Skip to main content

Showing 1–49 of 49 results for author: Dvijotham

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04260  [pdf, other

    cs.LG cs.AI

    Verified Neural Compressed Sensing

    Authors: Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Alessandro De Palma, Robert Stanforth

    Abstract: We develop the first (to the best of our knowledge) provably correct neural networks for a precise computational task, with the proof of correctness generated by an automated verification algorithm without any human input. Prior work on neural network verification has focused on partial specifications that, even when satisfied, are not sufficient to ensure that a neural network never makes errors.… ▽ More

    Submitted 8 May, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

  2. arXiv:2404.16706  [pdf, other

    cs.DS cs.CC cs.CR cs.LG

    Efficient and Near-Optimal Noise Generation for Streaming Differential Privacy

    Authors: Krishnamurthy Dvijotham, H. Brendan McMahan, Krishna Pillutla, Thomas Steinke, Abhradeep Thakurta

    Abstract: In the task of differentially private (DP) continual counting, we receive a stream of increments and our goal is to output an approximate running total of these increments, without revealing too much about any specific increment. Despite its simplicity, differentially private continual counting has attracted significant attention both in theory and in practice. Existing algorithms for differential… ▽ More

    Submitted 6 May, 2024; v1 submitted 25 April, 2024; originally announced April 2024.

  3. arXiv:2404.01863  [pdf, other

    cs.LG cs.AI

    Confidence-aware Reward Optimization for Fine-tuning Text-to-Image Models

    Authors: Kyuyoung Kim, Jongheon Jeong, Minyong An, Mohammad Ghavamzadeh, Krishnamurthy Dvijotham, Jinwoo Shin, Kimin Lee

    Abstract: Fine-tuning text-to-image models with reward functions trained on human feedback data has proven effective for aligning model behavior with human intent. However, excessive optimization with such reward models, which serve as mere proxy objectives, can compromise the performance of fine-tuned models, a phenomenon known as reward overoptimization. To investigate this issue in depth, we introduce th… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: ICLR 2024

  4. arXiv:2403.06634  [pdf, other

    cs.CR

    Stealing Part of a Production Language Model

    Authors: Nicholas Carlini, Daniel Paleka, Krishnamurthy Dj Dvijotham, Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski, Milad Nasr, Arthur Conmy, Eric Wallace, David Rolnick, Florian Tramèr

    Abstract: We introduce the first model-stealing attack that extracts precise, nontrivial information from black-box production language models like OpenAI's ChatGPT or Google's PaLM-2. Specifically, our attack recovers the embedding projection layer (up to symmetries) of a transformer model, given typical API access. For under \… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

  5. arXiv:2403.05576  [pdf

    cs.HC cs.AI

    Understanding Subjectivity through the Lens of Motivational Context in Model-Generated Image Satisfaction

    Authors: Senjuti Dutta, Sherol Chen, Sunny Mak, Amnah Ahmad, Katherine Collins, Alena Butryna, Deepak Ramachandran, Krishnamurthy Dvijotham, Ellie Pavlick, Ravi Rajakumar

    Abstract: Image generation models are poised to become ubiquitous in a range of applications. These models are often fine-tuned and evaluated using human quality judgments that assume a universal standard, failing to consider the subjectivity of such tasks. To investigate how to quantify subjectivity, and the scale of its impact, we measure how assessments differ among human annotators across different use… ▽ More

    Submitted 26 February, 2024; originally announced March 2024.

  6. arXiv:2402.13531  [pdf, other

    cs.LG cs.CR

    Private Gradient Descent for Linear Regression: Tighter Error Bounds and Instance-Specific Uncertainty Estimation

    Authors: Gavin Brown, Krishnamurthy Dvijotham, Georgina Evans, Daogao Liu, Adam Smith, Abhradeep Thakurta

    Abstract: We provide an improved analysis of standard differentially private gradient descent for linear regression under the squared error loss. Under modest assumptions on the input, we characterize the distribution of the iterate at each time step. Our analysis leads to new results on the algorithm's accuracy: for a proper fixed choice of hyperparameters, the sample complexity depends only linearly on… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    Comments: 22 pages, 11 figures

  7. arXiv:2402.01344  [pdf, other

    cs.LG

    Monotone, Bi-Lipschitz, and Polyak-Lojasiewicz Networks

    Authors: Ruigang Wang, Krishnamurthy Dvijotham, Ian R. Manchester

    Abstract: This paper presents a new \emph{bi-Lipschitz} invertible neural network, the BiLipNet, which has the ability to control both its \emph{Lipschitzness} (output sensitivity to input perturbations) and \emph{inverse Lipschitzness} (input distinguishability from different outputs). The main contribution is a novel invertible residual layer with certified strong monotonicity and Lipschitzness, which we… ▽ More

