Skip to main content

Showing 1–26 of 26 results for author: Zhou, J P

.
  1. arXiv:2505.21666  [pdf, ps, other

    cs.LG cs.AI

    Efficient Controllable Diffusion via Optimal Classifier Guidance

    Authors: Owen Oertell, Shikun Sun, Yiding Chen, Jin Peng Zhou, Zhiyong Wang, Wen Sun

    Abstract: The controllable generation of diffusion models aims to steer the model to generate samples that optimize some given objective functions. It is desirable for a variety of applications including image generation, molecule generation, and DNA/sequence generation. Reinforcement Learning (RL) based fine-tuning of the base model is a popular approach but it can overfit the reward function while requiri… ▽ More

    Submitted 27 May, 2025; originally announced May 2025.

    Comments: 28 pages, 9 figures, 3 tables

  2. arXiv:2505.17373  [pdf, other

    cs.LG cs.AI cs.CL

    Value-Guided Search for Efficient Chain-of-Thought Reasoning

    Authors: Kaiwen Wang, Jin Peng Zhou, Jonathan Chang, Zhaolin Gao, Nathan Kallus, Kianté Brantley, Wen Sun

    Abstract: In this paper, we propose a simple and efficient method for value model training on long-context reasoning traces. Compared to existing process reward models (PRMs), our method does not require a fine-grained notion of "step," which is difficult to define for long-context reasoning models. By collecting a dataset of 2.5 million reasoning traces, we train a 1.5B token-level value model and apply it… ▽ More

    Submitted 22 May, 2025; originally announced May 2025.

  3. arXiv:2505.15962  [pdf, ps, other

    cs.CL cs.AI cs.LG

    Pre-training Large Memory Language Models with Internal and External Knowledge

    Authors: Linxi Zhao, Sofian Zalouk, Christian K. Belardi, Justin Lovelace, Jin Peng Zhou, Kilian Q. Weinberger, Yoav Artzi, Jennifer J. Sun

    Abstract: Neural language models are black-boxes -- both linguistic patterns and factual knowledge are distributed across billions of opaque parameters. This entangled encoding makes it difficult to reliably inspect, verify, or update specific facts. We propose a new class of language models, Large Memory Language Models (LMLM) with a pre-training recipe that stores factual knowledge in both internal weight… ▽ More

    Submitted 21 May, 2025; originally announced May 2025.

  4. arXiv:2504.16999  [pdf, other

    quant-ph

    Learning to decode logical circuits

    Authors: Yiqing Zhou, Chao Wan, Yichen Xu, Jin Peng Zhou, Kilian Q. Weinberger, Eun-Ah Kim

    Abstract: With the development of quantum hardware bringing the error-corrected quantum circuits to the near future, the lack of an efficient polynomial-time decoding algorithms for logical circuits presents a critical bottleneck. While quantum memory decoding has been well-studied, inevitable correlated errors introduced by entangling logical gates prevent the straightforward generalization of quantum memo… ▽ More

    Submitted 23 April, 2025; originally announced April 2025.

    Comments: Main text: 8 pages, 5 figures; supplementary materials: 6 pages, 2 figures

  5. arXiv:2503.13660  [pdf, other

    cs.RO cs.AI cs.FL eess.SY

    INPROVF: Leveraging Large Language Models to Repair High-level Robot Controllers from Assumption Violations

    Authors: Qian Meng, Jin Peng Zhou, Kilian Q. Weinberger, Hadas Kress-Gazit

    Abstract: This paper presents INPROVF, an automatic framework that combines large language models (LLMs) and formal methods to speed up the repair process of high-level robot controllers. Previous approaches based solely on formal methods are computationally expensive and cannot scale to large state spaces. In contrast, INPROVF uses LLMs to generate repair candidates, and formal methods to verify their corr… ▽ More

    Submitted 17 March, 2025; originally announced March 2025.

