Certifiably Robust Interpretation
    11.
    发明申请

    公开(公告)号:US20220067505A1

    公开(公告)日:2022-03-03

    申请号:US17005144

    申请日:2020-08-27

    Abstract: Interpretation maps of convolutional neural networks having certifiable robustness using Rényi differential privacy are provided. In one aspect, a method for generating an interpretation map includes: adding generalized Gaussian noise to an image x to obtain T noisy images, wherein the generalized Gaussian noise constitutes perturbations to the image x; providing the T noisy images as input to a convolutional neural network; calculating T noisy interpretations of output from the convolutional neural network corresponding to the T noisy images; re-scaling the T noisy interpretations using a scoring vector ν to obtain T re-scaled noisy interpretations; and generating the interpretation map using the T re-scaled noisy interpretations, wherein the interpretation map is robust against the perturbations.

    Quantifying Vulnerabilities of Deep Learning Computing Systems to Adversarial Perturbations

    公开(公告)号:US20200285952A1

    公开(公告)日:2020-09-10

    申请号:US16296897

    申请日:2019-03-08

    Abstract: Mechanisms are provided for generating an adversarial perturbation attack sensitivity (APAS) visualization. The mechanisms receive a natural input dataset and a corresponding adversarial attack input dataset, where the adversarial attack input dataset comprises perturbations intended to cause a misclassification by a computer model. The mechanisms determine a sensitivity measure of the computer model to the perturbations in the adversarial attack input dataset based on a processing of the natural input dataset and corresponding adversarial attack input dataset by the computer model. The mechanisms generate a classification activation map (CAM) for the computer model based on results of the processing and a sensitivity overlay based on the sensitivity measure. The sensitivity overlay graphically represents different classifications of perturbation sensitivities. The mechanisms apply the sensitivity overlay to the CAM to generate and output a graphical visualization output of the computer model sensitivity to perturbations of adversarial attacks.

    ITERATIVE APPROACH FOR WEAKLY-SUPERVISED ACTION LOCALIZATION

    公开(公告)号:US20200286243A1

    公开(公告)日:2020-09-10

    申请号:US16292847

    申请日:2019-03-05

    Abstract: Embodiments of the present invention are directed to a computer-implemented method for action localization. A non-limiting example of the computer-implemented method includes receiving, by a processor, a video and segmenting, by the processor, the video into a set of video segments. The computer-implemented method classifies, by the processor, each video segment into a class and calculates, by the processor, importance scores for each video segment of a class within the set of video segments. The computer-implemented method determines, by the processor, a winning video segment of the class within the set of video segments based on the importance scores for each video segment within the class, stores, by the processor, the winning video segment from the set of video segments, and removes the winning video segment from the set of video segments.

Patent Agency Ranking