    Submitted 1 May, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: Accepted to ICML 2024

  8. arXiv:2401.12032  [pdf, other

    cs.HC cs.AI

    MINT: A wrapper to make multi-modal and multi-image AI models interactive

    Authors: Jan Freyberg, Abhijit Guha Roy, Terry Spitz, Beverly Freeman, Mike Schaekermann, Patricia Strachan, Eva Schnider, Renee Wong, Dale R Webster, Alan Karthikesalingam, Yun Liu, Krishnamurthy Dvijotham, Umesh Telang

    Abstract: During the diagnostic process, doctors incorporate multimodal information including imaging and the medical history - and similarly medical AI development has increasingly become multimodal. In this paper we tackle a more subtle challenge: doctors take a targeted medical history to obtain only the most pertinent pieces of information; how do we enable AI to do the same? We develop a wrapper method… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: 15 pages, 7 figures

  9. arXiv:2312.10240  [pdf, other

    cs.CV

    Rich Human Feedback for Text-to-Image Generation

    Authors: Youwei Liang, Junfeng He, Gang Li, Peizhao Li, Arseniy Klimovskiy, Nicholas Carolan, Jiao Sun, Jordi Pont-Tuset, Sarah Young, Feng Yang, Junjie Ke, Krishnamurthy Dj Dvijotham, Katie Collins, Yiwen Luo, Yang Li, Kai J Kohlhoff, Deepak Ramachandran, Vidhya Navalpakkam

    Abstract: Recent Text-to-Image (T2I) generation models such as Stable Diffusion and Imagen have made significant progress in generating high-resolution images based on text descriptions. However, many generated images still suffer from issues such as artifacts/implausibility, misalignment with text descriptions, and low aesthetic quality. Inspired by the success of Reinforcement Learning with Human Feedback… ▽ More

    Submitted 8 April, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: CVPR'24

  10. arXiv:2312.09244  [pdf, other

    cs.LG

    Helping or Herding? Reward Model Ensembles Mitigate but do not Eliminate Reward Hacking

    Authors: Jacob Eisenstein, Chirag Nagpal, Alekh Agarwal, Ahmad Beirami, Alex D'Amour, DJ Dvijotham, Adam Fisch, Katherine Heller, Stephen Pfohl, Deepak Ramachandran, Peter Shaw, Jonathan Berant

    Abstract: Reward models play a key role in aligning language model applications towards human preferences. However, this setup creates an incentive for the language model to exploit errors in the reward model to achieve high estimated reward, a phenomenon often termed \emph{reward hacking}. A natural mitigation is to train an ensemble of reward models, aggregating over model outputs to obtain a more robust… ▽ More

    Submitted 20 December, 2023; v1 submitted 14 December, 2023; originally announced December 2023.

  11. arXiv:2310.06771  [pdf, other

    cs.LG cs.AI cs.CR math.OC

    Correlated Noise Provably Beats Independent Noise for Differentially Private Learning

    Authors: Christopher A. Choquette-Choo, Krishnamurthy Dvijotham, Krishna Pillutla, Arun Ganesh, Thomas Steinke, Abhradeep Thakurta

    Abstract: Differentially private learning algorithms inject noise into the learning process. While the most common private learning algorithm, DP-SGD, adds independent Gaussian noise in each iteration, recent work on matrix factorization mechanisms has shown empirically that introducing correlations in the noise can greatly improve their utility. We characterize the asymptotic learning utility for any choic… ▽ More

    Submitted 7 May, 2024; v1 submitted 10 October, 2023; originally announced October 2023.

    Comments: Christopher A. Choquette-Choo, Krishnamurthy Dvijotham, and Krishna Pillutla contributed equally

    Journal ref: ICLR 2024

  12. arXiv:2309.16928  [pdf, other

    cs.LG cs.AI

    Learning to Receive Help: Intervention-Aware Concept Embedding Models

    Authors: Mateo Espinosa Zarlenga, Katherine M. Collins, Krishnamurthy Dvijotham, Adrian Weller, Zohreh Shams, Mateja Jamnik

    Abstract: Concept Bottleneck Models (CBMs) tackle the opacity of neural architectures by constructing and explaining their predictions using a set of high-level concepts. A special property of these models is that they permit concept interventions, wherein users can correct mispredicted concepts and thus improve the model's performance. Recent work, however, has shown that intervention efficacy can be highl… ▽ More

