Skip to main content

Showing 1–50 of 337 results for author: Jha, S

  1. arXiv:2407.19662  [pdf, other

    cs.CR

    Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification

    Authors: Uzma Maroof, Gustavo Batista, Arash Shaghaghi, Sanjay Jha

    Abstract: Internet of Things (IoT) devices have grown in popularity since they can directly interact with the real world. Home automation systems automate these interactions. IoT events are crucial to these systems' decision-making but are often unreliable. Security vulnerabilities allow attackers to impersonate events. Using statistical machine learning, IoT event fingerprints from deployed sensors have be… ▽ More

    Submitted 28 July, 2024; originally announced July 2024.

    Comments: Accepted - 49th IEEE Conference on Local Computer Networks (LCN)

  2. arXiv:2407.16646  [pdf, other

    cs.SE cs.DC

    ExaWorks Software Development Kit: A Robust and Scalable Collection of Interoperable Workflow Technologies

    Authors: Matteo Turilli, Mihael Hategan-Marandiuc, Mikhail Titov, Ketan Maheshwari, Aymen Alsaadi, Andre Merzky, Ramon Arambula, Mikhail Zakharchanka, Matt Cowan, Justin M. Wozniak, Andreas Wilke, Ozgur Ozan Kilic, Kyle Chard, Rafael Ferreira da Silva, Shantenu Jha, Daniel Laney

    Abstract: Scientific discovery increasingly requires executing heterogeneous scientific workflows on high-performance computing (HPC) platforms. Heterogeneous workflows contain different types of tasks (e.g., simulation, analysis, and learning) that need to be mapped, scheduled, and launched on different computing. That requires a software stack that enables users to code their workflows and automate resour… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

  3. arXiv:2407.14116  [pdf, other

    cs.CR cs.LG

    AuditNet: A Conversational AI-based Security Assistant [DEMO]

    Authors: Shohreh Deldari, Mohammad Goudarzi, Aditya Joshi, Arash Shaghaghi, Simon Finn, Flora D. Salim, Sanjay Jha

    Abstract: In the age of information overload, professionals across various fields face the challenge of navigating vast amounts of documentation and ever-evolving standards. Ensuring compliance with standards, regulations, and contractual obligations is a critical yet complex task across various professional fields. We propose a versatile conversational AI assistant framework designed to facilitate complian… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

  4. arXiv:2407.13594  [pdf, other

    cs.LG

    Mechanistically Interpreting a Transformer-based 2-SAT Solver: An Axiomatic Approach

    Authors: Nils Palumbo, Ravi Mangal, Zifan Wang, Saranya Vijayakumar, Corina S. Pasareanu, Somesh Jha

    Abstract: Mechanistic interpretability aims to reverse engineer the computation performed by a neural network in terms of its internal components. Although there is a growing body of research on mechanistic interpretation of neural networks, the notion of a mechanistic interpretation itself is often ad-hoc. Inspired by the notion of abstract interpretation from the program analysis literature that aims to d… ▽ More

    Submitted 18 July, 2024; originally announced July 2024.

  5. arXiv:2407.12999  [pdf, other

    cs.CY cs.AI cs.CR

    Securing the Future of GenAI: Policy and Technology

    Authors: Mihai Christodorescu, Ryan Craven, Soheil Feizi, Neil Gong, Mia Hoffmann, Somesh Jha, Zhengyuan Jiang, Mehrdad Saberi Kamarposhti, John Mitchell, Jessica Newman, Emelia Probasco, Yanjun Qi, Khawaja Shams, Matthew Turek

    Abstract: The rise of Generative AI (GenAI) brings about transformative potential across sectors, but its dual-use nature also amplifies risks. Governments globally are grappling with the challenge of regulating GenAI, balancing innovation against safety. China, the United States (US), and the European Union (EU) are at the forefront with initiatives like the Management of Algorithmic Recommendations, the E… ▽ More

    Submitted 21 May, 2024; originally announced July 2024.

