Skip to main content

Showing 1–5 of 5 results for author: Carney, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.06518  [pdf, ps, other

    cs.CR cs.LG

    A Systematic Review of Poisoning Attacks Against Large Language Models

    Authors: Neil Fendley, Edward W. Staley, Joshua Carney, William Redman, Marie Chau, Nathan Drenkow

    Abstract: With the widespread availability of pretrained Large Language Models (LLMs) and their training datasets, concerns about the security risks associated with their usage has increased significantly. One of these security risks is the threat of LLM poisoning attacks where an attacker modifies some part of the LLM training process to cause the LLM to behave in a malicious way. As an emerging area of re… ▽ More

    Submitted 6 June, 2025; originally announced June 2025.

    Comments: 28 Pages including number

  2. arXiv:2505.17248  [pdf, other

    cs.LG cs.CR

    Backdoors in DRL: Four Environments Focusing on In-distribution Triggers

    Authors: Chace Ashcraft, Ted Staley, Josh Carney, Cameron Hickert, Kiran Karra, Nathan Drenkow

    Abstract: Backdoor attacks, or trojans, pose a security risk by concealing undesirable behavior in deep neural network models. Open-source neural networks are downloaded from the internet daily, possibly containing backdoors, and third-party model developers are common. To advance research on backdoor attack mitigation, we develop several trojans for deep reinforcement learning (DRL) agents. We focus on in-… ▽ More

    Submitted 27 May, 2025; v1 submitted 22 May, 2025; originally announced May 2025.

  3. arXiv:2505.00734  [pdf, other

    cs.CV eess.IV

    Unconstrained Large-scale 3D Reconstruction and Rendering across Altitudes

    Authors: Neil Joshi, Joshua Carney, Nathanael Kuo, Homer Li, Cheng Peng, Myron Brown

    Abstract: Production of photorealistic, navigable 3D site models requires a large volume of carefully collected images that are often unavailable to first responders for disaster relief or law enforcement. Real-world challenges include limited numbers of images, heterogeneous unposed cameras, inconsistent lighting, and extreme viewpoint differences for images collected from varying altitudes. To promote res… ▽ More

    Submitted 29 April, 2025; originally announced May 2025.

  4. arXiv:2504.08943  [pdf, other

    cs.LG cs.AI

    Investigating the Treacherous Turn in Deep Reinforcement Learning

    Authors: Chace Ashcraft, Kiran Karra, Josh Carney, Nathan Drenkow

    Abstract: The Treacherous Turn refers to the scenario where an artificial intelligence (AI) agent subtly, and perhaps covertly, learns to perform a behavior that benefits itself but is deemed undesirable and potentially harmful to a human supervisor. During training, the agent learns to behave as expected by the human supervisor, but when deployed to perform its task, it performs an alternate behavior witho… ▽ More

    Submitted 11 April, 2025; originally announced April 2025.

  5. arXiv:2403.18188  [pdf

    cs.CY

    Integrating urban digital twins with cloud-based geospatial dashboards for coastal resilience planning: A case study in Florida

    Authors: Changjie Chen, Yu Han, Andrea Galinski, Christian Calle, Jeffery Carney, Xinyue Ye, Cees van Westen

    Abstract: Coastal communities are confronted with a growing incidence of climate-induced flooding, necessitating adaptation measures for resilience. In this paper, we introduce a framework that integrates an urban digital twin with a geospatial dashboard to allow visualization of the vulnerabilities within critical infrastructure across a range of spatial and temporal scales. The synergy between these two t… ▽ More

    Submitted 26 March, 2024; originally announced March 2024.