1,321 research outputs found
Fast and Robust Distributed Learning in High Dimension
Could a gradient aggregation rule (GAR) for distributed machine learning be
both robust and fast? This paper answers by the affirmative through
multi-Bulyan. Given workers, of which are arbitrary malicious
(Byzantine) and are not, we prove that multi-Bulyan can ensure a strong
form of Byzantine resilience, as well as an slowdown, compared
to averaging, the fastest (but non Byzantine resilient) rule for distributed
machine learning. When (almost all workers are correct),
multi-Bulyan reaches the speed of averaging. We also prove that multi-Bulyan's
cost in local computation is (like averaging), an important feature for
ML where commonly reaches , while robust alternatives have at least
quadratic cost in .
Our theoretical findings are complemented with an experimental evaluation
which, in addition to supporting the linear complexity argument, conveys
the fact that multi-Bulyan's parallelisability further adds to its efficiency.Comment: preliminary theoretical draft, complements the SysML 2019 practical
paper of which the code is provided at
https://github.com/LPD-EPFL/AggregaThor. arXiv admin note: text overlap with
arXiv:1703.0275
On The Robustness of a Neural Network
With the development of neural networks based machine learning and their
usage in mission critical applications, voices are rising against the
\textit{black box} aspect of neural networks as it becomes crucial to
understand their limits and capabilities. With the rise of neuromorphic
hardware, it is even more critical to understand how a neural network, as a
distributed system, tolerates the failures of its computing nodes, neurons, and
its communication channels, synapses. Experimentally assessing the robustness
of neural networks involves the quixotic venture of testing all the possible
failures, on all the possible inputs, which ultimately hits a combinatorial
explosion for the first, and the impossibility to gather all the possible
inputs for the second.
In this paper, we prove an upper bound on the expected error of the output
when a subset of neurons crashes. This bound involves dependencies on the
network parameters that can be seen as being too pessimistic in the average
case. It involves a polynomial dependency on the Lipschitz coefficient of the
neurons activation function, and an exponential dependency on the depth of the
layer where a failure occurs. We back up our theoretical results with
experiments illustrating the extent to which our prediction matches the
dependencies between the network parameters and robustness. Our results show
that the robustness of neural networks to the average crash can be estimated
without the need to neither test the network on all failure configurations, nor
access the training set used to train the network, both of which are
practically impossible requirements.Comment: 36th IEEE International Symposium on Reliable Distributed Systems 26
- 29 September 2017. Hong Kong, Chin
Deep convolutional neural networks for face and iris presentation attack detection: Survey and case study
Biometric presentation attack detection is gaining increasing attention.
Users of mobile devices find it more convenient to unlock their smart
applications with finger, face or iris recognition instead of passwords. In
this paper, we survey the approaches presented in the recent literature to
detect face and iris presentation attacks. Specifically, we investigate the
effectiveness of fine tuning very deep convolutional neural networks to the
task of face and iris antispoofing. We compare two different fine tuning
approaches on six publicly available benchmark datasets. Results show the
effectiveness of these deep models in learning discriminative features that can
tell apart real from fake biometric images with very low error rate.
Cross-dataset evaluation on face PAD showed better generalization than state of
the art. We also performed cross-dataset testing on iris PAD datasets in terms
of equal error rate which was not reported in literature before. Additionally,
we propose the use of a single deep network trained to detect both face and
iris attacks. We have not noticed accuracy degradation compared to networks
trained for only one biometric separately. Finally, we analyzed the learned
features by the network, in correlation with the image frequency components, to
justify its prediction decision.Comment: A preprint of a paper accepted by IET Biometrics journal and is
subject to Institution of Engineering and Technology Copyrigh
Sudanese Women on the Move in Cairo Defy Stereotypes
Against the perception of people on the move as helpless and passive, this brief draws on the stories of 12 Sudanese females residing in Ard El-Lewa, a densely populated informal urban area in Cairo with a substantial presence of Sudanese. This ethnographic fieldwork was conducted between January and June 2021. Admittedly, these stories do not represent whole communities of people on the move. But they are a glimpse into the lives of the Sudanese women I collaborated with, interviewed, and observed through fieldwork. More importantly, these stories showcase how people on the move are not mute victims. This brief demonstrates that the stories and voices of people on the move should be noticed and reflected, and that people on the move should have a leading say regarding the contexts and conditions that affect them, as well as how they are represented
- …