  6. Hydra: Brokering Cloud and HPC Resources to Support the Execution of Heterogeneous Workloads at Scale

    Authors: Aymen Alsaadi, Shantenu Jha, Matteo Turilli

    Abstract: Scientific discovery increasingly depends on middleware that enables the execution of heterogeneous workflows on heterogeneous platforms One of the main challenges is to design software components that integrate within the existing ecosystem to enable scale and performance across cloud and high-performance computing HPC platforms Researchers are met with a varied computing landscape which includes… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

  7. arXiv:2407.11418  [pdf, other

    cs.DB cs.AI cs.CL

    LOTUS: Enabling Semantic Queries with LLMs Over Tables of Unstructured and Structured Data

    Authors: Liana Patel, Siddharth Jha, Carlos Guestrin, Matei Zaharia

    Abstract: The semantic capabilities of language models (LMs) have the potential to enable rich analytics and reasoning over vast knowledge corpora. Unfortunately, existing systems lack high-level abstractions to perform semantic queries at scale. We introduce semantic operators, a declarative programming interface that extends the relational model with composable AI-based operations for semantic queries ove… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

  8. arXiv:2407.08892  [pdf, other

    cs.CL cs.LG

    Characterizing Prompt Compression Methods for Long Context Inference

    Authors: Siddharth Jha, Lutfi Eren Erdogan, Sehoon Kim, Kurt Keutzer, Amir Gholami

    Abstract: Long context inference presents challenges at the system level with increased compute and memory requirements, as well as from an accuracy perspective in being able to reason over long contexts. Recently, several methods have been proposed to compress the prompt to reduce the context length. However, there has been little work on comparing the different proposed methods across different tasks thro… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: Es-FoMo @ ICML 2024

  9. arXiv:2407.07858  [pdf, other

    cs.LG cs.CL

    FACTS About Building Retrieval Augmented Generation-based Chatbots

    Authors: Rama Akkiraju, Anbang Xu, Deepak Bora, Tan Yu, Lu An, Vishal Seth, Aaditya Shukla, Pritam Gundecha, Hridhay Mehta, Ashwin Jha, Prithvi Raj, Abhinav Balasubramanian, Murali Maram, Guru Muthusamy, Shivakesh Reddy Annepally, Sidney Knowles, Min Du, Nick Burnett, Sean Javiya, Ashok Marannan, Mamta Kumari, Surbhi Jha, Ethan Dereszenski, Anupam Chakraborty, Subhash Ranjan , et al. (13 additional authors not shown)

    Abstract: Enterprise chatbots, powered by generative AI, are emerging as key applications to enhance employee productivity. Retrieval Augmented Generation (RAG), Large Language Models (LLMs), and orchestration frameworks like Langchain and Llamaindex are crucial for building these chatbots. However, creating effective enterprise chatbots is challenging and requires meticulous RAG pipeline engineering. This… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 8 pages, 6 figures, 2 tables, Preprint submission to ACM CIKM 2024

  10. arXiv:2407.07674  [pdf, other

    cs.LG

    Feasibility Study on Active Learning of Smart Surrogates for Scientific Simulations

    Authors: Pradeep Bajracharya, Javier Quetzalcóatl Toledo-Marín, Geoffrey Fox, Shantenu Jha, Linwei Wang

    Abstract: High-performance scientific simulations, important for comprehension of complex systems, encounter computational challenges especially when exploring extensive parameter spaces. There has been an increasing interest in developing deep neural networks (DNNs) as surrogate models capable of accelerating the simulations. However, existing approaches for training these DNN surrogates rely on extensive… ▽ More

    Submitted 12 July, 2024; v1 submitted 10 July, 2024; originally announced July 2024.

    Comments: 17 pages, 9 figures, 1 table

  11. arXiv:2407.05290  [pdf, ps, other

    cs.CR

    Lack of Systematic Approach to Security of IoT Context Sharing Platforms

    Authors: Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha

    Abstract: IoT context-sharing platforms are an essential component of today's interconnected IoT deployments with their security affecting the entire deployment and the critical infrastructure adopting IoT. We report on a lack of systematic approach to the security of IoT context-sharing platforms and propose the need for a methodological and systematic alternative to evaluate the existing solutions and dev… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

    Comments: Accepted to 21st Annual International Conference on Privacy, Security, and Trust (PST2024)

  12. Scaling on Frontier: Uncertainty Quantification Workflow Applications using ExaWorks to Enable Full System Utilization

    Authors: Mikhail Titov, Robert Carson, Matthew Rolchigo, John Coleman, James Belak, Matthew Bement, Daniel Laney, Matteo Turilli, Shantenu Jha

    Abstract: When running at scale, modern scientific workflows require middleware to handle allocated resources, distribute computing payloads and guarantee a resilient execution. While individual steps might not require sophisticated control methods, bringing them together as a whole workflow requires advanced management mechanisms. In this work, we used RADICAL-EnTK (Ensemble Toolkit) - one of the SDK compo… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  13. arXiv:2407.00047  [pdf, other

    cs.DC cs.CL cs.LG

    One Queue Is All You Need: Resolving Head-of-Line Blocking in Large Language Model Serving

