Skip to main content

Showing 1–11 of 11 results for author: Abascal, J

  1. arXiv:2405.20485  [pdf, other

    cs.CR cs.CL cs.LG

    Phantom: General Trigger Attacks on Retrieval Augmented Language Generation

    Authors: Harsh Chaudhari, Giorgio Severi, John Abascal, Matthew Jagielski, Christopher A. Choquette-Choo, Milad Nasr, Cristina Nita-Rotaru, Alina Oprea

    Abstract: Retrieval Augmented Generation (RAG) expands the capabilities of modern large language models (LLMs) in chatbot applications, enabling developers to adapt and personalize the LLM output without expensive training or fine-tuning. RAG systems use an external knowledge database to retrieve the most relevant documents for a given query, providing this context to the LLM generator. While RAG achieves i… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. arXiv:2306.01181  [pdf, other

    cs.LG cs.CR

    TMI! Finetuned Models Leak Private Information from their Pretraining Data

    Authors: John Abascal, Stanley Wu, Alina Oprea, Jonathan Ullman

    Abstract: Transfer learning has become an increasingly popular technique in machine learning as a way to leverage a pretrained model trained for one task to assist with building a finetuned model for a related task. This paradigm has been especially popular for $\textit{privacy}$ in machine learning, where the pretrained model is considered public, and only the data for finetuning is considered sensitive. H… ▽ More

    Submitted 21 March, 2024; v1 submitted 1 June, 2023; originally announced June 2023.

  3. arXiv:2208.12348  [pdf, other

    cs.LG cs.CR

    SNAP: Efficient Extraction of Private Properties with Poisoning

    Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman

    Abstract: Property inference attacks allow an adversary to extract global properties of the training dataset from a machine learning model. Such attacks have privacy implications for data owners sharing their datasets to train machine learning models. Several existing approaches for property inference attacks against deep neural networks have been proposed, but they all rely on the attacker training a large… ▽ More

    Submitted 21 June, 2023; v1 submitted 25 August, 2022; originally announced August 2022.

    Comments: 28 pages, 16 figures

  4. arXiv:2009.08032  [pdf, ps, other

    cs.CC cs.DS

    Strongly refuting all semi-random Boolean CSPs

    Authors: Jackson Abascal, Venkatesan Guruswami, Pravesh K. Kothari

    Abstract: We give an efficient algorithm to strongly refute \emph{semi-random} instances of all Boolean constraint satisfaction problems. The number of constraints required by our algorithm matches (up to polylogarithmic factors) the best-known bounds for efficient refutation of fully random instances. Our main technical contribution is an algorithm to strongly refute semi-random instances of the Boolean… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

    Comments: 31 Pages

    ACM Class: F.2.2

  5. arXiv:1812.04230  [pdf, ps, other

    cs.DS

    A Non-iterative Parallelizable Eigenbasis Algorithm for Johnson Graphs

    Authors: Jackson Abascal, Amadou Bah, Mario Banuelos, David Uminsky, Olivia Vasquez

    Abstract: We present a new $O(k^2 \binom{n}{k}^2)$ method for generating an orthogonal basis of eigenvectors for the Johnson graph $J(n,k)$. Unlike standard methods for computing a full eigenbasis of sparse symmetric matrices, the algorithm presented here is non-iterative, and produces exact results under an infinite-precision computation model. In addition, our method is highly parallelizable; given access… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

  6. arXiv:1711.07132  [pdf, ps, other

    cs.CC

    Critique of Barbosa's "P != NP Proof"

    Authors: Jackson Abascal, Shir Maimon

    Abstract: We review André Luiz Barbosa's paper "P != NP Proof," in which the classes P and NP are generalized and claimed to be proven separate. We highlight inherent ambiguities in Barbosa's definitions, and show that attempts to resolve this ambiguity lead to flaws in the proof of his main result.

    Submitted 19 November, 2017; originally announced November 2017.

  7. arXiv:1711.04412  [pdf, ps, other

    cs.CC

    A Refutation of Guinea's "Understanding SAT is in P"

    Authors: Jackson Abascal, Shir Maimon

    Abstract: In this work, we summarize and critique the paper "Understanding SAT is in P" by Alejandro Sánchez Guinea [arXiv:1504.00337]. The paper claims to present a polynomial-time solution for the NP-complete language 3-SAT. We show that Guinea's algorithm is flawed and does not prove 3-SAT is in P.

    Submitted 12 November, 2017; originally announced November 2017.

  8. arXiv:1702.02743  [pdf

    physics.med-ph cs.CV

    Incorporation of prior knowledge of the signal behavior into the reconstruction to accelerate the acquisition of MR diffusion data

    Authors: Juan F P J Abascal, Manuel Desco, Juan Parra-Robles

    Abstract: Diffusion MRI measurements using hyperpolarized gases are generally acquired during patient breath hold, which yields a compromise between achievable image resolution, lung coverage and number of b-values. In this work, we propose a novel method that accelerates the acquisition of MR diffusion data by undersampling in both spatial and b-value dimensions, thanks to incorporating knowledge about the… ▽ More

    Submitted 9 February, 2017; originally announced February 2017.

  9. arXiv:1611.01696  [pdf, ps, other

    cs.LO cs.CC cs.FL math.LO

    Closure and Nonclosure Properties of the Compressible and Rankable Sets

    Authors: Jackson Abascal, Lane A. Hemaspaandra, Shir Maimon, Daniel Rubery

    Abstract: The rankable and compressible sets have been studied for more than a quarter of a century, ever since Allender [1] and Goldberg and Sipser [6] introduced the formal study of polynomial-time ranking. Yet even after all that time, whether the rankable and compressible sets are closed under the most important boolean and other operations remains essentially unexplored. The present paper studies these… ▽ More

    Submitted 30 October, 2018; v1 submitted 5 November, 2016; originally announced November 2016.

    ACM Class: F.1.1; F.4.1; F.2.2

  10. arXiv:1401.8136  [pdf

    cs.OH

    ICT technologies for the refurbishment of wooden structure buildings

    Authors: Ivan Arakistain, Jose Miguel Abascal, Oriol Munne

    Abstract: Nowadays, one would think that after years of massive concrete and steel construction in Spain, there are not many wood structure buildings left to be refurbished except for some palaces or cathedrals. However, if we go for a walk and have a look at the old part of any city, we will realize that still most of the buildings have a wood structure. In spite of the fact that the majority of urban regu… ▽ More

    Submitted 31 January, 2014; originally announced January 2014.

  11. arXiv:1307.0952  [pdf

    cs.OH

    Wireless sensor network technology for moisture monitoring of wood

    Authors: Ivan Arakistain, Jose Miguel Abascal, Oriol Munne

    Abstract: Leaks represent a very important hazard for the buildings and they can affect all sorts of building materials and specially wood due to its hygroscopic properties. Excessive moisture content can affect in a negative way building processes such as the installation of wooden floors or the use of wood as a structural material. Moisture meters can provide prompt and non-destructive determination of wo… ▽ More

    Submitted 3 July, 2013; originally announced July 2013.