Loading Now

Summary of Hidden Activations Are Not Enough: a General Approach to Neural Network Predictions, by Samuel Leblanc et al.


Hidden Activations Are Not Enough: A General Approach to Neural Network Predictions

by Samuel Leblanc, Aiky Rasolomanana, Marco Armenta

First submitted to arxiv on: 20 Sep 2024

Categories

  • Main: Machine Learning (cs.LG)
  • Secondary: Neural and Evolutionary Computing (cs.NE); Representation Theory (math.RT)

     Abstract of paper      PDF of paper


GrooveSquid.com Paper Summaries

GrooveSquid.com’s goal is to make artificial intelligence research accessible by summarizing AI papers in simpler terms. Each summary below covers the same AI paper, written at different levels of difficulty. The medium difficulty and low difficulty versions are original summaries written by GrooveSquid.com, while the high difficulty version is the paper’s original abstract. Feel free to learn from the version that suits you best!

Summary difficulty Written by Summary
High Paper authors High Difficulty Summary
Read the original abstract here
Medium GrooveSquid.com (original content) Medium Difficulty Summary
We present a novel mathematical framework for analyzing neural networks using quiver representation theory. This approach enables quantification of the similarity between a new data sample and training data as perceived by the network. By leveraging induced quiver representations, we capture more information than traditional hidden layer outputs. Our results are architecture-agnostic and task-agnostic, making them broadly applicable to various MLP architectures and adversarial attack methods. We demonstrate our framework’s effectiveness on MNIST and FashionMNIST datasets for detecting adversarial examples using publicly available code.
Low GrooveSquid.com (original content) Low Difficulty Summary
Imagine a new way to understand how neural networks work. Our team created a special mathematical tool that helps us see what a network thinks about a new piece of data, compared to the old training data it learned from. This tool is super powerful because it doesn’t care what kind of network or problem we’re trying to solve. We tested this idea on two famous datasets and showed that it can help detect when someone is trying to trick the network with fake data.

Keywords

* Artificial intelligence