    Authors: Archit Patke, Dhemath Reddy, Saurabh Jha, Haoran Qiu, Christian Pinto, Shengkun Cui, Chandra Narayanaswami, Zbigniew Kalbarczyk, Ravishankar Iyer

    Abstract: $ $Large language models (LLMs) have become an increasingly important workload for cloud providers catering to both enterprise and consumer applications. LLM inference requests from these applications have end-to-end latency SLOs that must be adhered to in production settings. However, existing LLM serving systems focus on optimization objectives such as request serving throughput or request execu… ▽ More

    Submitted 5 June, 2024; originally announced July 2024.

  14. arXiv:2406.14875  [pdf, other

    cs.SD eess.AS

    GLOBE: A High-quality English Corpus with Global Accents for Zero-shot Speaker Adaptive Text-to-Speech

    Authors: Wenbin Wang, Yang Song, Sanjay Jha

    Abstract: This paper introduces GLOBE, a high-quality English corpus with worldwide accents, specifically designed to address the limitations of current zero-shot speaker adaptive Text-to-Speech (TTS) systems that exhibit poor generalizability in adapting to speakers with accents. Compared to commonly used English corpora, such as LibriTTS and VCTK, GLOBE is unique in its inclusion of utterances from 23,519… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: Interspeech 2024, 4 pages, 3 figures

  15. arXiv:2406.14315  [pdf, other

    cs.DC

    AI-coupled HPC Workflow Applications, Middleware and Performance

    Authors: Wes Brewer, Ana Gainaru, Frédéric Suter, Feiyi Wang, Murali Emani, Shantenu Jha

    Abstract: AI integration is revolutionizing the landscape of HPC simulations, enhancing the importance, use, and performance of AI-driven HPC workflows. This paper surveys the diverse and rapidly evolving field of AI-driven HPC and provides a common conceptual basis for understanding AI-driven HPC workflows. Specifically, we use insights from different modes of coupling AI into HPC workflows to propose six… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  16. arXiv:2406.10893  [pdf, other

    eess.IV cs.AI cs.CV q-bio.QM q-bio.TO

    Development and Validation of Fully Automatic Deep Learning-Based Algorithms for Immunohistochemistry Reporting of Invasive Breast Ductal Carcinoma

    Authors: Sumit Kumar Jha, Purnendu Mishra, Shubham Mathur, Gursewak Singh, Rajiv Kumar, Kiran Aatre, Suraj Rengarajan

    Abstract: Immunohistochemistry (IHC) analysis is a well-accepted and widely used method for molecular subtyping, a procedure for prognosis and targeted therapy of breast carcinoma, the most common type of tumor affecting women. There are four molecular biomarkers namely progesterone receptor (PR), estrogen receptor (ER), antigen Ki67, and human epidermal growth factor receptor 2 (HER2) whose assessment is n… ▽ More

    Submitted 16 June, 2024; originally announced June 2024.

  17. arXiv:2406.05828  [pdf, other

    cs.CV cs.AI eess.IV

    Multi-Stain Multi-Level Convolutional Network for Multi-Tissue Breast Cancer Image Segmentation

    Authors: Akash Modi, Sumit Kumar Jha, Purnendu Mishra, Rajiv Kumar, Kiran Aatre, Gursewak Singh, Shubham Mathur

    Abstract: Digital pathology and microscopy image analysis are widely employed in the segmentation of digitally scanned IHC slides, primarily to identify cancer and pinpoint regions of interest (ROI) indicative of tumor presence. However, current ROI segmentation models are either stain-specific or suffer from the issues of stain and scanner variance due to different staining protocols or modalities across m… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

  18. arXiv:2405.09854  [pdf, other

    cs.CL

    Striking a Balance between Classical and Deep Learning Approaches in Natural Language Processing Pedagogy

    Authors: Aditya Joshi, Jake Renzella, Pushpak Bhattacharyya, Saurav Jha, Xiangyu Zhang

    Abstract: While deep learning approaches represent the state-of-the-art of natural language processing (NLP) today, classical algorithms and approaches still find a place in NLP textbooks and courses of recent years. This paper discusses the perspectives of conveners of two introductory NLP courses taught in Australia and India, and examines how classical and deep learning approaches can be balanced within… ▽ More

    Submitted 9 July, 2024; v1 submitted 16 May, 2024; originally announced May 2024.

