Skip to main content

Showing 1–6 of 6 results for author: Edemacu, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.02671  [pdf, other

    cs.LG cs.AI cs.CL

    Fair In-Context Learning via Latent Concept Variables

    Authors: Karuna Bhaila, Minh-Hao Van, Kennedy Edemacu, Chen Zhao, Feng Chen, Xintao Wu

    Abstract: The emerging in-context learning (ICL) ability of large language models (LLMs) has prompted their use for predictive tasks in various domains with different types of data facilitated by serialization methods. However, with increasing applications in high-stakes domains, it has been shown that LLMs can inherit social bias and discrimination from their pre-training data. In this work, we investigate… ▽ More

    Submitted 4 November, 2024; originally announced November 2024.

    Comments: 12 pages

  2. arXiv:2404.06001  [pdf, other

    cs.CL

    Privacy Preserving Prompt Engineering: A Survey

    Authors: Kennedy Edemacu, Xintao Wu

    Abstract: Pre-trained language models (PLMs) have demonstrated significant proficiency in solving a wide range of general natural language processing (NLP) tasks. Researchers have observed a direct correlation between the performance of these models and their sizes. As a result, the sizes of these models have notably expanded in recent years, persuading researchers to adopt the term large language models (L… ▽ More

    Submitted 10 April, 2024; v1 submitted 9 April, 2024; originally announced April 2024.

    Comments: 23 pages, 8 figures

  3. arXiv:2403.05681  [pdf, other

    cs.CR cs.AI cs.LG

    DP-TabICL: In-Context Learning with Differentially Private Tabular Data

    Authors: Alycia N. Carey, Karuna Bhaila, Kennedy Edemacu, Xintao Wu

    Abstract: In-context learning (ICL) enables large language models (LLMs) to adapt to new tasks by conditioning on demonstrations of question-answer pairs and it has been shown to have comparable performance to costly model retraining and fine-tuning. Recently, ICL has been extended to allow tabular data to be used as demonstration examples by serializing individual records into natural language formats. How… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: 15 pages, 2 figures, 9 tables

  4. arXiv:2202.03245  [pdf, other

    cs.CR

    Scalable Multi-Party Privacy-Preserving Gradient Tree Boosting over Vertically Partitioned Dataset with Outsourced Computations

    Authors: Kennedy Edemacu, Beakcheol Jang, Jong Wook Kim

    Abstract: Due to privacy concerns, multi-party gradient tree boosting algorithms have become widely popular amongst machine learning researchers and practitioners. However, limited existing works have focused on vertically partitioned datasets, and the few existing works are either not scalable or tend to leak information. Thus, in this work, we propose SSXGB which is a scalable and secure multi-party gradi… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  5. arXiv:2101.05504  [pdf, other

    cs.LG

    Reliability Check via Weight Similarity in Privacy-Preserving Multi-Party Machine Learning

    Authors: Kennedy Edemacu, Beakcheol Jang, Jong Wook Kim

    Abstract: Multi-party machine learning is a paradigm in which multiple participants collaboratively train a machine learning model to achieve a common learning objective without sharing their privately owned data. The paradigm has recently received a lot of attention from the research community aimed at addressing its associated privacy concerns. In this work, we focus on addressing the concerns of data pri… ▽ More

    Submitted 14 January, 2021; originally announced January 2021.

    Journal ref: Information Sciences, Volume 574, October 2021, Pages 51-65

  6. arXiv:1410.2023  [pdf

    cs.CR

    Packet Drop Attack Detection Techniques in Wireless Ad hoc Networks: A Review

    Authors: Kennedy Edemacu, Martin Euku, Richard Ssekibuule

    Abstract: Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets malicio… ▽ More

    Submitted 8 October, 2014; originally announced October 2014.

    Comments: 12 pages

    MSC Class: 68-XX

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.5, September 2014