David J. Miller

Follow

Generating author description...

All published works
Action Title Year Authors
+ PDF Chat Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection 2024 Hang Wang
Zhen Xiang
David J. Miller
George Kesidis
+ PDF Chat On Trojans in Refined Language Models 2024 Jayaram Raghuram
George Kesidis
David J. Miller
+ PDF Chat Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks 2024 Xi Li
Hang Wang
David J. Miller
George Kesidis
+ PDF Chat A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers 2023 Xi Li
David J. Miller
Zhen Xiang
George Kesidis
+ References 2023 David J. Miller
Zhen Xiang
George Kesidis
+ Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation Learning 2023 Hang Wang
Sahar Karami
Ousmane Dia
Hippolyt Ritter
Ehsan Emamjomeh-Zadeh
Jiahui Chen
Zhen Xiang
David J. Miller
George Kesidis
+ Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection 2023 Hang Wang
Zhen Xiang
David J. Miller
George Kesidis
+ Backdoor Mitigation by Correcting the Distribution of Neural Activations 2023 Xi Li
Zhen Xiang
David J. Miller
George Kesidis
+ Post-Training Overfitting Mitigation in DNN Classifiers 2023 Hang Wang
David J. Miller
George Kesidis
+ PDF Chat Anomaly detection of adversarial examples using class-conditional generative adversarial networks 2022 Hang Wang
David J. Miller
George Kesidis
+ PDF Chat Detecting Backdoor Attacks against Point Cloud Classifiers 2022 Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
George Kesidis
+ Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios 2022 Zhen Xiang
David J. Miller
George Kesidis
+ Improved Constraints on Effective Top Quark Interactions using Edge Convolution Networks 2021 Oliver Atkinson
Akanksha Bhardwaj
S. G. R. Brown
Christoph Englert
David J. Miller
Panagiotis Stylianou
+ PDF Chat A Backdoor Attack against 3D Point Cloud Classifiers 2021 Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
George Kesidis
+ Anomaly Detection of Test-Time Evasion Attacks using Class-conditional Generative Adversarial Networks. 2021 Hang Wang
David J. Miller
George Kesidis
+ PDF Chat L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set 2021 Zhen Xiang
David J. Miller
George Kesidis
+ PDF Chat Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing 2021 Zhen Xiang
David J. Miller
George Kesidis
+ PDF Chat A Backdoor Attack against 3D Point Cloud Classifiers 2021 Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
George Kesidis
+ A Backdoor Attack against 3D Point Cloud Classifiers 2021 Zhen Xiang
David J. Miller
Siheng Chen
Xi Li
George Kesidis
+ A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers 2021 Xi Li
David J. Miller
Zhen Xiang
George Kesidis
+ Robust and Active Learning for Deep Neural Network Regression 2021 Xi Li
George Kesidis
David J. Miller
Maxime Bergeron
Ryan Ferguson
Vladimir Lucic
+ Backdoor Attack and Defense for Deep Regression 2021 Xi Li
George Kesidis
David J. Miller
Vladimir Lucic
+ Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks 2021 Xi Li
Zhen Xiang
David J. Miller
George Kesidis
+ PDF Chat Detection of Backdoors in Trained Classifiers Without Access to the Training Set 2020 Zhen Xiang
David J. Miller
George Kesidis
+ PDF Chat Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation 2020 Haoti Zhong
Cong Liao
Anna Squicciarini
Sencun Zhu
David J. Miller
+ Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing 2020 Zhen Xiang
David J. Miller
George Kesidis
+ L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set 2020 Zhen Xiang
David J. Miller
George Kesidis
+ Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification 2019 Zhen Xiang
David J. Miller
George Kesidis
+ PDF Chat When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time 2019 David J. Miller
Yujia Wang
George Kesidis
+ PDF Chat When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers 2019 Yujia Wang
David J. Miller
George Kesidis
+ PDF Chat Learned Neural Iterative Decoding for Lossy Image Compression Systems 2019 Alexander G. Ororbia