    Comments: Selected for publication at Teaching NLP workshop at ACL 2024; 9 pages + references

  19. arXiv:2405.07764  [pdf, other

    cs.CL cs.SI physics.soc-ph

    LGDE: Local Graph-based Dictionary Expansion

    Authors: Dominik J. Schindler, Sneha Jha, Xixuan Zhang, Kilian Buehling, Annett Heft, Mauricio Barahona

    Abstract: We present Local Graph-based Dictionary Expansion (LGDE), a method for data-driven discovery of the semantic neighbourhood of words using tools from manifold learning and network science. At the heart of LGDE lies the creation of a word similarity graph from the geometry of word embeddings followed by local community detection based on graph diffusion. The diffusion in the local graph manifold all… ▽ More

    Submitted 18 July, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Comments: Python code available at: https://github.com/barahona-research-group/LGDE

  20. arXiv:2405.07333  [pdf, other

    quant-ph cs.DC

    Quantum Mini-Apps: A Framework for Developing and Benchmarking Quantum-HPC Applications

    Authors: Nishant Saurabh, Pradeep Mantha, Florian J. Kiwit, Shantenu Jha, Andre Luckow

    Abstract: With the increasing maturity and scale of quantum hardware and its integration into HPC systems, there is a need to develop robust techniques for developing, characterizing, and benchmarking quantum-HPC applications and middleware systems. This requires a better understanding of interaction, coupling, and common execution patterns between quantum and classical workload tasks and components. This p… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: 9 pages, 4 figures

  21. arXiv:2405.03513  [pdf, other

    cs.CR cs.CE

    QBER: Quantifying Cyber Risks for Strategic Decisions

    Authors: Muriel Figueredo Franco, Aiatur Rahaman Mullick, Santosh Jha

    Abstract: Quantifying cyber risks is essential for organizations to grasp their vulnerability to threats and make informed decisions. However, current approaches still need to work on blending economic viewpoints to provide insightful analysis. To bridge this gap, we introduce QBER approach to offer decision-makers measurable risk metrics. The QBER evaluates losses from cyberattacks, performs detailed risk… ▽ More

    Submitted 6 May, 2024; originally announced May 2024.

    Comments: 10 pages, 9 equations, 3 tables, 2 figures

  22. arXiv:2404.18094  [pdf, other

    cs.SD cs.AI cs.CL eess.AS

    USAT: A Universal Speaker-Adaptive Text-to-Speech Approach

    Authors: Wenbin Wang, Yang Song, Sanjay Jha

    Abstract: Conventional text-to-speech (TTS) research has predominantly focused on enhancing the quality of synthesized speech for speakers in the training dataset. The challenge of synthesizing lifelike speech for unseen, out-of-dataset speakers, especially those with limited reference data, remains a significant and unresolved problem. While zero-shot or few-shot speaker-adaptive TTS approaches have been e… ▽ More

    Submitted 28 April, 2024; originally announced April 2024.

    Comments: 15 pages, 13 figures. Copyright has been transferred to IEEE

    Journal ref: IEEE/ACM Transactions on Audio, Speech and Language Processing, 2024

  23. arXiv:2404.15293  [pdf, other

    eess.IV cs.GR q-bio.NC

    Interactive Manipulation and Visualization of 3D Brain MRI for Surgical Training

    Authors: Siddharth Jha, Zichen Gui, Benjamin Delbos, Richard Moreau, Arnaud Leleve, Irene Cheng

    Abstract: In modern medical diagnostics, magnetic resonance imaging (MRI) is an important technique that provides detailed insights into anatomical structures. In this paper, we present a comprehensive methodology focusing on streamlining the segmentation, reconstruction, and visualization process of 3D MRI data. Segmentation involves the extraction of anatomical regions with the help of state-of-the-art de… ▽ More

    Submitted 24 March, 2024; originally announced April 2024.

  24. arXiv:2404.08509  [pdf, other

    cs.DC cs.CL cs.LG

    Efficient Interactive LLM Serving with Proxy Model-based Sequence Length Prediction

    Authors: Haoran Qiu, Weichao Mao, Archit Patke, Shengkun Cui, Saurabh Jha, Chen Wang, Hubertus Franke, Zbigniew T. Kalbarczyk, Tamer Başar, Ravishankar K. Iyer

    Abstract: Large language models (LLMs) have been driving a new wave of interactive AI applications across numerous domains. However, efficiently serving LLM inference requests is challenging due to their unpredictable execution times originating from the autoregressive nature of generative models. Existing LLM serving systems exploit first-come-first-serve (FCFS) scheduling, suffering from head-of-line bloc… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

