Skip to main content

Showing 1–14 of 14 results for author: Yeom, S

  1. arXiv:2312.06272  [pdf, other

    cs.CV

    U-MixFormer: UNet-like Transformer with Mix-Attention for Efficient Semantic Segmentation

    Authors: Seul-Ki Yeom, Julian von Klitzing

    Abstract: Semantic segmentation has witnessed remarkable advancements with the adaptation of the Transformer architecture. Parallel to the strides made by the Transformer, CNN-based U-Net has seen significant progress, especially in high-resolution medical imaging and remote sensing. This dual success inspired us to merge the strengths of both, leading to the inception of a U-Net-based vision transformer de… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    Comments: 8 Pages, 6 Tables, 6 Figures

  2. arXiv:2209.03620  [pdf, other

    cs.LG cs.CR cs.CY

    Black-Box Audits for Group Distribution Shifts

    Authors: Marc Juarez, Samuel Yeom, Matt Fredrikson

    Abstract: When a model informs decisions about people, distribution shifts can create undue disparities. However, it is hard for external entities to check for distribution shift, as the model and its training set are often proprietary. In this paper, we introduce and study a black-box auditing method to detect cases of distribution shift that lead to a performance disparity of the model across demographic… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

  3. arXiv:2202.01891  [pdf, other

    cs.LG

    Weighted Isolation and Random Cut Forest Algorithms for Anomaly Detection

    Authors: Sijin Yeom, Jae-Hun Jung

    Abstract: Random cut forest (RCF) algorithms have been developed for anomaly detection, particularly in time series data. The RCF algorithm is an improved version of the isolation forest (IF) algorithm. Unlike the IF algorithm, the RCF algorithm can determine whether real-time input contains an anomaly by inserting the input into the constructed tree network. Various RCF algorithms, including Robust RCF (RR… ▽ More

    Submitted 8 January, 2024; v1 submitted 1 February, 2022; originally announced February 2022.

    Comments: 45 pages, 28 figures

  4. arXiv:2111.09635  [pdf, other

    cs.CV

    Automatic Neural Network Pruning that Efficiently Preserves the Model Accuracy

    Authors: Thibault Castells, Seul-Ki Yeom

    Abstract: Neural networks performance has been significantly improved in the last few years, at the cost of an increasing number of floating point operations per second (FLOPs). However, more FLOPs can be an issue when computational resources are limited. As an attempt to solve this problem, pruning filters is a common solution, but most existing pruning methods do not preserve the model accuracy efficientl… ▽ More

    Submitted 7 December, 2022; v1 submitted 18 November, 2021; originally announced November 2021.

    Comments: 11 pages, 6 figures, 5 tables, accepted in AAAI2023 Workshop (Practical AI)

  5. arXiv:2103.10858  [pdf, other

    cs.CV cs.LG

    Toward Compact Deep Neural Networks via Energy-Aware Pruning

    Authors: Seul-Ki Yeom, Kyung-Hwan Shim, Jee-Hyun Hwang

    Abstract: Despite the remarkable performance, modern deep neural networks are inevitably accompanied by a significant amount of computational cost for learning and deployment, which may be incompatible with their usage on edge devices. Recent efforts to reduce these overheads involve pruning and decomposing the parameters of various layers without performance deterioration. Inspired by several decomposition… ▽ More

    Submitted 10 March, 2022; v1 submitted 19 March, 2021; originally announced March 2021.

    Comments: 10 pages, 5 figures, 3 tables

  6. arXiv:2102.06884  [pdf

    cs.CR cs.AI

    GPSPiChain-Blockchain based Self-Contained Family Security System in Smart Home

    Authors: Ali Raza, Lachlan Hardy, Erin Roehrer, Soonja Yeom, Byeong ho Kang

    Abstract: With advancements in technology, personal computing devices are better adapted for and further integrated into people's lives and homes. The integration of technology into society also results in an increasing desire to control who and what has access to sensitive information, especially for vulnerable people including children and the elderly. With blockchain coming in to the picture as a technol… ▽ More

    Submitted 13 February, 2021; originally announced February 2021.

    Comments: 15 pages, 6 figures, accepted in The 4th International Workshop on Smart Simulation and Modelling for Complex Systems, IJCAI2019

    Report number: SSMCS2019-13

  7. arXiv:2002.07738  [pdf, other

    cs.LG stat.ML

    Individual Fairness Revisited: Transferring Techniques from Adversarial Robustness

    Authors: Samuel Yeom, Matt Fredrikson

    Abstract: We turn the definition of individual fairness on its head---rather than ascertaining the fairness of a model given a predetermined metric, we find a metric for a given model that satisfies individual fairness. This can facilitate the discussion on the fairness of a model, addressing the issue that it may be difficult to specify a priori a suitable metric. Our contributions are twofold: First, we i… ▽ More

    Submitted 13 October, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

    Comments: Published at IJCAI 2020 (at https://www.ijcai.org/Proceedings/2020/61 ); the conference version has a minor error in the proof of Theorem 3, which is fixed here

  8. arXiv:2001.07546  [pdf

    cs.HC

    Exploring an Application of Virtual Reality for Early Detection of Dementia

    Authors: Yiming Zhong, Yuan Tian, Mira Park, Soonja Yeom

    Abstract: Facing the severe global dementia problem, an exploration was conducted adopting the technology of virtual reality (VR). This report lays a technical foundation for further research project "Early Detection of Dementia Using Testing Tools in VR Environment", which illustrates the process of developing a VR application using Unity 3D software on Oculus Go. This preliminary exploration is composed o… ▽ More

    Submitted 14 January, 2020; originally announced January 2020.