    Submitted 25 October, 2023; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: Accepted as a spotlight at the Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS 2023)

  13. arXiv:2306.08424  [pdf, other

    cs.HC cs.AI cs.LG

    Selective Concept Models: Permitting Stakeholder Customisation at Test-Time

    Authors: Matthew Barker, Katherine M. Collins, Krishnamurthy Dvijotham, Adrian Weller, Umang Bhatt

    Abstract: Concept-based models perform prediction using a set of concepts that are interpretable to stakeholders. However, such models often involve a fixed, large number of concepts, which may place a substantial cognitive load on stakeholders. We propose Selective COncept Models (SCOMs) which make predictions using only a subset of concepts and can be customised by stakeholders at test-time according to t… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

  14. arXiv:2306.04431  [pdf, other

    cs.LG

    Faithful Knowledge Distillation

    Authors: Tom A. Lamb, Rudy Brunel, Krishnamurthy DJ Dvijotham, M. Pawan Kumar, Philip H. S. Torr, Francisco Eiras

    Abstract: Knowledge distillation (KD) has received much attention due to its success in compressing networks to allow for their deployment in resource-constrained systems. While the problem of adversarial robustness has been studied before in the KD setting, previous works overlook what we term the relative calibration of the student network with respect to its teacher in terms of soft confidences. In parti… ▽ More

    Submitted 11 August, 2023; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: 7pgs (main content), 4 figures

  15. arXiv:2305.18393  [pdf, other

    cs.LG cs.CR

    Training Private Models That Know What They Don't Know

    Authors: Stephan Rabanser, Anvith Thudi, Abhradeep Thakurta, Krishnamurthy Dvijotham, Nicolas Papernot

    Abstract: Training reliable deep learning models which avoid making overconfident but incorrect predictions is a longstanding challenge. This challenge is further exacerbated when learning has to be differentially private: protection provided to sensitive data comes at the price of injecting additional randomness into the learning process. In this work, we conduct a thorough empirical investigation of selec… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

  16. arXiv:2305.13991  [pdf, other

    cs.LG cs.CR stat.ML

    Expressive Losses for Verified Robustness via Convex Combinations

    Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio

    Abstract: In order to train networks for verified adversarial robustness, it is common to over-approximate the worst-case loss over perturbation regions, resulting in networks that attain verifiability at the expense of standard performance. As shown in recent work, better trade-offs between accuracy and robustness can be obtained by carefully coupling adversarial training with over-approximations. We hypot… ▽ More

    Submitted 18 March, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

    Comments: ICLR 2024

  17. arXiv:2305.10157  [pdf, other

    cs.LG math-ph

    Provably Correct Physics-Informed Neural Networks

    Authors: Francisco Eiras, Adel Bibi, Rudy Bunel, Krishnamurthy Dj Dvijotham, Philip Torr, M. Pawan Kumar

    Abstract: Recent work provides promising evidence that Physics-informed neural networks (PINN) can efficiently solve partial differential equations (PDE). However, previous works have failed to provide guarantees on the worst-case residual error of a PINN across the spatio-temporal domain - a measure akin to the tolerance of numerical solvers - focusing instead on point-wise comparisons between their soluti… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  18. arXiv:2303.13588  [pdf, ps, other

    cs.AI cs.LG cs.SC

    Efficient Symbolic Reasoning for Neural-Network Verification

    Authors: Zi Wang, Somesh Jha, Krishnamurthy, Dvijotham

    Abstract: The neural network has become an integral part of modern software systems. However, they still suffer from various problems, in particular, vulnerability to adversarial attacks. In this work, we present a novel program reasoning framework for neural-network verification, which we refer to as symbolic reasoning. The key components of our framework are the use of the symbolic domain and the quadrati… ▽ More

    Submitted 23 March, 2023; originally announced March 2023.

  19. arXiv:2303.12872  [pdf, other

    cs.HC cs.AI cs.LG

    Human Uncertainty in Concept-Based AI Systems

    Authors: Katherine M. Collins, Matthew Barker, Mateo Espinosa Zarlenga, Naveen Raman, Umang Bhatt, Mateja Jamnik, Ilia Sucholutsky, Adrian Weller, Krishnamurthy Dvijotham

    Abstract: Placing a human in the loop may abate the risks of deploying AI systems in safety-critical settings (e.g., a clinician working with a medical AI system). However, mitigating risks arising from human error and uncertainty within such human-AI interactions is an important and understudied issue. In this work, we study human uncertainty in the context of concept-based models, a family of AI systems t… ▽ More

    Submitted 22 March, 2023; originally announced March 2023.

