no code implementations • 23 May 2020 • Mahdieh Abbasi, Denis Laurendeau, Christian Gagne
With the goal of training \emph{one integrated robust object detector with high generalization performance}, we propose a training framework to overcome missing-label challenge of the merged datasets.
no code implementations • 17 May 2020 • Mahdieh Abbasi, Arezoo Rajabi, Christian Gagne, Rakesh B. Bobba
Using MNIST and CIFAR-10, we empirically verify the ability of our ensemble to detect a large portion of well-known black-box adversarial examples, which leads to a significant reduction in the risk rate of adversaries, at the expense of a small increase in the risk rate of clean samples.
1 code implementation • 18 Oct 2019 • Mahdieh Abbasi, Changjian Shui, Arezoo Rajabi, Christian Gagne, Rakesh Bobba
We empirically verify that the most protective OOD sets -- selected according to our metrics -- lead to A-CNNs with significantly lower generalization errors than the A-CNNs trained on the least protective ones.
no code implementations • ICLR 2019 • Mahdieh Abbasi, Arezoo Rajabi, Azadeh Sadat Mozafari, Rakesh B. Bobba, Christian Gagné
As an appropriate training set for the extra class, we introduce two resources that are computationally efficient to obtain: a representative natural out-distribution set and interpolated in-distribution samples.
1 code implementation • 21 Mar 2019 • Changjian Shui, Mahdieh Abbasi, Louis-Émile Robitaille, Boyu Wang, Christian Gagné
Hence, an important aspect of multitask learning is to understand the similarities within a set of tasks.
no code implementations • 21 Aug 2018 • Mahdieh Abbasi, Arezoo Rajabi, Azadeh Sadat Mozafari, Rakesh B. Bobba, Christian Gagne
As an appropriate training set for the extra class, we introduce two resources that are computationally efficient to obtain: a representative natural out-distribution set and interpolated in-distribution samples.
no code implementations • 24 Apr 2018 • Mahdieh Abbasi, Arezoo Rajabi, Christian Gagné, Rakesh B. Bobba
Detection and rejection of adversarial examples in security sensitive and safety-critical systems using deep CNNs is essential.
1 code implementation • 20 Feb 2018 • Mahdieh Abbasi, Christian Gagné
The easiness at which adversarial instances can be generated in deep neural networks raises some fundamental questions on their functioning and concerns on their use in critical systems.
no code implementations • 22 Feb 2017 • Mahdieh Abbasi, Christian Gagné
We are proposing to use an ensemble of diverse specialists, where speciality is defined according to the confusion matrix.
no code implementations • 5 Nov 2016 • Farkhondeh Kiaee, Christian Gagné, Mahdieh Abbasi
This method alternates between promoting the sparsity of the network and optimizing the recognition performance, which allows us to exploit the two-part structure of the corresponding objective functions.