    Comments: 11 pages, 4 tables, 11 figures

  9. Pruning by Explaining: A Novel Criterion for Deep Neural Network Pruning

    Authors: Seul-Ki Yeom, Philipp Seegerer, Sebastian Lapuschkin, Alexander Binder, Simon Wiedemann, Klaus-Robert Müller, Wojciech Samek

    Abstract: The success of convolutional neural networks (CNNs) in various applications is accompanied by a significant increase in computation and parameter storage costs. Recent efforts to reduce these overheads involve pruning and compressing the weights of various layers while at the same time aiming to not sacrifice performance. In this paper, we propose a novel criterion for CNN pruning inspired by neur… ▽ More

    Submitted 12 March, 2021; v1 submitted 18 December, 2019; originally announced December 2019.

    Comments: 25 pages + 5 supplementary pages, 13 figures, 6 tables

    Journal ref: Pattern Recognition, Volume 115, pp.107899, 2021

  10. arXiv:1906.11813  [pdf, ps, other

    cs.LG stat.ML

    Learning Fair Representations for Kernel Models

    Authors: Zilong Tan, Samuel Yeom, Matt Fredrikson, Ameet Talwalkar

    Abstract: Fair representations are a powerful tool for establishing criteria like statistical parity, proxy non-discrimination, and equality of opportunity in learned models. Existing techniques for learning these representations are typically model-agnostic, as they preprocess the original data such that the output satisfies some fairness criterion, and can be used with arbitrary learning methods. In contr… ▽ More

    Submitted 20 January, 2020; v1 submitted 27 June, 2019; originally announced June 2019.

    Comments: The 23rd International Conference on Artificial Intelligence and Statistics (AISTATS 2020)

  11. FlipTest: Fairness Testing via Optimal Transport

    Authors: Emily Black, Samuel Yeom, Matt Fredrikson

    Abstract: We present FlipTest, a black-box technique for uncovering discrimination in classifiers. FlipTest is motivated by the intuitive question: had an individual been of a different protected status, would the model have treated them differently? Rather than relying on causal information to answer this question, FlipTest leverages optimal transport to match individuals in different protected groups, cre… ▽ More

    Submitted 6 December, 2019; v1 submitted 21 June, 2019; originally announced June 2019.

    Comments: Accepted to ACM FAT* 2020; The first two authors contributed equally

  12. arXiv:1810.07155  [pdf, other

    cs.LG math.OC stat.ML

    Hunting for Discriminatory Proxies in Linear Regression Models

    Authors: Samuel Yeom, Anupam Datta, Matt Fredrikson

    Abstract: A machine learning model may exhibit discrimination when used to make decisions involving people. One potential cause for such outcomes is that the model uses a statistical proxy for a protected demographic attribute. In this paper we formulate a definition of proxy use for the setting of linear regression and present algorithms for detecting proxies. Our definition follows recent work on proxies… ▽ More

    Submitted 27 November, 2018; v1 submitted 16 October, 2018; originally announced October 2018.

  13. arXiv:1808.08619  [pdf, other

    cs.LG cs.CY stat.ML

    Avoiding Disparity Amplification under Different Worldviews

    Authors: Samuel Yeom, Michael Carl Tschantz

    Abstract: We mathematically compare four competing definitions of group-level nondiscrimination: demographic parity, equalized odds, predictive parity, and calibration. Using the theoretical framework of Friedler et al., we study the properties of each definition under various worldviews, which are assumptions about how, if at all, the observed data is biased. We argue that different worldviews call for dif… ▽ More

    Submitted 9 March, 2021; v1 submitted 26 August, 2018; originally announced August 2018.

    Comments: This is a draft version. For the published version, please go to https://dl.acm.org/doi/10.1145/3442188.3445892

  14. arXiv:1709.01604  [pdf, other

    cs.CR cs.LG stat.ML

    Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting

    Authors: Samuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha

    Abstract: Machine learning algorithms, when applied to sensitive data, pose a distinct threat to privacy. A growing body of prior work demonstrates that models produced by these algorithms may leak specific private information in the training data to an attacker, either through the models' structure or their observable behavior. However, the underlying cause of this privacy risk is not well understood beyon… ▽ More

    Submitted 4 May, 2018; v1 submitted 5 September, 2017; originally announced September 2017.