  20. arXiv:2302.05807  [pdf, other

    cs.LG stat.ML

    Pushing the Accuracy-Group Robustness Frontier with Introspective Self-play

    Authors: Jeremiah Zhe Liu, Krishnamurthy Dj Dvijotham, Jihyeon Lee, Quan Yuan, Martin Strobel, Balaji Lakshminarayanan, Deepak Ramachandran

    Abstract: Standard empirical risk minimization (ERM) training can produce deep neural network (DNN) models that are accurate on average but under-perform in under-represented population subgroups, especially when there are imbalanced group distributions in the long-tailed training data. Therefore, approaches that improve the accuracy-group robustness trade-off frontier of a DNN model (i.e. improving worst-g… ▽ More

    Submitted 11 February, 2023; originally announced February 2023.

    Comments: Accepted to ICLR 2023. Included additional contribution from Martin Strobel

  21. arXiv:2302.01404  [pdf, other

    cs.LG cs.AI eess.SY

    Provably Bounding Neural Network Preimages

    Authors: Suhas Kotha, Christopher Brix, Zico Kolter, Krishnamurthy Dvijotham, Huan Zhang

    Abstract: Most work on the formal verification of neural networks has focused on bounding the set of outputs that correspond to a given set of inputs (for example, bounded perturbations of a nominal input). However, many use cases of neural network verification require solving the inverse problem, or over-approximating the set of inputs that lead to certain outputs. We present the INVPROP algorithm for veri… ▽ More

    Submitted 17 March, 2024; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: NeurIPS 2023 (Spotlight)

  22. arXiv:2212.07430  [pdf, other

    cs.LG cs.AI

    Interactive Concept Bottleneck Models

    Authors: Kushal Chauhan, Rishabh Tiwari, Jan Freyberg, Pradeep Shenoy, Krishnamurthy Dvijotham

    Abstract: Concept bottleneck models (CBMs) are interpretable neural networks that first predict labels for human-interpretable concepts relevant to the prediction task, and then predict the final label based on the concept label predictions. We extend CBMs to interactive prediction settings where the model can query a human collaborator for the label to some concepts. We develop an interaction policy that,… ▽ More

    Submitted 27 April, 2023; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: Accepted at AAAI 2023

  23. arXiv:2206.14772  [pdf, other

    cs.LG cs.CR stat.ML

    IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound

    Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth

    Abstract: Recent works have tried to increase the verifiability of adversarially trained networks by running the attacks over domains larger than the original perturbations and adding various regularization terms to the objective. However, these algorithms either underperform or require complex and expensive stage-wise training procedures, hindering their practical applicability. We present IBP-R, a novel v… ▽ More

    Submitted 31 May, 2023; v1 submitted 29 June, 2022; originally announced June 2022.

    Comments: ICML 2022 Workshop on Formal Verification of Machine Learning

  24. arXiv:2206.10550  [pdf, other

    cs.LG cs.CR

    (Certified!!) Adversarial Robustness for Free!

    Authors: Nicholas Carlini, Florian Tramer, Krishnamurthy Dj Dvijotham, Leslie Rice, Mingjie Sun, J. Zico Kolter

    Abstract: In this paper we show how to achieve state-of-the-art certified adversarial robustness to 2-norm bounded perturbations by relying exclusively on off-the-shelf pretrained models. To do so, we instantiate the denoised smoothing approach of Salman et al. 2020 by combining a pretrained denoising diffusion probabilistic model and a standard high-accuracy classifier. This allows us to certify 71% accura… ▽ More

    Submitted 6 March, 2023; v1 submitted 21 June, 2022; originally announced June 2022.

  25. arXiv:2112.06751  [pdf, other

    cs.AI cs.HC

    Role of Human-AI Interaction in Selective Prediction

    Authors: Elizabeth Bondi, Raphael Koster, Hannah Sheahan, Martin Chadwick, Yoram Bachrach, Taylan Cemgil, Ulrich Paquet, Krishnamurthy Dvijotham

    Abstract: Recent work has shown the potential benefit of selective prediction systems that can learn to defer to a human when the predictions of the AI are unreliable, particularly to improve the reliability of AI systems in high-stakes applications like healthcare or conservation. However, most prior work assumes that human behavior remains unchanged when they solve a prediction task as part of a human-AI… ▽ More

    Submitted 16 May, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

    Comments: Published in AAAI 2022; added link to data, small formatting corrections for camera-ready, including small changes to Fig 6-7 that do not change conclusions

