Alert button
Picture for Hossein Souri

Hossein Souri

Alert button

Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion

Add code
Bookmark button
Alert button
Mar 25, 2024
Hossein Souri, Arpit Bansal, Hamid Kazemi, Liam Fowl, Aniruddha Saha, Jonas Geiping, Andrew Gordon Wilson, Rama Chellappa, Tom Goldstein, Micah Goldblum

Viaarxiv icon

Battle of the Backbones: A Large-Scale Comparison of Pretrained Models across Computer Vision Tasks

Add code
Bookmark button
Alert button
Nov 20, 2023
Micah Goldblum, Hossein Souri, Renkun Ni, Manli Shu, Viraj Prabhu, Gowthami Somepalli, Prithvijit Chattopadhyay, Mark Ibrahim, Adrien Bardes, Judy Hoffman, Rama Chellappa, Andrew Gordon Wilson, Tom Goldstein

Viaarxiv icon

Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning

Add code
Bookmark button
Alert button
Oct 17, 2022
Yuxin Wen, Jonas Geiping, Liam Fowl, Hossein Souri, Rama Chellappa, Micah Goldblum, Tom Goldstein

Figure 1 for Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning
Figure 2 for Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning
Figure 3 for Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning
Figure 4 for Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning
Viaarxiv icon

Pre-Train Your Loss: Easy Bayesian Transfer Learning with Informative Priors

Add code
Bookmark button
Alert button
May 20, 2022
Ravid Shwartz-Ziv, Micah Goldblum, Hossein Souri, Sanyam Kapoor, Chen Zhu, Yann LeCun, Andrew Gordon Wilson

Figure 1 for Pre-Train Your Loss: Easy Bayesian Transfer Learning with Informative Priors
Figure 2 for Pre-Train Your Loss: Easy Bayesian Transfer Learning with Informative Priors
Figure 3 for Pre-Train Your Loss: Easy Bayesian Transfer Learning with Informative Priors
Figure 4 for Pre-Train Your Loss: Easy Bayesian Transfer Learning with Informative Priors
Viaarxiv icon

A Deep Dive into Dataset Imbalance and Bias in Face Identification

Add code
Bookmark button
Alert button
Mar 15, 2022
Valeriia Cherepanova, Steven Reich, Samuel Dooley, Hossein Souri, Micah Goldblum, Tom Goldstein

Figure 1 for A Deep Dive into Dataset Imbalance and Bias in Face Identification
Figure 2 for A Deep Dive into Dataset Imbalance and Bias in Face Identification
Figure 3 for A Deep Dive into Dataset Imbalance and Bias in Face Identification
Figure 4 for A Deep Dive into Dataset Imbalance and Bias in Face Identification
Viaarxiv icon

Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses

Add code
Bookmark button
Alert button
Dec 12, 2021
Chun Pong Lau, Jiang Liu, Hossein Souri, Wei-An Lin, Soheil Feizi, Rama Chellappa

Figure 1 for Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses
Figure 2 for Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses
Figure 3 for Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses
Figure 4 for Interpolated Joint Space Adversarial Training for Robust and Generalizable Defenses
Viaarxiv icon

Mutual Adversarial Training: Learning together is better than going alone

Add code
Bookmark button
Alert button
Dec 09, 2021
Jiang Liu, Chun Pong Lau, Hossein Souri, Soheil Feizi, Rama Chellappa

Figure 1 for Mutual Adversarial Training: Learning together is better than going alone
Figure 2 for Mutual Adversarial Training: Learning together is better than going alone
Figure 3 for Mutual Adversarial Training: Learning together is better than going alone
Figure 4 for Mutual Adversarial Training: Learning together is better than going alone
Viaarxiv icon

Identification of Attack-Specific Signatures in Adversarial Examples

Add code
Bookmark button
Alert button
Oct 13, 2021
Hossein Souri, Pirazh Khorramshahi, Chun Pong Lau, Micah Goldblum, Rama Chellappa

Figure 1 for Identification of Attack-Specific Signatures in Adversarial Examples
Figure 2 for Identification of Attack-Specific Signatures in Adversarial Examples
Figure 3 for Identification of Attack-Specific Signatures in Adversarial Examples
Figure 4 for Identification of Attack-Specific Signatures in Adversarial Examples
Viaarxiv icon

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

Add code
Bookmark button
Alert button
Jun 16, 2021
Hossein Souri, Micah Goldblum, Liam Fowl, Rama Chellappa, Tom Goldstein

Figure 1 for Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch
Figure 2 for Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch
Figure 3 for Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch
Figure 4 for Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch
Viaarxiv icon