    Comments: Accepted at AIOps'24

  25. arXiv:2404.07139  [pdf, other

    cs.AI cs.GT

    Towards a Game-theoretic Understanding of Explanation-based Membership Inference Attacks

    Authors: Kavita Kumari, Murtuza Jadliwala, Sumit Kumar Jha, Anindya Maiti

    Abstract: Model explanations improve the transparency of black-box machine learning (ML) models and their decisions; however, they can also be exploited to carry out privacy threats such as membership inference attacks (MIA). Existing works have only analyzed MIA in a single "what if" interaction scenario between an adversary and the target ML model; thus, it does not discern the factors impacting the capab… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: arXiv admin note: text overlap with arXiv:2202.02659

  26. arXiv:2403.19837  [pdf, other

    cs.LG cs.AI cs.CL cs.CV cs.LO

    Concept-based Analysis of Neural Networks via Vision-Language Models

    Authors: Ravi Mangal, Nina Narodytska, Divya Gopinath, Boyue Caroline Hu, Anirban Roy, Susmit Jha, Corina Pasareanu

    Abstract: The analysis of vision-based deep neural networks (DNNs) is highly desirable but it is very challenging due to the difficulty of expressing formal specifications for vision tasks and the lack of efficient verification procedures. In this paper, we propose to leverage emerging multimodal, vision-language, foundation models (VLMs) as a lens through which we can reason about vision models. VLMs have… ▽ More

    Submitted 10 April, 2024; v1 submitted 28 March, 2024; originally announced March 2024.

  27. arXiv:2403.19137  [pdf, other

    cs.CV

    CLAP4CLIP: Continual Learning with Probabilistic Finetuning for Vision-Language Models

    Authors: Saurav Jha, Dong Gong, Lina Yao

    Abstract: Continual learning (CL) aims to help deep neural networks to learn new knowledge while retaining what has been learned. Recently, pre-trained vision-language models such as CLIP, with powerful generalizability, have been gaining traction as practical CL candidates. However, the domain mismatch between the pre-training and the downstream CL tasks calls for finetuning of the CLIP on the latter. The… ▽ More

    Submitted 23 May, 2024; v1 submitted 28 March, 2024; originally announced March 2024.

    Comments: Work under review

  28. arXiv:2403.18073  [pdf, other

    cs.DC

    Workflow Mini-Apps: Portable, Scalable, Tunable & Faithful Representations of Scientific Workflows

    Authors: Ozgur Ozan Kilic, Tianle Wang, Matteo Turilli, Mikhail Titov, Andre Merzky, Line Pouchard, Shantenu Jha

    Abstract: Workflows are critical for scientific discovery. However, the sophistication, heterogeneity, and scale of workflows make building, testing, and optimizing them increasingly challenging. Furthermore, their complexity and heterogeneity make performance reproducibility hard. In this paper, we propose workflow mini-apps as a tool to address the challenges in building and testing workflows while contro… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

  29. arXiv:2403.17155  [pdf, other

    cs.CL cs.CR

    Task-Agnostic Detector for Insertion-Based Backdoor Attacks

    Authors: Weimin Lyu, Xiao Lin, Songzhu Zheng, Lu Pang, Haibin Ling, Susmit Jha, Chao Chen

    Abstract: Textual backdoor attacks pose significant security threats. Current detection approaches, typically relying on intermediate feature representation or reconstructing potential triggers, are task-specific and less effective beyond sentence classification, struggling with tasks like question answering and named entity recognition. We introduce TABDet (Task-Agnostic Backdoor Detector), a pioneering ta… ▽ More

    Submitted 25 March, 2024; originally announced March 2024.

    Comments: Findings of NAACL 2024

  30. arXiv:2403.15721  [pdf, other

    cs.DC

    Design and Implementation of an Analysis Pipeline for Heterogeneous Data

    Authors: Arup Kumar Sarker, Aymen Alsaadi, Niranda Perera, Mills Staylor, Gregor von Laszewski, Matteo Turilli, Ozgur Ozan Kilic, Mikhail Titov, Andre Merzky, Shantenu Jha, Geoffrey Fox

    Abstract: Managing and preparing complex data for deep learning, a prevalent approach in large-scale data science can be challenging. Data transfer for model training also presents difficulties, impacting scientific fields like genomics, climate modeling, and astronomy. A large-scale solution like Google Pathways with a distributed execution environment for deep learning models exists but is proprietary. In… ▽ More

    Submitted 7 April, 2024; v1 submitted 23 March, 2024; originally announced March 2024.