  26. arXiv:2110.11328  [pdf, other

    cs.LG cs.CV

    A Fine-Grained Analysis on Distribution Shift

    Authors: Olivia Wiles, Sven Gowal, Florian Stimberg, Sylvestre Alvise-Rebuffi, Ira Ktena, Krishnamurthy Dvijotham, Taylan Cemgil

    Abstract: Robustness to distribution shifts is critical for deploying machine learning models in the real world. Despite this necessity, there has been little work in defining the underlying mechanisms that cause these shifts and evaluating the robustness of algorithms across multiple, different distribution shifts. To this end, we introduce a framework that enables fine-grained analysis of various distribu… ▽ More

    Submitted 25 November, 2021; v1 submitted 21 October, 2021; originally announced October 2021.

  27. arXiv:2110.09192  [pdf, other

    cs.LG cs.CV stat.ME stat.ML

    Learning Optimal Conformal Classifiers

    Authors: David Stutz, Krishnamurthy, Dvijotham, Ali Taylan Cemgil, Arnaud Doucet

    Abstract: Modern deep learning based classifiers show very high accuracy on test data but this does not provide sufficient guarantees for safe deployment, especially in high-stake AI applications such as medical diagnosis. Usually, predictions are obtained without a reliable uncertainty estimate or a formal guarantee. Conformal prediction (CP) addresses these issues by using the classifier's predictions, e.… ▽ More

    Submitted 6 May, 2022; v1 submitted 18 October, 2021; originally announced October 2021.

    Comments: ICLR 2022

  28. arXiv:2104.06718  [pdf, other

    cs.LG cs.LO stat.ML

    Improved Branch and Bound for Neural Network Verification via Lagrangian Decomposition

    Authors: Alessandro De Palma, Rudy Bunel, Alban Desmaison, Krishnamurthy Dvijotham, Pushmeet Kohli, Philip H. S. Torr, M. Pawan Kumar

    Abstract: We improve the scalability of Branch and Bound (BaB) algorithms for formally proving input-output properties of neural networks. First, we propose novel bounding algorithms based on Lagrangian Decomposition. Previous works have used off-the-shelf solvers to solve relaxations at each node of the BaB tree, or constructed weaker relaxations that can be solved efficiently, but lead to unnecessarily we… ▽ More

    Submitted 14 April, 2021; originally announced April 2021.

    Comments: Submitted for review to JMLR. This is an extended version of our paper in the UAI-20 conference (arXiv:2002.10410)

  29. arXiv:2102.09479  [pdf, ps, other

    cs.LG

    Make Sure You're Unsure: A Framework for Verifying Probabilistic Specifications

    Authors: Leonard Berrada, Sumanth Dathathri, Krishnamurthy Dvijotham, Robert Stanforth, Rudy Bunel, Jonathan Uesato, Sven Gowal, M. Pawan Kumar

    Abstract: Most real world applications require dealing with stochasticity like sensor noise or predictive uncertainty, where formal specifications of desired behavior are inherently probabilistic. Despite the promise of formal verification in ensuring the reliability of neural networks, progress in the direction of probabilistic specifications has been limited. In this direction, we first introduce a genera… ▽ More

    Submitted 17 November, 2021; v1 submitted 18 February, 2021; originally announced February 2021.

    Comments: NeurIPS 2021 Camera Ready

  30. arXiv:2012.03715  [pdf, other

    cs.LG stat.ML

    Autoencoding Variational Autoencoder

    Authors: A. Taylan Cemgil, Sumedh Ghaisas, Krishnamurthy Dvijotham, Sven Gowal, Pushmeet Kohli

    Abstract: Does a Variational AutoEncoder (VAE) consistently encode typical samples generated from its decoder? This paper shows that the perhaps surprising answer to this question is `No'; a (nominally trained) VAE does not necessarily amortize inference for typical samples that it is capable of generating. We study the implications of this behaviour on the learned representations and also the consequences… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

    Comments: Neurips 2020

  31. arXiv:2011.07355  [pdf, other

    cs.LG cs.CR

    Towards transformation-resilient provenance detection of digital media

    Authors: Jamie Hayes, Krishnamurthy, Dvijotham, Yutian Chen, Sander Dieleman, Pushmeet Kohli, Norman Casagrande

    Abstract: Advancements in deep generative models have made it possible to synthesize images, videos and audio signals that are difficult to distinguish from natural signals, creating opportunities for potential abuse of these capabilities. This motivates the problem of tracking the provenance of signals, i.e., being able to determine the original source of a signal. Watermarking the signal at the time of si… ▽ More

    Submitted 14 November, 2020; originally announced November 2020.

