Search Results for author: Keivan Rezaei

Found 6 papers, 3 papers with code

Online Advertisements with LLMs: Opportunities and Challenges

no code implementations11 Nov 2023 Soheil Feizi, Mohammadtaghi Hajiaghayi, Keivan Rezaei, Suho Shin

This paper explores the potential for leveraging Large Language Models (LLM) in the realm of online advertising systems.

Regret Analysis of Repeated Delegated Choice

no code implementations7 Oct 2023 Mohammadtaghi Hajiaghayi, Mohammad Mahdavi, Keivan Rezaei, Suho Shin

To mitigate this behavior, the principal announces an eligible set which screens out a certain set of solutions.

PRIME: Prioritizing Interpretability in Failure Mode Extraction

no code implementations29 Sep 2023 Keivan Rezaei, Mehrdad Saberi, Mazda Moayeri, Soheil Feizi

To improve on these shortcomings, we propose a novel approach that prioritizes interpretability in this problem: we start by obtaining human-understandable concepts (tags) of images in the dataset and then analyze the model's behavior based on the presence or absence of combinations of these tags.

Image Classification

Robustness of AI-Image Detectors: Fundamental Limits and Practical Attacks

1 code implementation29 Sep 2023 Mehrdad Saberi, Vinu Sankar Sadasivan, Keivan Rezaei, Aounon Kumar, Atoosa Chegini, Wenxiao Wang, Soheil Feizi

Moreover, we show that watermarking methods are vulnerable to spoofing attacks where the attacker aims to have real images identified as watermarked ones, damaging the reputation of the developers.

Adversarial Attack Face Swapping

Text-To-Concept (and Back) via Cross-Model Alignment

1 code implementation10 May 2023 Mazda Moayeri, Keivan Rezaei, Maziar Sanjabi, Soheil Feizi

We observe that the mapping between an image's representation in one model to its representation in another can be learned surprisingly well with just a linear layer, even across diverse models.

Run-Off Election: Improved Provable Defense against Data Poisoning Attacks

2 code implementations5 Feb 2023 Keivan Rezaei, Kiarash Banihashem, Atoosa Chegini, Soheil Feizi

Based on this approach, we propose DPA+ROE and FA+ROE defense methods based on Deep Partition Aggregation (DPA) and Finite Aggregation (FA) approaches from prior work.

Data Poisoning

Cannot find the paper you are looking for? You can Submit a new open access paper.