Skip to main content

Showing 1–15 of 15 results for author: Abadi, M

  1. Smart Choices and the Selection Monad

    Authors: Martin Abadi, Gordon Plotkin

    Abstract: Describing systems in terms of choices and their resulting costs and rewards offers the promise of freeing algorithm designers and programmers from specifying how those choices should be made; in implementations, the choices can be realized by optimization techniques and, increasingly, by machine-learning methods. We study this approach from a programming-language perspective. We define two small… ▽ More

    Submitted 19 April, 2023; v1 submitted 17 July, 2020; originally announced July 2020.

    Journal ref: Logical Methods in Computer Science, Volume 19, Issue 2 (April 20, 2023) lmcs:8372

  2. arXiv:1911.04523  [pdf, ps, other

    cs.PL cs.LG

    A Simple Differentiable Programming Language

    Authors: Martin Abadi, Gordon D. Plotkin

    Abstract: Automatic differentiation plays a prominent role in scientific computing and in modern machine learning, often in the context of powerful programming systems. The relation of the various embodiments of automatic differentiation to the mathematical notion of derivative is not always entirely clear---discrepancies can arise, sometimes inadvertently. In order to study automatic differentiation in suc… ▽ More

    Submitted 1 February, 2020; v1 submitted 11 November, 2019; originally announced November 2019.

    Comments: In POPL2020

  3. Dynamic Control Flow in Large-Scale Machine Learning

    Authors: Yuan Yu, Martín Abadi, Paul Barham, Eugene Brevdo, Mike Burrows, Andy Davis, Jeff Dean, Sanjay Ghemawat, Tim Harley, Peter Hawkins, Michael Isard, Manjunath Kudlur, Rajat Monga, Derek Murray, Xiaoqiang Zheng

    Abstract: Many recent machine learning models rely on fine-grained dynamic control flow for training and inference. In particular, models based on recurrent neural networks and on reinforcement learning depend on recurrence relations, data-dependent conditional execution, and other features that call for dynamic control flow. These applications benefit from the ability to make rapid control-flow decisions a… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: Appeared in EuroSys 2018. 14 pages, 16 figures

    Journal ref: EuroSys 2018: Thirteenth EuroSys Conference, April 23-26, 2018, Porto, Portugal. ACM, New York, NY, USA

  4. arXiv:1712.09665  [pdf, other

    cs.CV

    Adversarial Patch

    Authors: Tom B. Brown, Dandelion Mané, Aurko Roy, Martín Abadi, Justin Gilmer

    Abstract: We present a method to create universal, robust, targeted adversarial image patches in the real world. The patches are universal because they can be used to attack any scene, robust because they work under a wide variety of transformations, and targeted because they can cause a classifier to output any target class. These adversarial patches can be printed, added to any scene, photographed, and pr… ▽ More

    Submitted 16 May, 2018; v1 submitted 27 December, 2017; originally announced December 2017.

  5. arXiv:1708.08022  [pdf, ps, other

    stat.ML cs.CR cs.LG

    On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches

    Authors: Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang

    Abstract: The recent, remarkable growth of machine learning has led to intense interest in the privacy of the data on which machine learning relies, and to new techniques for preserving privacy. However, older ideas about privacy may well remain valid and useful. This note reviews two recent works on privacy in the light of the wisdom of some of the early literature, in particular the principles distilled b… ▽ More

    Submitted 26 August, 2017; originally announced August 2017.

    Journal ref: IEEE 30th Computer Security Foundations Symposium (CSF), pages 1--6, 2017

  6. arXiv:1702.02510  [pdf, other

    q-bio.NC cs.HC

    AMIGOS: A Dataset for Affect, Personality and Mood Research on Individuals and Groups

    Authors: Juan Abdon Miranda-Correa, Mojtaba Khomami Abadi, Nicu Sebe, Ioannis Patras

    Abstract: We present AMIGOS-- A dataset for Multimodal research of affect, personality traits and mood on Individuals and GrOupS. Different to other databases, we elicited affect using both short and long videos in two social contexts, one with individual viewers and one with groups of viewers. The database allows the multimodal study of the affective responses, by means of neuro-physiological signals of in… ▽ More

    Submitted 13 April, 2017; v1 submitted 2 February, 2017; originally announced February 2017.

    Comments: 14 pages, Transaction on Affective Computing

  7. arXiv:1611.08945  [pdf, other

    cs.CL cs.LG stat.ML

    Learning a Natural Language Interface with Neural Programmer

    Authors: Arvind Neelakantan, Quoc V. Le, Martin Abadi, Andrew McCallum, Dario Amodei

    Abstract: Learning a natural language interface for database tables is a challenging task that involves deep language understanding and multi-step reasoning. The task is often approached by mapping natural language queries to logical forms or programs that provide the desired response when executed on the database. To our knowledge, this paper presents the first weakly supervised, end-to-end neural network… ▽ More

    Submitted 2 March, 2017; v1 submitted 27 November, 2016; originally announced November 2016.