  32. arXiv:2010.14322  [pdf, other

    math.OC cs.AI cs.LG cs.NE

    An efficient nonconvex reformulation of stagewise convex optimization problems

    Authors: Rudy Bunel, Oliver Hinder, Srinadh Bhojanapalli, Krishnamurthy, Dvijotham

    Abstract: Convex optimization problems with staged structure appear in several contexts, including optimal control, verification of deep neural networks, and isotonic regression. Off-the-shelf solvers can solve these problems but may scale poorly. We develop a nonconvex reformulation designed to exploit this staged structure. Our reformulation has only simple bound constraints, enabling solution via project… ▽ More

    Submitted 27 October, 2020; originally announced October 2020.

    Comments: First and second authors made equal contribution. To appear in Neurips 2020

  33. arXiv:2010.11645  [pdf, other

    cs.LG cs.AI

    Enabling certification of verification-agnostic networks via memory-efficient semidefinite programming

    Authors: Sumanth Dathathri, Krishnamurthy Dvijotham, Alexey Kurakin, Aditi Raghunathan, Jonathan Uesato, Rudy Bunel, Shreya Shankar, Jacob Steinhardt, Ian Goodfellow, Percy Liang, Pushmeet Kohli

    Abstract: Convex relaxations have emerged as a promising approach for verifying desirable properties of neural networks like robustness to adversarial perturbations. Widely used Linear Programming (LP) relaxations only work well when networks are trained to facilitate verification. This precludes applications that involve verification-agnostic networks, i.e., networks not specially trained for verification.… ▽ More

    Submitted 3 November, 2020; v1 submitted 22 October, 2020; originally announced October 2020.

  34. arXiv:2002.10410  [pdf, other

    cs.LG stat.ML

    Lagrangian Decomposition for Neural Network Verification

    Authors: Rudy Bunel, Alessandro De Palma, Alban Desmaison, Krishnamurthy Dvijotham, Pushmeet Kohli, Philip H. S. Torr, M. Pawan Kumar

    Abstract: A fundamental component of neural network verification is the computation of bounds on the values their outputs can take. Previous methods have either used off-the-shelf solvers, discarding the problem structure, or relaxed the problem even further, making the bounds unnecessarily loose. We propose a novel approach based on Lagrangian Decomposition. Our formulation admits an efficient supergradien… ▽ More

    Submitted 17 June, 2020; v1 submitted 24 February, 2020; originally announced February 2020.

    Comments: UAI 2020 conference paper

  35. arXiv:1912.03192  [pdf, other

    cs.LG cs.CV stat.ML

    Achieving Robustness in the Wild via Adversarial Mixing with Disentangled Representations

    Authors: Sven Gowal, Chongli Qin, Po-Sen Huang, Taylan Cemgil, Krishnamurthy Dvijotham, Timothy Mann, Pushmeet Kohli

    Abstract: Recent research has made the surprising finding that state-of-the-art deep learning models sometimes fail to generalize to small variations of the input. Adversarial training has been shown to be an effective approach to overcome this problem. However, its application has been limited to enforcing invariance to analytically defined transformations like $\ell_p$-norm bounded perturbations. Such per… ▽ More

    Submitted 25 March, 2020; v1 submitted 6 December, 2019; originally announced December 2019.

    Comments: Accepted at CVPR 2020

  36. arXiv:1909.01492  [pdf, other

    cs.CL cs.CR cs.LG stat.ML

    Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation

    Authors: Po-Sen Huang, Robert Stanforth, Johannes Welbl, Chris Dyer, Dani Yogatama, Sven Gowal, Krishnamurthy Dvijotham, Pushmeet Kohli

    Abstract: Neural networks are part of many contemporary NLP systems, yet their empirical successes come at the price of vulnerability to adversarial attacks. Previous work has used adversarial training and data augmentation to partially mitigate such brittleness, but these are unlikely to find worst-case adversaries due to the complexity of the search space arising from discrete text perturbations. In this… ▽ More

    Submitted 20 December, 2019; v1 submitted 3 September, 2019; originally announced September 2019.