    Comments: To appear in ICLR 2025 Workshop: VerifAI: AI Verification in the Wild; in submission to 2025 IEEE 21th International Conference on Automation Science and Engineering (CASE), Los Angeles, CA, USA: IEEE, Aug. 2025

  6. arXiv:2502.20548  [pdf, other

    cs.LG cs.AI cs.CL

    $Q\sharp$: Provably Optimal Distributional RL for LLM Post-Training

    Authors: Jin Peng Zhou, Kaiwen Wang, Jonathan Chang, Zhaolin Gao, Nathan Kallus, Kilian Q. Weinberger, Kianté Brantley, Wen Sun

    Abstract: Reinforcement learning (RL) post-training is crucial for LLM alignment and reasoning, but existing policy-based methods, such as PPO and DPO, can fall short of fixing shortcuts inherited from pre-training. In this work, we introduce $Q\sharp$, a value-based algorithm for KL-regularized RL that guides the reference policy using the optimal regularized $Q$ function. We propose to learn the optimal… ▽ More

    Submitted 27 February, 2025; originally announced February 2025.

  7. arXiv:2502.19301  [pdf, other

    cs.LG

    Rethinking LLM Unlearning Objectives: A Gradient Perspective and Go Beyond

    Authors: Qizhou Wang, Jin Peng Zhou, Zhanke Zhou, Saebyeol Shin, Bo Han, Kilian Q. Weinberger

    Abstract: Large language models (LLMs) should undergo rigorous audits to identify potential risks, such as copyright and privacy infringements. Once these risks emerge, timely updates are crucial to remove undesirable responses, ensuring legal and safe model usage. It has spurred recent research into LLM unlearning, focusing on erasing targeted undesirable knowledge without compromising the integrity of oth… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

  8. arXiv:2502.10961  [pdf, other

    cs.LG cs.AI

    Graders should cheat: privileged information enables expert-level automated evaluations

    Authors: Jin Peng Zhou, Sébastien M. R. Arnold, Nan Ding, Kilian Q. Weinberger, Nan Hua, Fei Sha

    Abstract: Auto-evaluating language models (LMs), i.e., using a grader LM to evaluate the candidate LM, is an appealing way to accelerate the evaluation process and the cost associated with it. But this presents a paradox: how can we trust the grader LM, which is presumably weaker than the candidate LM, to assess problems that are beyond the frontier of the capabilities of either model or both? For instance,… ▽ More

    Submitted 15 February, 2025; originally announced February 2025.

  9. arXiv:2412.19759  [pdf, other

    cs.AI

    Enhancing Cognitive Diagnosis by Modeling Learner Cognitive Structure State

    Authors: Zhifu Chen, Hengnian Gu, Jin Peng Zhou, Dongdai Zhou

    Abstract: Cognitive diagnosis represents a fundamental research area within intelligent education, with the objective of measuring the cognitive status of individuals. Theoretically, an individual's cognitive state is essentially equivalent to their cognitive structure state. Cognitive structure state comprises two key components: knowledge state (KS) and knowledge structure state (KUS). The knowledge state… ▽ More

    Submitted 27 December, 2024; originally announced December 2024.

  10. arXiv:2412.16708  [pdf, other

    cs.IR

    Towards More Robust Retrieval-Augmented Generation: Evaluating RAG Under Adversarial Poisoning Attacks

    Authors: Jinyan Su, Jin Peng Zhou, Zhengxin Zhang, Preslav Nakov, Claire Cardie

    Abstract: Retrieval-Augmented Generation (RAG) systems have emerged as a promising solution to mitigate LLM hallucinations and enhance their performance in knowledge-intensive domains. However, these systems are vulnerable to adversarial poisoning attacks, where malicious passages injected into retrieval databases can mislead the model into generating factually incorrect outputs. In this paper, we investiga… ▽ More

    Submitted 21 December, 2024; originally announced December 2024.

