Skip to main content

Showing 1–50 of 79 results for author: Evans, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.17130  [pdf, other

    cs.CL cs.CR cs.CY

    Steering the CensorShip: Uncovering Representation Vectors for LLM "Thought" Control

    Authors: Hannah Cyberey, David Evans

    Abstract: Large language models (LLMs) have transformed the way we access information. These models are often tuned to refuse to comply with requests that are considered harmful and to produce responses that better align with the preferences of those who control the models. To understand how this "censorship" works. We use representation engineering techniques to study open-weights safety-tuned models. We p… ▽ More

    Submitted 26 April, 2025; v1 submitted 23 April, 2025; originally announced April 2025.

  2. arXiv:2503.14190  [pdf, other

    cs.AI

    Inferring Events from Time Series using Language Models

    Authors: Mingtian Tan, Mike A. Merrill, Zack Gottesman, Tim Althoff, David Evans, Tom Hartvigsen

    Abstract: Time series data measure how environments change over time and drive decision-making in critical domains like finance and healthcare. A common goal in analyzing time series data is to understand the underlying events that cause the observed variations. We conduct the first study of whether Large Language Models (LLMs) can infer events described with natural language from time series data. We evalu… ▽ More

    Submitted 22 May, 2025; v1 submitted 18 March, 2025; originally announced March 2025.

    Comments: 21 pages, 15 Figures

    MSC Class: 62M10; 68T07; ACM Class: I.2.6; I.2.7

  3. arXiv:2502.19721  [pdf, other

    cs.CL cs.CY

    Sensing and Steering Stereotypes: Extracting and Applying Gender Representation Vectors in LLMs

    Authors: Hannah Cyberey, Yangfeng Ji, David Evans

    Abstract: Large language models (LLMs) are known to perpetuate stereotypes and exhibit biases. Various strategies have been proposed to mitigate these biases, but most work studies biases in LLMs as a black-box problem without considering how concepts are represented within the model. We adapt techniques from representation engineering to study how the concept of "gender" is represented within LLMs. We intr… ▽ More

    Submitted 20 May, 2025; v1 submitted 26 February, 2025; originally announced February 2025.

  4. Toward a Principled Framework for Disclosure Avoidance

    Authors: Michael B Hawes, Evan M Brassell, Anthony Caruso, Ryan Cumings-Menon, Jason Devine, Cassandra Dorius, David Evans, Kenneth Haase, Michele C Hedrick, Alexandra Krause, Philip Leclerc, James Livsey, Rolando A Rodriguez, Luke T Rogers, Matthew Spence, Victoria Velkoff, Michael Walsh, James Whitehorne, Sallie Ann Keller

    Abstract: Responsible disclosure limitation is an iterative exercise in risk assessment and mitigation. From time to time, as disclosure risks grow and evolve and as data users' needs change, agencies must consider redesigning the disclosure avoidance system(s) they use. Discussions about candidate systems often conflate inherent features of those systems with implementation decisions independent of those s… ▽ More

    Submitted 29 May, 2025; v1 submitted 10 February, 2025; originally announced February 2025.

  5. arXiv:2412.05203  [pdf, other

    cs.CV cs.AI

    Archaeoscape: Bringing Aerial Laser Scanning Archaeology to the Deep Learning Era

    Authors: Yohann Perron, Vladyslav Sydorov, Adam P. Wijker, Damian Evans, Christophe Pottier, Loic Landrieu

    Abstract: Airborne Laser Scanning (ALS) technology has transformed modern archaeology by unveiling hidden landscapes beneath dense vegetation. However, the lack of expert-annotated, open-access resources has hindered the analysis of ALS data using advanced deep learning techniques. We address this limitation with Archaeoscape (available at https://archaeoscape.ai/data/2024/), a novel large-scale archaeologi… ▽ More

    Submitted 12 December, 2024; v1 submitted 6 December, 2024; originally announced December 2024.

    Comments: NeurIPS 2024 - Datasets & Benchmarks Track (spotlight)

  6. arXiv:2409.18594  [pdf, ps, other

    cs.AI cs.CL cs.LG

    "Oh LLM, I'm Asking Thee, Please Give Me a Decision Tree": Zero-Shot Decision Tree Induction and Embedding with Large Language Models

    Authors: Ricardo Knauer, Mario Koddenbrock, Raphael Wallsberger, Nicholas M. Brisson, Georg N. Duda, Deborah Falla, David W. Evans, Erik Rodner

    Abstract: Large language models (LLMs) provide powerful means to leverage prior knowledge for predictive modeling when data is limited. In this work, we demonstrate how LLMs can use their compressed world knowledge to generate intrinsically interpretable machine learning models, i.e., decision trees, without any training data. We find that these zero-shot decision trees can even surpass data-driven trees on… ▽ More

    Submitted 27 May, 2025; v1 submitted 27 September, 2024; originally announced September 2024.