    Comments: EMNLP 2019

  37. arXiv:1907.02610  [pdf, other

    stat.ML cs.LG

    Adversarial Robustness through Local Linearization

    Authors: Chongli Qin, James Martens, Sven Gowal, Dilip Krishnan, Krishnamurthy Dvijotham, Alhussein Fawzi, Soham De, Robert Stanforth, Pushmeet Kohli

    Abstract: Adversarial training is an effective methodology for training deep neural networks that are robust against adversarial, norm-bounded perturbations. However, the computational cost of adversarial training grows prohibitively as the size of the model and number of input dimensions increase. Further, training against less expensive and therefore weaker adversaries produces models that are robust agai… ▽ More

    Submitted 10 October, 2019; v1 submitted 4 July, 2019; originally announced July 2019.

  38. arXiv:1904.12004  [pdf, other

    cs.LG cs.AI stat.ML

    Knowing When to Stop: Evaluation and Verification of Conformity to Output-size Specifications

    Authors: Chenglong Wang, Rudy Bunel, Krishnamurthy Dvijotham, Po-Sen Huang, Edward Grefenstette, Pushmeet Kohli

    Abstract: Models such as Sequence-to-Sequence and Image-to-Sequence are widely used in real world applications. While the ability of these neural architectures to produce variable-length outputs makes them extremely effective for problems like Machine Translation and Image Captioning, it also leaves them vulnerable to failures of the form where the model produces outputs of undesirable length. This behavior… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

  39. arXiv:1902.09592  [pdf, other

    cs.LG stat.ML

    Verification of Non-Linear Specifications for Neural Networks

    Authors: Chongli Qin, Krishnamurthy, Dvijotham, Brendan O'Donoghue, Rudy Bunel, Robert Stanforth, Sven Gowal, Jonathan Uesato, Grzegorz Swirszcz, Pushmeet Kohli

    Abstract: Prior work on neural network verification has focused on specifications that are linear functions of the output of the network, e.g., invariance of the classifier output under adversarial perturbations of the input. In this paper, we extend verification algorithms to be able to certify richer properties of neural networks. To do this we introduce the class of convex-relaxable specifications, which… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: ICLR conference paper

  40. arXiv:1812.02795  [pdf, other

    cs.LG stat.ML

    Verification of deep probabilistic models

    Authors: Krishnamurthy Dvijotham, Marta Garnelo, Alhussein Fawzi, Pushmeet Kohli

    Abstract: Probabilistic models are a critical part of the modern deep learning toolbox - ranging from generative models (VAEs, GANs), sequence to sequence models used in machine translation and speech processing to models over functional spaces (conditional neural processes, neural processes). Given the size and complexity of these models, safely deploying them in applications requires the development of to… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: Accepted to NeurIPS 2018 Workshop on Security in Machine Learning

  41. arXiv:1812.01647  [pdf, other

    cs.LG cs.CR stat.ML

    Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures

    Authors: Jonathan Uesato, Ananya Kumar, Csaba Szepesvari, Tom Erez, Avraham Ruderman, Keith Anderson, Krishmamurthy, Dvijotham, Nicolas Heess, Pushmeet Kohli

    Abstract: This paper addresses the problem of evaluating learning systems in safety critical domains such as autonomous driving, where failures can have catastrophic consequences. We focus on two problems: searching for scenarios when learned agents fail and assessing their probability of failure. The standard method for agent evaluation in reinforcement learning, Vanilla Monte Carlo, can miss failures enti… ▽ More

    Submitted 4 December, 2018; originally announced December 2018.

  42. arXiv:1810.12715  [pdf, other

    cs.LG cs.CR stat.ML

    On the Effectiveness of Interval Bound Propagation for Training Verifiably Robust Models

    Authors: Sven Gowal, Krishnamurthy Dvijotham, Robert Stanforth, Rudy Bunel, Chongli Qin, Jonathan Uesato, Relja Arandjelovic, Timothy Mann, Pushmeet Kohli

    Abstract: Recent work has shown that it is possible to train deep neural networks that are provably robust to norm-bounded adversarial perturbations. Most of these methods are based on minimizing an upper bound on the worst-case loss over all possible adversarial perturbations. While these techniques show promise, they often result in difficult optimization procedures that remain hard to scale to larger net… ▽ More

    Submitted 29 August, 2019; v1 submitted 30 October, 2018; originally announced October 2018.

    Comments: [v2] Best paper at NeurIPS SECML 2018 Workshop [v4] Accepted at ICCV 2019 under the title "Scalable Verified Training for Provably Robust Image Classification"

  43. arXiv:1805.10265  [pdf, other

    cs.LG stat.ML

    Training verified learners with learned verifiers

    Authors: Krishnamurthy Dvijotham, Sven Gowal, Robert Stanforth, Relja Arandjelovic, Brendan O'Donoghue, Jonathan Uesato, Pushmeet Kohli

    Abstract: This paper proposes a new algorithmic framework, predictor-verifier training, to train neural networks that are verifiable, i.e., networks that provably satisfy some desired input-output properties. The key idea is to simultaneously train two networks: a predictor network that performs the task at hand,e.g., predicting labels given inputs, and a verifier network that computes a bound on how well t… ▽ More

    Submitted 29 May, 2018; v1 submitted 25 May, 2018; originally announced May 2018.