  11. arXiv:2408.00118  [pdf, other

    cs.CL cs.AI

    Gemma 2: Improving Open Language Models at a Practical Size

    Authors: Gemma Team, Morgane Riviere, Shreya Pathak, Pier Giuseppe Sessa, Cassidy Hardin, Surya Bhupatiraju, Léonard Hussenot, Thomas Mesnard, Bobak Shahriari, Alexandre Ramé, Johan Ferret, Peter Liu, Pouya Tafti, Abe Friesen, Michelle Casbon, Sabela Ramos, Ravin Kumar, Charline Le Lan, Sammy Jerome, Anton Tsitsulin, Nino Vieillard, Piotr Stanczyk, Sertan Girgin, Nikola Momchev, Matt Hoffman , et al. (173 additional authors not shown)

    Abstract: In this work, we introduce Gemma 2, a new addition to the Gemma family of lightweight, state-of-the-art open models, ranging in scale from 2 billion to 27 billion parameters. In this new version, we apply several known technical modifications to the Transformer architecture, such as interleaving local-global attentions (Beltagy et al., 2020a) and group-query attention (Ainslie et al., 2023). We al… ▽ More

    Submitted 2 October, 2024; v1 submitted 31 July, 2024; originally announced August 2024.

  12. arXiv:2407.06172  [pdf, other

    cs.AI cs.CL

    On Speeding Up Language Model Evaluation

    Authors: Jin Peng Zhou, Christian K. Belardi, Ruihan Wu, Travis Zhang, Carla P. Gomes, Wen Sun, Kilian Q. Weinberger

    Abstract: Developing prompt-based methods with Large Language Models (LLMs) requires making numerous decisions, which give rise to a combinatorial search problem over hyper-parameters. This exhaustive evaluation can be time-consuming and costly. In this paper, we propose an $\textit{adaptive}$ approach to explore this space. We are exploiting the fact that often only few samples are needed to identify clear… ▽ More

    Submitted 26 February, 2025; v1 submitted 8 July, 2024; originally announced July 2024.

    Comments: ICLR 2025

  13. arXiv:2407.04181  [pdf, other

    cs.AI cs.CL

    Orchestrating LLMs with Different Personalizations

    Authors: Jin Peng Zhou, Katie Z Luo, Jingwen Gu, Jason Yuan, Kilian Q. Weinberger, Wen Sun

    Abstract: This paper presents a novel approach to aligning large language models (LLMs) with individual human preferences, sometimes referred to as Reinforcement Learning from \textit{Personalized} Human Feedback (RLPHF). Given stated preferences along multiple dimensions, such as helpfulness, conciseness, or humor, the goal is to create an LLM without re-training that best adheres to this specification. St… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  14. arXiv:2405.17503  [pdf, other

    cs.SE cs.AI cs.CL cs.PL

    Code Repair with LLMs gives an Exploration-Exploitation Tradeoff

    Authors: Hao Tang, Keya Hu, Jin Peng Zhou, Sicheng Zhong, Wei-Long Zheng, Xujie Si, Kevin Ellis

    Abstract: Iteratively improving and repairing source code with large language models (LLMs), known as refinement, has emerged as a popular way of generating programs that would be too complex to construct in one shot. Given a bank of test cases, together with a candidate program, an LLM can improve that program by being prompted with failed test cases. But it remains an open question how to best iteratively… ▽ More

    Submitted 29 October, 2024; v1 submitted 26 May, 2024; originally announced May 2024.

  15. arXiv:2405.11632  [pdf, other

    quant-ph

    Attention to Quantum Complexity

    Authors: Hyejin Kim, Yiqing Zhou, Yichen Xu, Kaarthik Varma, Amir H. Karamlou, Ilan T. Rosen, Jesse C. Hoke, Chao Wan, Jin Peng Zhou, William D. Oliver, Yuri D. Lensky, Kilian Q. Weinberger, Eun-Ah Kim

    Abstract: The imminent era of error-corrected quantum computing urgently demands robust methods to characterize complex quantum states, even from limited and noisy measurements. We introduce the Quantum Attention Network (QuAN), a versatile classical AI framework leveraging the power of attention mechanisms specifically tailored to address the unique challenges of learning quantum complexity. Inspired by la… ▽ More

    Submitted 20 November, 2024; v1 submitted 19 May, 2024; originally announced May 2024.