Ankur Mali
Jian Wu
Scott O'Connell
William Dreese
David J. Miller
C. Lee Giles
+ Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks 2019 David J. Miller
Zhen Xiang
George Kesidis
+ Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic 2019 Zhen Xiang
David J. Miller
George Kesidis
+ Notes on Margin Training and Margin p-Values for Deep Neural Network Classifiers 2019 George Kesidis
David J. Miller
Zhen Xiang
+ Detection of Backdoors in Trained Classifiers Without Access to the Training Set 2019 Zhen Xiang
David J. Miller
George Kesidis
+ A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters 2018 David J. Miller
Xinyi Hu
Zhen Xiang
George Kesidis
+ Constrained maximum entropy models to select genotype interactions associated with censored failure times 2018 Aotian Yang
David J. Miller
Qing Pan
+ Learned Iterative Decoding for Lossy Image Compression Systems. 2018 Alexander G. Ororbia
Ankur Mali
Jian Wu
Scott O'Connell
David J. Miller
C. Lee Giles
+ Learned Neural Iterative Decoding for Lossy Image Compression Systems 2018 Alexander G. Ororbia
Ankur Mali
Jian Wu
Scott O'Connell
David J. Miller
C. Lee Giles
+ Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation 2018 Cong Liao
Haoti Zhong
Anna Squicciarini
Sencun Zhu
David J. Miller
+ When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers 2018 Yujia Wang
David J. Miller
George Kesidis
+ When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time 2017 David J. Miller
Yulia Wang
George Kesidis
+ PDF Chat Adversarial learning: A critical review and active learning study 2017 David J. Miller
Xingbo Hu
Zhen‐Bin Qiu
George Kesidis
+ Adversarial Learning: A Critical Review and Active Learning Study 2017 David J. Miller
Xinyi Hu
Zhicong Qiu
George Kesidis
+ Adversarial Learning: A Critical Review and Active Learning Study 2017 David J. Miller
Xinyi Hu
Zhicong Qiu
George Kesidis
+ PDF Chat Convex Analysis of Mixtures for Separating Non-negative Well-grounded Sources 2016 Yitan Zhu
Niya Wang
David J. Miller
Yue Wang
+ PDF Chat ATD: Anomalous Topic Discovery in High Dimensional Discrete Data 2016 Hossein Soleimani
David J. Miller
+ PDF Chat Detecting clusters of anomalies on low-dimensional feature subsets with application to network traffic flow data 2015 Zhicong Qiu
David J. Miller
George Kesidis
+ PDF Chat RESISTANCE SCALING FACTOR OF THE PILLOW AND FRACTALINA FRACTALS 2015 Michael J. Ignatowich
Daniel J. Kelleher
Catherine E. Maloney
David J. Miller
Khrystyna Serhiyenko
+ Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data 2015 Zhicong Qiu
David J. Miller
George Kesidis
+ PDF Chat Parsimonious Topic Models with Salient Word Discovery 2014 Hossein Soleimani
David J. Miller
+ Generation bidding game with flexible demand 2014 Yuquan Shan
Jayaram Raghuram
George Kesidis
Christopher Griffin
Karl Levitt
David J. Miller
Jeff Rowe
Anna Scaglione
+ Convex Analysis of Mixtures for Separating Non-negative Well-grounded Sources 2014 Yitan Zhu
Niya Wang
David J. Miller
Yue Wang
+ Generation bidding game with flexible demand 2014 Yuquan Shan
Jayaram Raghuram
George Kesidis
Christopher Griffin
Karl Levitt
David J. Miller
Jeffry Rowe
Anna Scaglione
+ Multicategory Crowdsourcing Accounting for Plurality in Worker Skill and Intention, Task Difficulty, and Task Heterogeneity 2013 Aditya Kurve
David J. Miller
George Kesidis
+ PDF Chat SPECTRUM AND HEAT KERNEL ASYMPTOTICS ON GENERAL LAAKSO SPACES 2012 Matthew BeguĂŠ
Levi DeValve
David J. Miller
Benjamin Steinhurst
+ Computation of the scaling factor of resistance forms of the pillow and fractalina fractals 2012 Michael J. Ignatowich
Daniel J. Kelleher
Catherine E. Maloney
David J. Miller
Khrystyna Nechyporenko
+ PDF Chat An MRI-Derived Definition of MCI-to-AD Conversion for Long-Term, Automatic Prognosis of MCI Patients 2011 Yaman Aksu
David J. Miller
George Kesidis
Don C. Bigler
Qing X. Yang