  44. arXiv:1803.06567  [pdf, other

    cs.LG stat.ML

    A Dual Approach to Scalable Verification of Deep Networks

    Authors: Krishnamurthy, Dvijotham, Robert Stanforth, Sven Gowal, Timothy Mann, Pushmeet Kohli

    Abstract: This paper addresses the problem of formally verifying desirable properties of neural networks, i.e., obtaining provable guarantees that neural networks satisfy specifications relating their inputs and outputs (robustness to bounded norm adversarial perturbations, for example). Most previous work on this topic was limited in its applicability by the size of the network, network architecture and th… ▽ More

    Submitted 3 August, 2018; v1 submitted 17 March, 2018; originally announced March 2018.

  45. arXiv:1801.08757  [pdf, other

    cs.AI

    Safe Exploration in Continuous Action Spaces

    Authors: Gal Dalal, Krishnamurthy Dvijotham, Matej Vecerik, Todd Hester, Cosmin Paduraru, Yuval Tassa

    Abstract: We address the problem of deploying a reinforcement learning (RL) agent on a physical system such as a datacenter cooling unit or robot, where critical constraints must never be violated. We show how to exploit the typically smooth dynamics of these systems and enable RL algorithms to never violate constraints during learning. Our technique is to directly add to the policy a safety layer that anal… ▽ More

    Submitted 26 January, 2018; originally announced January 2018.

  46. arXiv:1606.06512  [pdf, other

    eess.SY cs.AI cs.CE math.OC physics.soc-ph

    Graphical Models for Optimal Power Flow

    Authors: Krishnamurthy Dvijotham, Pascal Van Hentenryck, Michael Chertkov, Sidhant Misra, Marc Vuffray

    Abstract: Optimal power flow (OPF) is the central optimization problem in electric power grids. Although solved routinely in the course of power grid operations, it is known to be strongly NP-hard in general, and weakly NP-hard over tree networks. In this paper, we formulate the optimal power flow problem over tree networks as an inference problem over a tree-structured graphical model where the nodal varia… ▽ More

    Submitted 21 June, 2016; originally announced June 2016.

    Comments: To appear in Proceedings of the 22nd International Conference on Principles and Practice of Constraint Programming (CP 2016(

  47. arXiv:1606.06510  [pdf, other

    cs.GT math.OC physics.soc-ph

    Opportunities for Price Manipulation by Aggregators in Electricity Markets

    Authors: Navid Azizan Ruhi, Krishnamurthy Dvijotham, Niangjun Chen, Adam Wierman

    Abstract: Aggregators are playing an increasingly crucial role in the integration of renewable generation in power systems. However, the intermittent nature of renewable generation makes market interactions of aggregators difficult to monitor and regulate, raising concerns about potential market manipulation by aggregators. In this paper, we study this issue by quantifying the profit an aggregator can obtai… ▽ More

    Submitted 21 June, 2016; originally announced June 2016.

  48. arXiv:1605.09012  [pdf, other

    cs.GT

    Market Dynamics of Best-Response with Lookahead

    Authors: Krishnamurthy Dvijotham, Yuval Rabani, Leonard J. Schulman

    Abstract: One attractive approach to market dynamics is the level $k$ model in which a level $0$ player adopts a very simple response to current conditions, a level $1$ player best-responds to a model in which others take level $0$ actions, and so forth. (This is analogous to $k$-ply exploration of game trees in AI, and to receding-horizon control in control theory.) If players have deterministic mental mod… ▽ More

    Submitted 29 May, 2016; originally announced May 2016.

  49. arXiv:1406.0554  [pdf, other

    eess.SY cs.LG math.OC

    Universal Convexification via Risk-Aversion

    Authors: Krishnamurthy Dvijotham, Maryam Fazel, Emanuel Todorov

    Abstract: We develop a framework for convexifying a fairly general class of optimization problems. Under additional assumptions, we analyze the suboptimality of the solution to the convexified problem relative to the original nonconvex problem and prove additive approximation guarantees. We then develop algorithms based on stochastic gradient methods to solve the resulting optimization problems and show bou… ▽ More

    Submitted 2 June, 2014; originally announced June 2014.