  16. arXiv:2403.18120  [pdf, other

    cs.AI cs.CL cs.LG

    Don't Trust: Verify -- Grounding LLM Quantitative Reasoning with Autoformalization

    Authors: Jin Peng Zhou, Charles Staats, Wenda Li, Christian Szegedy, Kilian Q. Weinberger, Yuhuai Wu

    Abstract: Large language models (LLM), such as Google's Minerva and OpenAI's GPT families, are becoming increasingly capable of solving mathematical quantitative reasoning problems. However, they still make unjustified logical and computational errors in their reasoning steps and answers. In this paper, we leverage the fact that if the training corpus of LLMs contained sufficiently many examples of formal m… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.

    Comments: ICLR 2024

  17. arXiv:2402.17032  [pdf, other

    cs.AI cs.LG

    REFACTOR: Learning to Extract Theorems from Proofs

    Authors: Jin Peng Zhou, Yuhuai Wu, Qiyang Li, Roger Grosse

    Abstract: Human mathematicians are often good at recognizing modular and reusable theorems that make complex mathematical results within reach. In this paper, we propose a novel method called theoREm-from-prooF extrACTOR (REFACTOR) for training neural networks to mimic this ability in formal mathematical theorem proving. We show on a set of unseen proofs, REFACTOR is able to extract 19.6% of the theorems th… ▽ More

    Submitted 26 February, 2024; originally announced February 2024.

    Comments: ICLR 2024

  18. arXiv:2402.03292  [pdf, ps, other

    cs.LG cs.CV

    Detecting Out-of-Distribution Objects through Class-Conditioned Inpainting

    Authors: Quang-Huy Nguyen, Jin Peng Zhou, Zhenzhen Liu, Khanh-Huyen Bui, Kilian Q. Weinberger, Wei-Lun Chao, Dung D. Le

    Abstract: Recent object detectors have achieved impressive accuracy in identifying objects seen during training. However, real-world deployment often introduces novel and unexpected objects, referred to as out-of-distribution (OOD) objects, posing significant challenges to model trustworthiness. Modern object detectors are typically overconfident, making it unreliable to use their predictions alone for OOD… ▽ More

    Submitted 9 June, 2025; v1 submitted 5 February, 2024; originally announced February 2024.

  19. arXiv:2310.16176  [pdf, other

    cs.CL cs.AI

    Correction with Backtracking Reduces Hallucination in Summarization

    Authors: Zhenzhen Liu, Chao Wan, Varsha Kishore, Jin Peng Zhou, Minmin Chen, Kilian Q. Weinberger

    Abstract: Abstractive summarization aims at generating natural language summaries of a source document that are succinct while preserving the important elements. Despite recent advances, neural text summarization models are known to be susceptible to hallucinating (or more correctly confabulating), that is to produce summaries with details that are not grounded in the source document. In this paper, we intr… ▽ More

    Submitted 3 September, 2024; v1 submitted 24 October, 2023; originally announced October 2023.

  20. arXiv:2303.04488  [pdf, other

    cs.LG cs.AI cs.LO

    Magnushammer: A Transformer-Based Approach to Premise Selection

    Authors: Maciej Mikuła, Szymon Tworkowski, Szymon Antoniak, Bartosz Piotrowski, Albert Qiaochu Jiang, Jin Peng Zhou, Christian Szegedy, Łukasz Kuciński, Piotr Miłoś, Yuhuai Wu

    Abstract: This paper presents a novel approach to premise selection, a crucial reasoning task in automated theorem proving. Traditionally, symbolic methods that rely on extensive domain knowledge and engineering effort are applied to this task. In contrast, this work demonstrates that contrastive training with the transformer architecture can achieve higher-quality retrieval of relevant premises, without th… ▽ More

    Submitted 18 March, 2024; v1 submitted 8 March, 2023; originally announced March 2023.

