Goto

Collaborating Authors


A Sublinear-Time Spectral Clustering Oracle with Improved Preprocessing Time

Neural Information Processing Systems

We address the problem of designing a sublinear-time spectral clustering oracle for graphs that exhibit strong clusterability. Such graphs contain k latent clusters, each characterized by a large inner conductance (at least ฯ†) and a small outer conductance (at most ฮต). Our aim is to preprocess the graph to enable clustering membership queries, with the key requirement that both preprocessing and query answering should be performed in sublinear time, and the resulting partition should be consistent with a k-partition that is close to the ground-truth clustering. Previous oracles have relied on either a poly(k) log n gap between inner and outer conductances or exponential (in k/ฮต) preprocessing time.


Spiking PointNet: Spiking Neural Networks for Point Clouds

Neural Information Processing Systems

Recently, Spiking Neural Networks (SNNs), enjoying extreme energy efficiency, have drawn much research attention on 2D visual recognition and shown gradually increasing application potential. However, it still remains underexplored whether SNNs can be generalized to 3D recognition.



BadTrack: A Poison-Only Backdoor Attack on Visual Object Tracking Yiwei Chen

Neural Information Processing Systems

Visual object tracking (VOT) is one of the most fundamental tasks in computer vision community. State-of-the-art VOT trackers extract positive and negative examples that are used to guide the tracker to distinguish the object from the background. In this paper, we show that this characteristic can be exploited to introduce new threats and hence propose a simple yet effective poison-only backdoor attack. To be specific, we poison a small part of the training data by attaching a predefined trigger pattern to the background region of each video frame, so that the trigger appears almost exclusively in the extracted negative examples. To the best of our knowledge, this is the first work that reveals the threat of poisononly backdoor attack on VOT trackers. We experimentally show that our backdoor attack can significantly degrade the performance of both two-stream Siamese and one-stream Transformer trackers on the poisoned data while gaining comparable performance with the benign trackers on the clean data.


Appendix

Neural Information Processing Systems

Despite initial evidence that explanations might be useful for detecting that a model is reliant on spurious signals [Lapuschkin et al., 2019, Rieger et al., 2020], a different line of work directly counters this evidence. Zimmermann et al. [2021] showed that feature visualizations [Olah et al., 2017] are not more effective than dataset examples at improving a human's understanding of the features that highly activate a DNN's intermediate neuron. Increasing evidence demonstrates that current post hoc explanation approaches might be ineffective for model debugging in practice [Chen et al., 2021, Alqaraawi et al., 2020, Ghassemi et al., 2021, Balagopalan et al., 2022, Poursabzi-Sangdeh et al., 2018, Bolukbasi et al., 2021]. In a promising demonstration, Lapuschkin et al. [2019] apply a clustering procedure to the LRP saliency masks derived from a trained model. In the application, the clusters that emerge are able to separate groups of inputs where, presumably, the model relies on different features for its output decision. This work differs from that in a key way: Lapuschkin et al. [2019] demonstration is to seek understanding of the model behavior and not to perform slice discovery. There is no reason why a low performing cluster should emerge from such clustering procedure. Schioppa et al. [2022] address this problem by forming a low-rank approximation of H They choose D to be around 50 in their experiments.



Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly Qizhang Li1,2, Hao Chen

Neural Information Processing Systems

The adversarial vulnerability of deep neural networks (DNNs) has drawn great attention due to the security risk of applying these models in real-world applications. Based on transferability of adversarial examples, an increasing number of transfer-based methods have been developed to fool black-box DNN models whose architecture and parameters are inaccessible. Although tremendous effort has been exerted, there still lacks a standardized benchmark that could be taken advantage of to compare these methods systematically, fairly, and practically. Our investigation shows that the evaluation of some methods needs to be more reasonable and more thorough to verify their effectiveness, to avoid, for example, unfair comparison and insufficient consideration of possible substitute/victim models. Therefore, we establish a transfer-based attack benchmark (TA-Bench) which implements 30+ methods. In this paper, we evaluate and compare them comprehensively on 25 popular substitute/victim models on ImageNet. New insights about the effectiveness of these methods are gained and guidelines for future evaluations are provided.


7 Appendix

Neural Information Processing Systems

Spacefaring civilization silicon-based lifeforms Utopian biophilic eco mansion design in a magical A crowd of people coloured and light in a megastructures built into fractal mineralized enchanted dream lush pine forest Trend on theater, christopher balaskas, atey ghailan, shapes, Menger sponge Sierpinski gasket Artstation, Altered Carbon, waterfalls, streams, mirror rooms, dynamic figure studies, koch snowflake Mandelbulb, key visual by pools of golden glowing bioluminescent water, misty, light cyan.


RAPHAEL: Text-to-Image Generation via Large Mixtureof Diffusion Paths

Neural Information Processing Systems

Text-to-image generation has recently witnessed remarkable achievements. We introduce a text-conditional image diffusion model, termed RAPHAEL, to generate highly artistic images, which accurately portray the text prompts, encompassing multiple nouns, adjectives, and verbs. This is achieved by stacking tens of mixtureof-experts (MoEs) layers, i.e., space-MoE and time-MoE layers, enabling billions of diffusion paths (routes) from the network input to the output. Each path intuitively functions as a "painter" for depicting a particular textual concept onto a specified image region at a diffusion timestep. Comprehensive experiments reveal that RAPHAEL outperforms recent cutting-edge models, such as Stable Diffusion, ERNIE-ViLG 2.0, DeepFloyd, and DALL-E 2, in terms of both image quality and aesthetic appeal. Firstly, RAPHAEL exhibits superior performance in switching images across diverse styles, such as Japanese comics, realism, cyberpunk, and ink illustration. Secondly, a single model with three billion parameters, trained on 1, 000 A100 GPUs for two months, achieves a state-of-the-art zero-shot FID score of 6.61 on the COCO dataset.