Geiping, Jonas: Modern optimization techniques in computer vision : from variational models to machine learning security. 2021
Inhalt
- Zusammenfassung
- Abstract
- Acknowledgements
- Contents
- Introduction
- Fast Convex Relaxations using Graph Discretizations
- Introduction
- Related Work
- Graph Discretizations for Convex Relaxations
- Numerical Evaluation
- Conclusions
- Proof of Proposition 1
- Algorithmic Details
- Experimental Setup
- Superpixel-Sublabel Stereo Lifting
- Further plots
- Composite Optimization by Nonconvex Majorization-Minimization
- Introduction
- The General Principle
- Algorithm Discussion and Convergence
- Implementation Details
- Modeling
- Choices for the Bregman Distance
- An example of a non-separable, solvable subproblem
- Inertia
- Experimental results
- Conclusions
- Reformulation as continuous Majorizer
- Details regarding Grid Search
- Parametric Majorization for Data-Driven Energy Minimization Methods
- Introduction
- Related Work
- Bi-Level Learning
- Majorization of Bi-level Problems
- Single-Level Majorizers
- Intermission: One-Dimensional Example
- Iterative Majorizers
- Examples
- Conclusions
- Convex Analysis in Section 3
- Details for Derivation of (4.11) to (4.12)
- Details for Derivation of (4.14) to (4.15)
- Proof of Proposition 2
- Derivation of the surrogate functions for the example in 4.3.3
- Proof of Proposition 4
- Experimental Setup
- Extended Overview of Related Work
- Analysis Operator Learning - Additional Figures
- Derivation from Support Vector Machine Principles
- On Hessian Inversion
- Generalization of the Iterative Surrogate
- Inverting Gradients - How easy is it to break privacy in federated learning?
- Introduction
- Related Work
- Theoretical Analysis: Recovering Images from their Gradients
- A Numerical Reconstruction Method
- Single Image Reconstruction from a Single Gradient
- Distributed Learning with Federated Averaging and Multiple Images
- Conclusions
- Broader Impact - Federated Learning does not guarantee privacy
- Variations of the threat model
- Experimental Details
- Hyperparameter Settings
- Proofs for section 5.2
- Additional Examples
- Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching
- Introduction
- Related Work
- Efficient Poison Brewing
- Threat Model
- Motivation
- The Central Mechanism: Gradient Alignment
- Making attacks that transfer and succeed ``in the wild''
- Theoretical Analysis
- Experimental Evaluation
- Conclusion
- Remarks
- Experimental Setup
- Proof of Proposition 6.1
- Poisoned Datasets
- Visualizations
- Additional Experiments
- Conclusions
- References
- Index
- Lists of Figures and Tables