    Comments: 14 pages, 16 figures, 2 tables

    ACM Class: H.2.4; D.2.7; D.2.2

  31. Loss Regularizing Robotic Terrain Classification

    Authors: Shakti Deo Kumar, Sudhanshu Tripathi, Krishna Ujjwal, Sarvada Sakshi Jha, Suddhasil De

    Abstract: Locomotion mechanics of legged robots are suitable when pacing through difficult terrains. Recognising terrains for such robots are important to fully yoke the versatility of their movements. Consequently, robotic terrain classification becomes significant to classify terrains in real time with high accuracy. The conventional classifiers suffer from overfitting problem, low accuracy problem, high… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Preliminary draft of the work published in IEEE conference 2023

  32. arXiv:2402.18649  [pdf, other

    cs.CR cs.AI

    A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems

    Authors: Fangzhou Wu, Ning Zhang, Somesh Jha, Patrick McDaniel, Chaowei Xiao

    Abstract: Large Language Model (LLM) systems are inherently compositional, with individual LLM serving as the core foundation with additional layers of objects such as plugins, sandbox, and so on. Along with the great potential, there are also increasing concerns over the security of such probabilistic intelligent systems. However, existing studies on LLM security often focus on individual LLM, but without… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

  33. arXiv:2402.15911  [pdf, other

    cs.CR cs.CL

    PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

    Authors: Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash

    Abstract: Large language models (LLMs) are typically aligned to be harmless to humans. Unfortunately, recent work has shown that such models are susceptible to automated jailbreak attacks that induce them to generate harmful content. More recent LLMs often incorporate an additional layer of defense, a Guard Model, which is a second LLM that is designed to check and moderate the output response of the primar… ▽ More

    Submitted 24 February, 2024; originally announced February 2024.

  34. arXiv:2402.05980  [pdf, other

    cs.SE cs.AI cs.LG cs.PL

    Do Large Code Models Understand Programming Concepts? A Black-box Approach

    Authors: Ashish Hooda, Mihai Christodorescu, Miltiadis Allamanis, Aaron Wilson, Kassem Fawaz, Somesh Jha

    Abstract: Large Language Models' success on text generation has also made them better at code generation and coding tasks. While a lot of work has demonstrated their remarkable performance on tasks such as code completion and editing, it is still unclear as to why. We help bridge this gap by exploring to what degree auto-regressive models understand the logical constructs of the underlying programs. We prop… ▽ More

    Submitted 23 February, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

  35. arXiv:2402.02047  [pdf, other

    cs.SE cs.LG

    Calibration and Correctness of Language Models for Code

    Authors: Claudio Spiess, David Gros, Kunal Suresh Pai, Michael Pradel, Md Rafiqul Islam Rabin, Amin Alipour, Susmit Jha, Prem Devanbu, Toufique Ahmed

    Abstract: Machine learning models are widely used but can also often be wrong. Users would benefit from a reliable indication of whether a given output from a given model should be trusted, so a rational decision can be made whether to use the output or not. For example, outputs can be associated with a confidence measure; if this confidence measure is strongly associated with likelihood of correctness, the… ▽ More

    Submitted 16 February, 2024; v1 submitted 3 February, 2024; originally announced February 2024.

  36. arXiv:2401.07886  [pdf, other

    cs.LG cs.AI cs.CL cs.DC

    Learned Best-Effort LLM Serving

    Authors: Siddharth Jha, Coleman Hooper, Xiaoxuan Liu, Sehoon Kim, Kurt Keutzer

    Abstract: Many applications must provide low-latency LLM service to users or risk unacceptable user experience. However, over-provisioning resources to serve fluctuating request patterns is often prohibitively expensive. In this work, we present a best-effort serving system that employs deep reinforcement learning to adjust service quality based on the task distribution and system load. Our best-effort syst… ▽ More

    Submitted 14 July, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

    Comments: Es-FoMo @ ICML 2024

  37. arXiv:2311.13713  [pdf, other

    cs.CR cs.CV cs.LG

    A Somewhat Robust Image Watermark against Diffusion-based Editing Models

    Authors: Mingtian Tan, Tianhao Wang, Somesh Jha

    Abstract: Recently, diffusion models (DMs) have become the state-of-the-art method for image synthesis. Editing models based on DMs, known for their high fidelity and precision, have inadvertently introduced new challenges related to image copyright infringement and malicious editing. Our work is the first to formalize and address this issue. After assessing and attempting to enhance traditional image water… ▽ More

    Submitted 7 December, 2023; v1 submitted 22 November, 2023; originally announced November 2023.

