
|
2014
|
Yuquan Shan
Jayaram Raghuram
George Kesidis
Christopher Griffin
Karl Levitt
David J. Miller
Jeffry Rowe
Anna Scaglione
|
+
|
Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task Heterogeneity
|
2013
|
Aditya Kurve
David J. Miller
George Kesidis
|
+
PDF
Chat
|
SPECTRUM AND HEAT KERNEL ASYMPTOTICS ON GENERAL LAAKSO SPACES
|
2012
|
Matthew BeguĂŠ
Levi DeValve
David J. Miller
Benjamin Steinhurst
|
+
|
Computation of the scaling factor of resistance forms of the pillow and fractalina fractals
|
2012
|
Michael J. Ignatowich
Daniel J. Kelleher
Catherine E. Maloney
David J. Miller
Khrystyna Nechyporenko
|
+
PDF
Chat
|
An MRI-Derived Definition of MCI-to-AD Conversion for Long-Term, Automatic Prognosis of MCI Patients
|
2011
|
Yaman Aksu
David J. Miller
George Kesidis
Don C. Bigler
Qing X. Yang
|
+
|
Game Theoretic Iterative Partitioning for Dynamic Load Balancing in Distributed Network Simulation
|
2011
|
Aditya Kurve
Christopher Griffin
David J. Miller
George Kesidis
|
+
|
Joint Parsimonious Modeling and Model Order Selection for Multivariate Gaussian Mixtures
|
2010
|
Scott C Markley
David J. Miller
|
+
|
Spectrum and Heat Kernel Asymptotics on General Laakso Spaces
|
2009
|
Matthew BeguĂŠ
Levi DeValve
David J. Miller
Benjamin Steinhurst
|
+
|
Hierarchical maximum entropy modeling for regression
|
2009
|
Yanxin Zhang
David J. Miller
George Kesidis
|
+
|
A mixture model and EM algorithm for robust classification, outlier rejection, and class discovery
|
2003
|
David J. Miller
Jamie A. Browning
|
+
|
Approximate maximum entropy joint feature inference for discrete space classification
|
2003
|
David J. Miller
Lian Yan
|
+
|
General statistical inference by an approximate application of the maximum entropy principle
|
2003
|
Lian Yan
David J. Miller
|
+
|
A mixture model framework for class discovery and outlier detection in mixed labeled/unlabeled data sets
|
2003
|
David J. Miller
Jamie A. Browning
|
+
|
Approximate maximum entropy learning for classification: comparison with other methods
|
2002
|
Lian Yan
David J. Miller
|
+
|
Hybrid fractal zerotree wavelet image coding
|
2002
|
Taekon Kim
R.E. Van Dyck
David J. Miller
|
+
|
Approximate Maximum Entropy Joint Feature Inference Consistent with Arbitrary Lower-Order Probability Constraints: Application to Statistical Classification
|
2000
|
David J. Miller
Lian Yan
|
+
|
Combined Learning and Use for a Mixture Model Equivalent to the RBF Classifier
|
1998
|
David J. Miller
Hasan S. Uyar
|