no code implementations • ICML 2020 • Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Mingyi Hong, Una-May O'Reilly
In this paper, we study the problem of constrained min-max optimization in a black-box setting, where the desired optimizer cannot access the gradients of the objective function but may query its values.
1 code implementation • ICLR 2020 • Abdullah Al-Dujaili, Una-May O'Reilly
Similar performance is observed on a standard IMAGENET model with an average of $579$ queries.
1 code implementation • 30 Sep 2019 • Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Minyi Hong, Una-May O'Reilly
In this paper, we study the problem of constrained robust (min-max) optimization ina black-box setting, where the desired optimizer cannot access the gradients of the objective function but may query its values.
no code implementations • 19 Feb 2019 • Abdullah Al-Dujaili, Una-May O'Reilly
We present a black-box adversarial attack algorithm which sets new state-of-the-art model evasion rates for query efficiency in the $\ell_\infty$ and $\ell_2$ metrics, where only loss-oracle access to the model is available.
1 code implementation • 30 Nov 2018 • Tom Schmiedlechner, Ignavier Ng Zhi Yong, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly
GANs are difficult to train due to convergence pathologies such as mode and discriminator collapse.
no code implementations • 14 Nov 2018 • Jwala Dhamala, Emmanuel Azuh, Abdullah Al-Dujaili, Jonathan Rubin, Una-May O'Reilly
Timely prediction of clinically critical events in Intensive Care Unit (ICU) is important for improving care and survival rate.
no code implementations • 3 Oct 2018 • Gili Rusak, Abdullah Al-Dujaili, Una-May O'Reilly
With the celebrated success of deep learning, some attempts to develop effective methods for detecting malicious PowerShell programs employ neural nets in a traditional natural language processing setup while others employ convolutional neural nets to detect obfuscated malicious commands at a character level.
no code implementations • 21 Jul 2018 • Abdullah Al-Dujaili, Tom Schmiedlechner, and Erik Hemberg, Una-May O'Reilly
Generative Adversarial Networks (GANs) have become one of the dominant methods for deep generative modeling.
1 code implementation • 9 May 2018 • Alex Huang, Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly
A central challenge of adversarial learning is to interpret the resulting hardened model.
1 code implementation • 27 Apr 2018 • Abdullah Al-Dujaili, Erik Hemberg, Una-May O'Reilly
Game theory has emerged as a powerful framework for modeling a large range of multi-agent scenarios.
Computer Science and Game Theory
2 code implementations • 9 Jan 2018 • Abdullah Al-Dujaili, Alex Huang, Erik Hemberg, Una-May O'Reilly
We are inspired by them to develop similar methods for the discrete, e. g. binary, domain which characterizes the features of malware.
no code implementations • 27 Nov 2016 • Abdullah Al-Dujaili, S. Suresh
In essence, the EmbeddedHunter algorithm expands optimistically a partitioning tree over a low-dimensional---equal to the effective dimension of the problem---search space based on a bounded number of random embeddings of sampled points from the low-dimensional space.
no code implementations • 23 May 2016 • Abdullah Al-Dujaili, S. Suresh
This document briefly describes the Black-Box Multi-Objective Optimization Benchmarking (BMOBench) platform.