  38. arXiv:2311.10571  [pdf, other

    stat.ML cs.LG stat.CO

    Direct Amortized Likelihood Ratio Estimation

    Authors: Adam D. Cobb, Brian Matejek, Daniel Elenius, Anirban Roy, Susmit Jha

    Abstract: We introduce a new amortized likelihood ratio estimator for likelihood-free simulation-based inference (SBI). Our estimator is simple to train and estimates the likelihood ratio using a single forward pass of the neural estimator. Our approach directly computes the likelihood ratio between two competing parameter sets which is different from the previous approach of comparing two neural network ou… ▽ More

    Submitted 17 November, 2023; originally announced November 2023.

    Comments: 12 Pages, 10 Figures, GitHub: https://github.com/SRI-CSL/dnre

  39. arXiv:2311.04824  [pdf, other

    cs.DB cs.DC cs.PL

    Bilevel Relations and Their Applications to Data Insights

    Authors: Xi Wu, Xiangyao Yu, Shaleen Deep, Ahmed Mahmood, Uyeong Jang, Stratis Viglas, Somesh Jha, John Cieslewicz, Jeffrey F. Naughton

    Abstract: Many data-insight analytic tasks in anomaly detection, metric attribution, and experimentation analysis can be modeled as searching in a large space of tables and finding important ones, where the notion of importance is defined in some adhoc manner. While various frameworks have been proposed (e.g., DIFF, VLDB 2019), a systematic and general treatment is lacking. This paper describes bilevel rela… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Comments: Some overlap on examples and experiments with arXiv:2302.00120. The latter draft will be revised to focus on implementation

  40. arXiv:2311.00429  [pdf, other

    eess.IV cs.LG

    Crop Disease Classification using Support Vector Machines with Green Chromatic Coordinate (GCC) and Attention based feature extraction for IoT based Smart Agricultural Applications

    Authors: Shashwat Jha, Vishvaditya Luhach, Gauri Shanker Gupta, Beependra Singh

    Abstract: Crops hold paramount significance as they serve as the primary provider of energy, nutrition, and medicinal benefits for the human population. Plant diseases, however, can negatively affect leaves during agricultural cultivation, resulting in significant losses in crop output and economic value. Therefore, it is crucial for farmers to identify crop diseases. However, this method frequently necessi… ▽ More

    Submitted 6 November, 2023; v1 submitted 1 November, 2023; originally announced November 2023.

  41. arXiv:2310.19272  [pdf, other

    cs.LG cs.AI cs.CV

    NPCL: Neural Processes for Uncertainty-Aware Continual Learning

    Authors: Saurav Jha, Dong Gong, He Zhao, Lina Yao

    Abstract: Continual learning (CL) aims to train deep neural networks efficiently on streaming data while limiting the forgetting caused by new tasks. However, learning transferable knowledge with less interference between tasks is difficult, and real-world deployment of CL models is limited by their inability to measure predictive uncertainties. To address these issues, we propose handling CL tasks with neu… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: Accepted as a poster at NeurIPS 2023

  42. arXiv:2310.19137  [pdf, other

    cs.LG cs.AI

    Automaton Distillation: Neuro-Symbolic Transfer Learning for Deep Reinforcement Learning

    Authors: Suraj Singireddy, Andre Beckus, George Atia, Sumit Jha, Alvaro Velasquez

    Abstract: Reinforcement learning (RL) is a powerful tool for finding optimal policies in sequential decision processes. However, deep RL methods suffer from two weaknesses: collecting the amount of agent experience required for practical RL problems is prohibitively expensive, and the learned policies exhibit poor generalization on tasks outside of the training distribution. To mitigate these issues, we int… ▽ More

    Submitted 29 October, 2023; originally announced October 2023.

  43. arXiv:2310.18924  [pdf, other

    cs.LG

    Remaining useful life prediction of Lithium-ion batteries using spatio-temporal multimodal attention networks

    Authors: Sungho Suh, Dhruv Aditya Mittal, Hymalai Bello, Bo Zhou, Mayank Shekhar Jha, Paul Lukowicz

    Abstract: Lithium-ion batteries are widely used in various applications, including electric vehicles and renewable energy storage. The prediction of the remaining useful life (RUL) of batteries is crucial for ensuring reliable and efficient operation, as well as reducing maintenance costs. However, determining the life cycle of batteries in real-world scenarios is challenging, and existing methods have limi… ▽ More

