Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

The current studies of provable robustness for deep neural networks (DNNs) usually assume that the class distribution is overall balanced. However, in real-world applications especially for safety-sensitive systems, the class distribution often exhibits a long-tailed property. It is well-known that the Area Under the ROC Curve (AUC) is a more proper metric for long-tailed learning problems. Motivated by this fact, an AUC-oriented provable robustness learning framework (named AUCPro) is first proposed in this paper. The key is to construct a proxy model smoothed by the isotropic Gaussian noise and then consider optimizing the proxy model from the AUC-oriented learning point of view. Theoretically, we provide a certified safety region for AUCPro within which the model would be free from the $\ell _{2}$ℓ2 adversarial attacks. Most importantly, we propose a novel standard to theoretically study the robustness generalization toward unseen data for provable robustness learning approaches. To the best of our knowledge, such a problem remains barely considered in the machine learning community. To be specific, under a general principle for performance-robustness trade-off, we prove that the generalization ability of the resulting model could be equivalently expressed as the expected adversarial risk of AUC under $\ell _{2}$ℓ2 perturbation. On top of this, we present two practical settings to explore the excess risk formed by the difference between the empirical risk of AUCPro and the derived generalization performance. Finally, comprehensive experiments speak to the efficacy of our proposed algorithm.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TPAMI.2025.3545639DOI Listing

Publication Analysis

Top Keywords

provable robustness
16
robustness learning
12
auc-oriented provable
8
class distribution
8
proxy model
8
$\ell _{2}$ℓ2
8
learning
6
robustness
5
aucpro
4
aucpro auc-oriented
4

Similar Publications

Single-level reformulations of (nonconvex) distributionally robust optimization (DRO) problems are often intractable, as they contain semi-infinite dual constraints. Based on such a semi-infinite reformulation, we present a safe approximation that allows for the computation of feasible solutions for DROs that depend on nonconvex multivariate simple functions. Moreover, the approximation allows to address ambiguity sets that can incorporate information on moments as well as confidence sets.

View Article and Find Full Text PDF

The rapid evolution of quantum devices fuels concerted efforts to experimentally establish quantum advantage over classical computing. Many demonstrations of quantum advantage, however, rely on computational assumptions and face verification challenges. Furthermore, steady advances in classical algorithms and machine learning make the issue of provable, practically demonstrable quantum advantage a moving target.

View Article and Find Full Text PDF

The current studies of provable robustness for deep neural networks (DNNs) usually assume that the class distribution is overall balanced. However, in real-world applications especially for safety-sensitive systems, the class distribution often exhibits a long-tailed property. It is well-known that the Area Under the ROC Curve (AUC) is a more proper metric for long-tailed learning problems.

View Article and Find Full Text PDF

Optimal low-depth quantum signal-processing phase estimation.

Nat Commun

February 2025

Google Quantum AI, Venice, California, CA, 90291, USA.

Quantum effects like entanglement and coherent amplification can be used to drastically enhance the accuracy of quantum parameter estimation beyond classical limits. However, challenges such as decoherence and time-dependent errors hinder Heisenberg-limited amplification. We introduce Quantum Signal-Processing Phase Estimation algorithms that are robust against these challenges and achieve optimal performance as dictated by the Cramér-Rao bound.

View Article and Find Full Text PDF

Design and analysis of lightweight and robust authentication protocol for securing the resource constrained IIoT environment.

PLoS One

May 2025

Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia.

The Internet of Things (IoT) is a vast network of devices, sensors, wearables, or any other object capable of processing, storing, sending, and receiving data over an open network channel. This versatility gives IoT numerous applications, one of them being in the industry, also known as the Industrial Internet of Things (IIoT). As IIoT relies on an open network channel for data sharing, it is vulnerable to numerous threats, including side channels, impersonation attacks, and clock synchronization issues for which device authentication becomes crucial.

View Article and Find Full Text PDF