Skip to main content

Showing 1–6 of 6 results for author: Cha, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.06965  [pdf, other

    cs.CL cs.AI

    Uncovering Factor Level Preferences to Improve Human-Model Alignment

    Authors: Juhyun Oh, Eunsu Kim, Jiseon Kim, Wenda Xu, Inha Cha, William Yang Wang, Alice Oh

    Abstract: Despite advancements in Large Language Model (LLM) alignment, understanding the reasons behind LLM preferences remains crucial for bridging the gap between desired and actual behavior. LLMs often exhibit biases or tendencies that diverge from human preferences, such as favoring certain writing styles or producing overly verbose outputs. However, current methods for evaluating preference alignment… ▽ More

    Submitted 24 November, 2024; v1 submitted 9 October, 2024; originally announced October 2024.

  2. Ethics Pathways: A Design Activity for Reflecting on Ethics Engagement in HCI Research

    Authors: Inha Cha, Ajit G. Pillai, Richmond Y. Wong

    Abstract: This paper introduces Ethics Pathways, a design activity aimed at understanding HCI and design researchers' ethics engagements and flows during their research process. Despite a strong ethical commitment in these fields, challenges persist in grasping the complexity of researchers' engagement with ethics -- practices conducted to operationalize ethics -- in situated institutional contexts. Ethics… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: Accepted at ACM Designing Interactive Systems (DIS) 2024

  3. arXiv:2402.06204  [pdf, other

    cs.CL cs.AI

    The Generative AI Paradox on Evaluation: What It Can Solve, It May Not Evaluate

    Authors: Juhyun Oh, Eunsu Kim, Inha Cha, Alice Oh

    Abstract: This paper explores the assumption that Large Language Models (LLMs) skilled in generation tasks are equally adept as evaluators. We assess the performance of three LLMs and one open-source LM in Question-Answering (QA) and evaluation tasks using the TriviaQA (Joshi et al., 2017) dataset. Results indicate a significant disparity, with LLMs exhibiting lower performance in evaluation tasks compared… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  4. arXiv:2211.14981  [pdf, other

    cs.HC

    The Grind for Good Data: Understanding ML Practitioners' Struggles and Aspirations in Making Good Data

    Authors: Inha Cha, Juhyun Oh, Cheul Young Park, Jiyoon Han, Hwalsuk Lee

    Abstract: We thought data to be simply given, but reality tells otherwise; it is costly, situation-dependent, and muddled with dilemmas, constantly requiring human intervention. The ML community's focus on quality data is increasing in the same vein, as good data is vital for successful ML systems. Nonetheless, few works have investigated the dataset builders and the specifics of what they do and struggle t… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

  5. arXiv:1008.3253  [pdf, other

    cs.CR

    Secure Operations on Tree-Formed Verification Data

    Authors: Andreas U. Schmidt, Andreas Leicher, Yogendra Shah, Inhyok Cha

    Abstract: We define secure operations with tree-formed, protected verification data registers. Functionality is conceptually added to Trusted Platform Modules (TPMs) to handle Platform Configuration Registers (PCRs) which represent roots of hash trees protecting the integrity of tree-formed Stored Measurement Logs (SMLs). This enables verification and update of an inner node of an SML and even attestation t… ▽ More

    Submitted 19 August, 2010; originally announced August 2010.

    Comments: 9 pages, 1 figure

  6. Tree-formed Verification Data for Trusted Platforms

    Authors: Andreas U. Schmidt, Andreas Leicher, Yogendra Shah, Inhyok Cha

    Abstract: The establishment of trust relationships to a computing platform relies on validation processes. Validation allows an external entity to build trust in the expected behaviour of the platform based on provided evidence of the platform's configuration. In a process like remote attestation, the 'trusted' platform submits verification data created during a start up process. These data consist of hardw… ▽ More

    Submitted 18 October, 2012; v1 submitted 5 July, 2010; originally announced July 2010.

    Comments: 15 pages, 11 figures, v3: Reference added, v4: Revised, accepted for publication in Computers and Security

    Journal ref: Computers & Security 32 (2013) 19-35