+ Game Theoretic Iterative Partitioning for Dynamic Load Balancing in Distributed Network Simulation 2011 Aditya Kurve
Christopher Griffin
David J. Miller
George Kesidis
+ Joint Parsimonious Modeling and Model Order Selection for Multivariate Gaussian Mixtures 2010 Scott C Markley
David J. Miller
+ Spectrum and Heat Kernel Asymptotics on General Laakso Spaces 2009 Matthew BeguĂŠ
Levi DeValve
David J. Miller
Benjamin Steinhurst
+ Hierarchical maximum entropy modeling for regression 2009 Yanxin Zhang
David J. Miller
George Kesidis
+ A mixture model and EM algorithm for robust classification, outlier rejection, and class discovery 2003 David J. Miller
Jamie A. Browning
+ Approximate maximum entropy joint feature inference for discrete space classification 2003 David J. Miller
Lian Yan
+ General statistical inference by an approximate application of the maximum entropy principle 2003 Lian Yan
David J. Miller
+ A mixture model framework for class discovery and outlier detection in mixed labeled/unlabeled data sets 2003 David J. Miller
Jamie A. Browning
+ Approximate maximum entropy learning for classification: comparison with other methods 2002 Lian Yan
David J. Miller
+ Hybrid fractal zerotree wavelet image coding 2002 Taekon Kim
R.E. Van Dyck
David J. Miller
+ Approximate Maximum Entropy Joint Feature Inference Consistent with Arbitrary Lower-Order Probability Constraints: Application to Statistical Classification 2000 David J. Miller
Lian Yan
+ Combined Learning and Use for a Mixture Model Equivalent to the RBF Classifier 1998 David J. Miller
Hasan S. Uyar
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning 2017 Xinyun Chen
Chang Liu
Bo Li
Kimberly Lu
Dawn Song
14
+ PDF Chat The Limitations of Deep Learning in Adversarial Settings 2016 Nicolas Papernot
Patrick McDaniel
Somesh Jha
Matt Fredrikson
Z. Berkay Celik
Ananthram Swami
13
+ Maximum Likelihood from Incomplete Data Via the <i>EM</i> Algorithm 1977 A. P. Dempster
N. M. Laird
Donald B. Rubin
12
+ PDF Chat Deep Residual Learning for Image Recognition 2016 Kaiming He
Xiangyu Zhang
Shaoqing Ren
Jian Sun
12
+ PDF Chat Support vector machines under adversarial label contamination 2015 Xiao Huang
Battista Biggio
Blaine Nelson
Han Xiao
Claudia Eckert
Fabio Roli
12
+ PDF Chat Estimating the Dimension of a Model 1978 Gideon Schwarz
12
+ PDF Chat Practical Black-Box Attacks against Machine Learning 2017 Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
Somesh Jha
Z. Berkay Celik
Ananthram Swami
11
+ PDF Chat Towards Evaluating the Robustness of Neural Networks 2017 Nicholas Carlini
David Wagner
11
+ PDF Chat Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation 2020 Haoti Zhong
Cong Liao
Anna Squicciarini
Sencun Zhu
David J. Miller
10
+ TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems 2019 Wenbo Guo
Lun Wang
Xinyu Xing
Min Du
Dawn Song
10
+ PDF Chat Universal Adversarial Perturbations 2017 Seyed-Mohsen Moosavi-Dezfooli
Alhussein Fawzi
Omar Fawzi
Pascal Frossard
8
+ Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering 2018 Bryant Chen
Wilka Carvalho
Nathalie Baracaldo
Heiko Ludwig
Ben Edwards
Taesung Lee
Ian Molloy
Biplav Srivastava
7
+ Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks 2019 David J. Miller
Zhen Xiang
George Kesidis
7
+ PDF Chat When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time 2019 David J. Miller
Yujia Wang
George Kesidis
7
+ PDF Chat Detection of Backdoors in Trained Classifiers Without Access to the Training Set 2020 Zhen Xiang
David J. Miller
George Kesidis
7
+ PDF Chat Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases 2020 Ren Wang
Gaoyuan Zhang
Sijia Liu
Pin‐Yu Chen
Jinjun Xiong
Meng Wang
6
+ The Influence Curve and its Role in Robust Estimation 1974 Frank R. Hampel
5
+ SentiNet: Detecting Physical Attacks Against Deep Learning Systems 2018 Edward Chou
Florian Tramèr
Giancarlo Pellegrino
Dan Boneh
5
+ Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering 2018 Bryant Chen
Wilka Carvalho
Nathalie Baracaldo