    Submitted 6 June, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

  44. arXiv:2310.18491  [pdf, other

    cs.LG cs.CL cs.CR

    Publicly-Detectable Watermarking for Language Models

    Authors: Jaiden Fairoze, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang

    Abstract: We present a highly detectable, trustless watermarking scheme for LLMs: the detection algorithm contains no secret information, and it is executable by anyone. We embed a publicly-verifiable cryptographic signature into LLM output using rejection sampling. We prove that our scheme is cryptographically correct, sound, and distortion-free. We make novel uses of error-correction techniques to overcom… ▽ More

    Submitted 28 May, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

  45. arXiv:2310.17064  [pdf, other

    cs.AI cs.CL cs.LG cs.LO

    math-PVS: A Large Language Model Framework to Map Scientific Publications to PVS Theories

    Authors: Hassen Saidi, Susmit Jha, Tuhin Sahai

    Abstract: As artificial intelligence (AI) gains greater adoption in a wide variety of applications, it has immense potential to contribute to mathematical discovery, by guiding conjecture generation, constructing counterexamples, assisting in formalizing mathematics, and discovering connections between different mathematical areas, to name a few. While prior work has leveraged computers for exhaustive mat… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

  46. arXiv:2310.16678  [pdf, other

    cs.LG cs.CR

    Robust and Actively Secure Serverless Collaborative Learning

    Authors: Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, Xiao Wang

    Abstract: Collaborative machine learning (ML) is widely used to enable institutions to learn better models from distributed data. While collaborative approaches to learning intuitively protect user data, they remain vulnerable to either the server, the clients, or both, deviating from the protocol. Indeed, because the protocol is asymmetric, a malicious server can abuse its power to reconstruct client data… ▽ More

    Submitted 25 October, 2023; originally announced October 2023.

    Comments: Accepted at NeurIPS 2023

  47. arXiv:2310.11689  [pdf, other

    cs.CL cs.LG

    Adaptation with Self-Evaluation to Improve Selective Prediction in LLMs

    Authors: Jiefeng Chen, Jinsung Yoon, Sayna Ebrahimi, Sercan O Arik, Tomas Pfister, Somesh Jha

    Abstract: Large language models (LLMs) have recently shown great advances in a variety of tasks, including natural language understanding and generation. However, their use in high-stakes decision-making scenarios is still limited due to the potential for errors. Selective prediction is a technique that can be used to improve the reliability of the LLMs by allowing them to abstain from making predictions wh… ▽ More

    Submitted 11 November, 2023; v1 submitted 17 October, 2023; originally announced October 2023.

    Comments: Paper published at Findings of the Association for Computational Linguistics: EMNLP, 2023

  48. arXiv:2310.08015  [pdf, other

    cs.LG cs.CR

    Why Train More? Effective and Efficient Membership Inference via Memorization

    Authors: Jihye Choi, Shruti Tople, Varun Chandrasekaran, Somesh Jha

    Abstract: Membership Inference Attacks (MIAs) aim to identify specific data samples within the private training dataset of machine learning models, leading to serious privacy violations and other sophisticated threats. Many practical black-box MIAs require query access to the data distribution (the same distribution where the private data is drawn) to train shadow models. By doing so, the adversary obtains… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

  49. arXiv:2310.06758  [pdf, other

    cs.SE cs.PL

    slash: A Technique for Static Configuration-Logic Identification

    Authors: Mohannad Alhanahnah, Philipp Schubert, Thomas Reps, Somesh Jha, Eric Bodden

    Abstract: Researchers have recently devised tools for debloating software and detecting configuration errors. Several of these tools rely on the observation that programs are composed of an initialization phase followed by a main-computation phase. Users of these tools are required to manually annotate the boundary that separates these phases, a task that can be time-consuming and error-prone (typically, th… ▽ More

    Submitted 20 November, 2023; v1 submitted 10 October, 2023; originally announced October 2023.

  50. arXiv:2310.03371  [pdf, ps, other

    cs.IT cs.DC

    Fundamental Limits of Distributed Optimization over Multiple Access Channel

    Authors: Shubham Jha

    Abstract: We consider distributed optimization over a $d$-dimensional space, where $K$ remote clients send coded gradient estimates over an {\em additive Gaussian Multiple Access Channel (MAC)} with noise variance $σ_z^2$. Furthermore, the codewords from the clients must satisfy the average power constraint $P$, resulting in a signal-to-noise ratio (SNR) of $KP/σ_z^2$. In this paper, we study the fundamen… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

    Comments: Submitted to IEEE for possible publication