    Comments: ICLR 2024

  21. arXiv:2302.10326  [pdf, other

    cs.CV cs.LG

    Unsupervised Out-of-Distribution Detection with Diffusion Inpainting

    Authors: Zhenzhen Liu, Jin Peng Zhou, Yufan Wang, Kilian Q. Weinberger

    Abstract: Unsupervised out-of-distribution detection (OOD) seeks to identify out-of-domain data by learning only from unlabeled in-domain data. We present a novel approach for this task - Lift, Map, Detect (LMD) - that leverages recent advancement in diffusion models. Diffusion models are one type of generative models. At their core, they learn an iterative denoising process that gradually maps a noisy imag… ▽ More

    Submitted 16 August, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: ICML 2023

  22. arXiv:2212.10318  [pdf, other

    cs.CR cs.LG

    Learned Systems Security

    Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot

    Abstract: A learned system uses machine learning (ML) internally to improve performance. We can expect such systems to be vulnerable to some adversarial-ML attacks. Often, the learned component is shared between mutually-distrusting users or processes, much like microarchitectural resources such as caches, potentially giving rise to highly-realistic attacker models. However, compared to attacks on other ML-… ▽ More

    Submitted 10 January, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

  23. arXiv:2210.12283  [pdf, other

    cs.AI cs.LG

    Draft, Sketch, and Prove: Guiding Formal Theorem Provers with Informal Proofs

    Authors: Albert Q. Jiang, Sean Welleck, Jin Peng Zhou, Wenda Li, Jiacheng Liu, Mateja Jamnik, Timothée Lacroix, Yuhuai Wu, Guillaume Lample

    Abstract: The formalization of existing mathematical proofs is a notoriously difficult process. Despite decades of research on automation and proof assistants, writing formal proofs remains arduous and only accessible to a few experts. While previous studies to automate formalization focused on powerful search algorithms, no attempts were made to take advantage of available informal proofs. In this work, we… ▽ More

    Submitted 20 February, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

  24. arXiv:2202.12968  [pdf, other

    cs.LG

    Does Label Differential Privacy Prevent Label Inference Attacks?

    Authors: Ruihan Wu, Jin Peng Zhou, Kilian Q. Weinberger, Chuan Guo

    Abstract: Label differential privacy (label-DP) is a popular framework for training private ML models on datasets with public features and sensitive private labels. Despite its rigorous privacy guarantee, it has been observed that in practice label-DP does not preclude label inference attacks (LIAs): Models trained with label-DP can be evaluated on the public training features to recover, with high accuracy… ▽ More

    Submitted 3 June, 2023; v1 submitted 25 February, 2022; originally announced February 2022.

  25. arXiv:2008.09194  [pdf, other

    cs.LG cs.CR cs.CV cs.CY

    On Attribution of Deepfakes

    Authors: Baiwu Zhang, Jin Peng Zhou, Ilia Shumailov, Nicolas Papernot

    Abstract: Progress in generative modelling, especially generative adversarial networks, have made it possible to efficiently synthesize and alter media at scale. Malicious individuals now rely on these machine-generated media, or deepfakes, to manipulate social discourse. In order to ensure media authenticity, existing research is focused on deepfake detection. Yet, the adversarial nature of frameworks used… ▽ More

    Submitted 3 March, 2021; v1 submitted 20 August, 2020; originally announced August 2020.

  26. arXiv:2008.01246  [pdf, other

    cs.IR

    Noise Contrastive Estimation for Autoencoding-based One-Class Collaborative Filtering

    Authors: Jin Peng Zhou, Ga Wu, Zheda Mai, Scott Sanner

    Abstract: One-class collaborative filtering (OC-CF) is a common class of recommendation problem where only the positive class is explicitly observed (e.g., purchases, clicks). Autoencoder based recommenders such as AutoRec and variants demonstrate strong performance on many OC-CF benchmarks, but also empirically suffer from a strong popularity bias. While a careful choice of negative samples in the OC-CF se… ▽ More

    Submitted 5 August, 2020; v1 submitted 3 August, 2020; originally announced August 2020.

    Comments: 10 pages, 7 figures