Heiko Ludwig
Ben Edwards
Taesung Lee
Ian Molloy
Biplav Srivastava
4
+ PDF Chat L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set 2021 Zhen Xiang
David J. Miller
George Kesidis
4
+ Evasion Attacks against Machine Learning at Test Time 2013 Battista Biggio
Igino Corona
Davide Maiorca
Blaine Nelson
Nedim Šrndić
Pavel Laskov
Giorgio Giacinto
Fabio Roli
4
+ Approximating discrete probability distributions 1969 H. H. Ku
S. Kullback
4
+ Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning 2018 Battista Biggio
Fabio Roli
4
+ PDF Chat When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers 2019 Yujia Wang
David J. Miller
George Kesidis
4
+ an entropy-driven system for construction of probabilistic expert systems from databases 1990 Edward H. Herskovits
Gregory F. Cooper
4
+ PDF Chat PointNet: Deep Learning on Point Sets for 3D Classification and Segmentation 2017 Raffaelli Charles
Hao Su
Kaichun Mo
Leonidas Guibas
3
+ PDF Chat 3D ShapeNets: A deep representation for volumetric shapes 2015 Zhirong Wu
Shuran Song
Aditya Khosla
Fisher Yu
Linguang Zhang
Xiaoou Tang
Jianxiong Xiao
3
+ PDF Chat Hidden Trigger Backdoor Attacks 2020 Aniruddha Saha
Akshayvarun Subramanya
Hamed Pirsiavash
3
+ PDF Chat Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics 2017 Xin Li
Fuxin Li
3
+ Understanding Black-box Predictions via Influence Functions 2017 Pang Wei Koh
Percy Liang
3
+ PDF Chat Wild patterns: Ten years after the rise of adversarial machine learning 2018 Battista Biggio
Fabio Roli
3
+ Stealing machine learning models via prediction APIs 2016 Florian Tramèr
Fan Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
3
+ PDF Chat Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization 2017 Luis MuĂąoz-GonzĂĄlez
Battista Biggio
Ambra Demontis
Andrea Paudice
Vasin Wongrassamee
Emil Lupu
Fabio Roli
3
+ PDF Chat Extending Adversarial Attacks and Defenses to Deep 3D Point Cloud Classifiers 2019 Daniel Liu
Ronald Yu
Hao Su
3
+ PDF Chat Generating 3D Adversarial Point Clouds 2019 Chong Xiang
Charles R. Qi
Bo Li
3
+ PointNet++: Deep Hierarchical Feature Learning on Point Sets in a Metric Space 2017 Charles R. Qi
Yi Li
Hao Su
Leonidas Guibas
3
+ Detecting AI Trojans Using Meta Neural Analysis 2019 Xiaojun Xu
Qi Wang
Huichen Li
Nikita Borisov
Carl A. Gunter
Bo Li
3
+ A backdoor attack against LSTM-based text classification systems 2019 Jiazhu Dai
Chuanshuai Chen
3
+ Very Deep Convolutional Networks for Large-Scale Image Recognition 2014 Karen Simonyan
Andrew Zisserman
3
+ PDF Chat Local Descriptor for Robust Place Recognition Using LiDAR Intensity 2019 Jiadong Guo
Paulo Borges
Chanoh Park
Abel Gawel
3
+ Kutato: An Entropy-Driven System for Construction of Probabilistic Expert Systems from Databases 2013 Edward H. Herskovits
Gregory F. Cooper
3
+ PDF Chat The EM Algorithm—an Old Folk-song Sung to a Fast New Tune 1997 Xiao‐Li Meng
David A. van Dyk
3
+ Spectral Signatures in Backdoor Attacks 2018 Brandon Tran
Jerry Li
Aleksander Mądry
3
+ Adversarial Learning: A Critical Review and Active Learning Study 2017 David J. Miller
Xinyi Hu
Zhicong Qiu
George Kesidis
3
+ PDF Chat Dynamic Graph CNN for Learning on Point Clouds 2019 Yue Wang
Yongbin Sun
Ziwei Liu
Sanjay E. Sarma
Michael M. Bronstein
Justin Solomon
3
+ Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling 2014 Jun‐Young Chung
Çaǧlar Gülçehre
Kyunghyun Cho
Yoshua Bengio
2
+ PDF Chat Electrical resistance of N-gasket fractal networks 2007 Brighid Boyle
Kristin Cekala
David Ferrone
Neil Rifkin
Alexander Teplyaev
2
+ Soft-to-Hard Vector Quantization for End-to-End Learned Compression of Images and Neural Networks. 2017 Eirikur Agustsson
Fabian Mentzer
Michael Tschannen
Lukas Cavigelli
Radu Timofte
Luca Benini
Luc Van Gool
2
+ Pattern Recognition and Machine Learning 2007 Christopher Bishop
2
+ Parseval Networks: Improving Robustness to Adversarial Examples 2017 Moustapha CissĂŠ
Piotr Bojanowski
Édouard Grave
Yann Dauphin
Nicolas Usunier
2