As Large Language Models quickly become ubiquitous, it becomes critical ...
Neural networks for computer vision extract uninterpretable features des...
With the rise of Large Language Models (LLMs) and their ubiquitous deplo...
As LLMs become commonplace, machine-generated text has the potential to ...
Images generated by diffusion models like Stable Diffusion are increasin...
In an era of widespread web scraping, unlearnable dataset methods have t...
Tabular data is one of the most commonly used types of data in machine
l...
Self-supervised learning, dubbed the dark matter of intelligence, is a
p...
No free lunch theorems for supervised learning state that no learner can...
Typical diffusion models are trained to accept a particular form of
cond...
The strength of modern generative models lies in their ability to be
con...
The robustness of a deep classifier can be characterized by its margins:...
Vision transformers (ViTs) are quickly becoming the de-facto architectur...
Cutting-edge diffusion models produce images with high quality and
custo...
Deep neural networks are susceptible to shortcut learning, using simple
...
While there has been progress in developing non-vacuous generalization b...
Sharpness-Aware Minimization (SAM) has recently emerged as a robust tech...
As industrial applications are increasingly automated by machine learnin...
Face recognition systems are deployed across the world by government age...
Federated learning is particularly susceptible to model poisoning and
ba...
Despite the clear performance benefits of data augmentations, little is ...
Equivariance guarantees that a model's predictions capture key symmetrie...
Standard diffusion models involve an image transform – adding Gaussian n...
The prevalence of data scraping from social media as a means to obtain
d...
Deep learning is increasingly moving towards a transfer learning paradig...
Imperceptible poisoning attacks on entire datasets have recently been to...
As the deployment of automated face recognition (FR) systems proliferate...
We discuss methods for visualizing neural network decision boundaries an...
How do we compare between hypotheses that are entirely consistent with
o...
Machine learning systems perform well on pattern matching tasks, but the...
Federated learning (FL) has rapidly risen in popularity due to its promi...
Existing techniques for model inversion typically rely on hard-to-tune
r...
A central tenet of Federated learning (FL), which trains models without
...
Active learning (AL) algorithms aim to identify an optimal subset of dat...
Federated learning has quickly gained popularity with its promises of
in...
Much recent research has uncovered and discussed serious concerns of bia...
The adversarial attack literature contains a myriad of algorithms for
cr...
It is widely believed that the implicit regularization of stochastic gra...
Vision transformers (ViTs) have demonstrated impressive performance on a...
We describe new datasets for studying generalization from easy to hard
e...
Conventional saliency maps highlight input features to which neural netw...
The adversarial machine learning literature is largely partitioned into
...
Class-imbalanced data, in which some classes contain far more samples th...
As the curation of data for machine learning becomes increasingly automa...
Deep neural networks are powerful machines for visual pattern recognitio...
Tabular data underpins numerous high-impact applications of machine lear...
It is widely believed that natural image data exhibits low-dimensional
s...
Data poisoning and backdoor attacks manipulate training data to induce
s...
Data poisoning is a threat model in which a malicious actor tampers with...
Deep neural networks are powerful machines for visual pattern recognitio...