no code implementations • 29 Dec 2023 • Melrose Roderick, Felix Berkenkamp, Fatemeh Sheikholeslami, Zico Kolter
In many real-world problems, there is a limited set of training data, but an abundance of unlabeled data.
no code implementations • 7 Jun 2023 • Ting-Wei Wu, Fatemeh Sheikholeslami, Mohammad Kachuee, Jaeyoung Do, Sungjin Lee
Large-scale conversational systems typically rely on a skill-routing component to route a user request to an appropriate skill and interpretation to serve the request.
1 code implementation • 26 Oct 2022 • Sina Baharlouei, Fatemeh Sheikholeslami, Meisam Razaviyayn, Zico Kolter
This work concerns the development of deep networks that are certifiably robust to adversarial attacks.
no code implementations • ICML Workshop AML 2021 • Wan-Yi Lin, Fatemeh Sheikholeslami, Jinghao Shi, Leslie Rice, J Zico Kolter
This paper proposes a certifiable defense against adversarial patch attacks on image classification.
no code implementations • 29 Jan 2021 • Devin Willmott, Anit Kumar Sahu, Fatemeh Sheikholeslami, Filipe Condessa, Zico Kolter
In this work, we instead show that it is possible to craft (universal) adversarial perturbations in the black-box setting by querying a sequence of different images only once.
1 code implementation • ICLR 2021 • Fatemeh Sheikholeslami, Ali Lotfi, J Zico Kolter
Adversarial attacks against deep networks can be defended against either by building robust classifiers or, by creating classifiers that can \emph{detect} the presence of adversarial perturbations.
no code implementations • 1 Jan 2021 • Wan-Yi Lin, Fatemeh Sheikholeslami, Jinghao Shi, Leslie Rice, J Zico Kolter
Our method improves upon the current state of the art in defending against patch attacks on CIFAR10 and ImageNet, both in terms of certified accuracy and inference time.
no code implementations • 19 May 2020 • Alireza Sadeghi, Georgios B. Giannakis, Gang Wang, Fatemeh Sheikholeslami
With the tremendous growth of data traffic over wired and wireless networks along with the increasing number of rich-media applications, caching is envisioned to play a critical role in next-generation networks.
no code implementations • 5 Apr 2019 • Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis
The effectiveness of the novel detectors in the context of competing alternatives is highlighted through extensive tests for various types of adversarial attacks with variable levels of strength.
no code implementations • 17 Dec 2018 • Alireza Sadeghi, Fatemeh Sheikholeslami, Antonio G. Marques, Georgios B. Giannakis
Under this generic formulation, first by considering stationary distributions for the costs and file popularities, an efficient reinforcement learning-based solver known as value iteration algorithm can be used to solve the emerging optimization problem.
no code implementations • 19 Jul 2017 • Alireza Sadeghi, Fatemeh Sheikholeslami, Georgios B. Giannakis
To intelligently prefetch, each SB must learn what and when to cache, while taking into account SB memory limitations, the massive number of available contents, the unknown popularity profiles, as well as the space-time popularity dynamics of user file requests.
Networking and Internet Architecture
no code implementations • 28 Jan 2016 • Fatemeh Sheikholeslami, Dimitris Berberidis, Georgios B. Giannakis
Kernel-based methods enjoy powerful generalization capabilities in handling a variety of learning tasks.