    Comments: Published as a conference paper at ICLR 2017

  8. arXiv:1610.06918  [pdf, other

    cs.CR cs.LG

    Learning to Protect Communications with Adversarial Neural Cryptography

    Authors: Martín Abadi, David G. Andersen

    Abstract: We ask whether neural networks can learn to use secret keys to protect information from other neural networks. Specifically, we focus on ensuring confidentiality properties in a multiagent system, and we specify those properties in terms of an adversary. Thus, a system may consist of neural networks named Alice and Bob, and we aim to limit what a third neural network named Eve learns from eavesdro… ▽ More

    Submitted 21 October, 2016; originally announced October 2016.

    Comments: 15 pages

  9. arXiv:1610.05755  [pdf, other

    stat.ML cs.CR cs.LG

    Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data

    Authors: Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, Kunal Talwar

    Abstract: Some machine learning applications involve training data that is sensitive, such as the medical histories of patients in a clinical trial. A model may inadvertently and implicitly store some of its training data; careful analysis of the model may therefore reveal sensitive information. To address this problem, we demonstrate a generally applicable approach to providing strong privacy guarantees… ▽ More

    Submitted 3 March, 2017; v1 submitted 18 October, 2016; originally announced October 2016.

    Comments: Accepted to ICLR 17 as an oral

  10. arXiv:1609.03003  [pdf, ps, other

    cs.CR cs.LO

    The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication

    Authors: Martín Abadi, Bruno Blanchet, Cédric Fournet

    Abstract: We study the interaction of the programming construct "new", which generates statically scoped names, with communication via messages on channels. This interaction is crucial in security protocols, which are the main motivating examples for our work, it also appears in other programming-language contexts. We define the applied pi calculus, a simple, general extension of the pi calculus in which… ▽ More

    Submitted 28 July, 2017; v1 submitted 10 September, 2016; originally announced September 2016.

    Comments: 104 pages

  11. arXiv:1607.00133  [pdf, other

    stat.ML cs.CR cs.LG

    Deep Learning with Differential Privacy

    Authors: Martín Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang

    Abstract: Machine learning techniques based on neural networks are achieving remarkable results in a wide variety of domains. Often, the training of models requires large, representative datasets, which may be crowdsourced and contain sensitive information. The models should not expose private information in these datasets. Addressing this goal, we develop new algorithmic techniques for learning and a refin… ▽ More

    Submitted 24 October, 2016; v1 submitted 1 July, 2016; originally announced July 2016.

    Journal ref: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), pp. 308-318, 2016

  12. arXiv:1605.08695  [pdf, other

    cs.DC cs.AI

    TensorFlow: A system for large-scale machine learning

    Authors: Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek G. Murray, Benoit Steiner, Paul Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, Xiaoqiang Zheng

    Abstract: TensorFlow is a machine learning system that operates at large scale and in heterogeneous environments. TensorFlow uses dataflow graphs to represent computation, shared state, and the operations that mutate that state. It maps the nodes of a dataflow graph across many machines in a cluster, and within a machine across multiple computational devices, including multicore CPUs, general-purpose GPUs,… ▽ More

    Submitted 31 May, 2016; v1 submitted 27 May, 2016; originally announced May 2016.

    Comments: 18 pages, 9 figures; v2 has a spelling correction in the metadata

  13. arXiv:1603.04467  [pdf, other

    cs.DC cs.LG

    TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems

    Authors: Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mane, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah , et al. (15 additional authors not shown)

    Abstract: TensorFlow is an interface for expressing machine learning algorithms, and an implementation for executing such algorithms. A computation expressed using TensorFlow can be executed with little or no change on a wide variety of heterogeneous systems, ranging from mobile devices such as phones and tablets up to large-scale distributed systems of hundreds of machines and thousands of computational de… ▽ More

    Submitted 16 March, 2016; v1 submitted 14 March, 2016; originally announced March 2016.

    Comments: Version 2 updates only the metadata, to correct the formatting of Martín Abadi's name

  14. arXiv:1503.08877  [pdf, other

    cs.DC

    Falkirk Wheel: Rollback Recovery for Dataflow Systems

    Authors: Michael Isard, Martín Abadi

    Abstract: We present a new model for rollback recovery in distributed dataflow systems. We explain existing rollback schemes by assigning a logical time to each event such as a message delivery. If some processors fail during an execution, the system rolls back by selecting a set of logical times for each processor. The effect of events at times within the set is retained or restored from saved state, while… ▽ More

    Submitted 30 March, 2015; originally announced March 2015.

    Comments: DRAFT work in progress

  15. A Model of Cooperative Threads

    Authors: Martín Abadi, Gordon D. Plotkin

    Abstract: We develop a model of concurrent imperative programming with threads. We focus on a small imperative language with cooperative threads which execute without interruption until they terminate or explicitly yield control. We define and study a trace-based denotational semantics for this language; this semantics is fully abstract but mathematically elementary. We also give an equational theory for t… ▽ More

    Submitted 20 October, 2010; v1 submitted 13 September, 2010; originally announced September 2010.

    Comments: 39 pages, 5 figures

    ACM Class: D.1.3, F.3.2

    Journal ref: Logical Methods in Computer Science, Volume 6, Issue 4 (October 20, 2010) lmcs:700