    Comments: KDD 2025 Research Track

  7. arXiv:2408.01285  [pdf, other

    cs.CL cs.CY

    The Mismeasure of Man and Models: Evaluating Allocational Harms in Large Language Models

    Authors: Hannah Chen, Yangfeng Ji, David Evans

    Abstract: Large language models (LLMs) are now being considered and even deployed for applications that support high-stakes decision-making, such as recruitment and clinical decisions. While several methods have been proposed for measuring bias, there remains a gap between predictions, which are what the proposed methods consider, and how they are used to make decisions. In this work, we introduce Rank-Allo… ▽ More

    Submitted 2 August, 2024; originally announced August 2024.

  8. arXiv:2407.04730  [pdf, other

    eess.SP cs.AI cs.LG

    The OPS-SAT benchmark for detecting anomalies in satellite telemetry

    Authors: Bogdan Ruszczak, Krzysztof Kotowski, David Evans, Jakub Nalepa

    Abstract: Detecting anomalous events in satellite telemetry is a critical task in space operations. This task, however, is extremely time-consuming, error-prone and human dependent, thus automated data-driven anomaly detection algorithms have been emerging at a steady pace. However, there are no publicly available datasets of real satellite telemetry accompanied with the ground-truth annotations that could… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: 13 pages, 8 figures, 3 tables

  9. arXiv:2406.11544  [pdf, other

    cs.LG cs.AI cs.CR

    Do Parameters Reveal More than Loss for Membership Inference?

    Authors: Anshuman Suri, Xiao Zhang, David Evans

    Abstract: Membership inference attacks are used as a key tool for disclosure auditing. They aim to infer whether an individual record was used to train a model. While such evaluations are useful to demonstrate risk, they are computationally expensive and often make strong assumptions about potential adversaries' access to models and training environments, and thus do not provide tight bounds on leakage from… ▽ More

    Submitted 19 December, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: Accepted to Transactions on Machine Learning Research (TMLR)

  10. arXiv:2405.09721  [pdf, other

    cs.CR

    DP-RuL: Differentially-Private Rule Learning for Clinical Decision Support Systems

    Authors: Josephine Lamp, Lu Feng, David Evans

    Abstract: Serious privacy concerns arise with the use of patient data in rule-based clinical decision support systems (CDSS). The goal of a privacy-preserving CDSS is to learn a population ruleset from individual clients' local rulesets, while protecting the potentially sensitive information contained in the rulesets. We present the first work focused on this problem and develop a framework for learning pop… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

  11. Evaluating Google's Protected Audience Protocol

    Authors: Minjun Long, David Evans

    Abstract: While third-party cookies have been a key component of the digital marketing ecosystem for years, they allow users to be tracked across web sites in ways that raise serious privacy concerns. Google has proposed the Privacy Sandbox initiative to enable ad targeting without third-party cookies. While there have been several studies focused on other aspects of this initiative, there has been little a… ▽ More

    Submitted 20 May, 2024; v1 submitted 13 May, 2024; originally announced May 2024.

    Journal ref: PoPETS 2024

  12. arXiv:2404.14325  [pdf, other

    cs.NE cs.AI q-bio.NC

    Adapting to time: Why nature may have evolved a diverse set of neurons

    Authors: Karim G. Habashy, Benjamin D. Evans, Dan F. M. Goodman, Jeffrey S. Bowers

    Abstract: Brains have evolved diverse neurons with varying morphologies and dynamics that impact temporal information processing. In contrast, most neural network models use homogeneous units that vary only in spatial parameters (weights and biases). To explore the importance of temporal parameters, we trained spiking neural networks on tasks with varying temporal complexity, holding different parameter sub… ▽ More

    Submitted 12 January, 2025; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: 19 pages, 6 figures

    ACM Class: K.3.2; I.2.m

    Journal ref: PLoS Comput Biol 20(12): e1012673 (2024)

  13. arXiv:2404.05290  [pdf, other

    cs.CV cs.AI

    MindSet: Vision. A toolbox for testing DNNs on key psychological experiments

    Authors: Valerio Biscione, Dong Yin, Gaurav Malhotra, Marin Dujmovic, Milton L. Montero, Guillermo Puebla, Federico Adolfi, Rachel F. Heaton, John E. Hummel, Benjamin D. Evans, Karim Habashy, Jeffrey S. Bowers

    Abstract: Multiple benchmarks have been developed to assess the alignment between deep neural networks (DNNs) and human vision. In almost all cases these benchmarks are observational in the sense they are composed of behavioural and brain responses to naturalistic images that have not been manipulated to test hypotheses regarding how DNNs or humans perceive and identify objects. Here we introduce the toolbo… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  14. arXiv:2404.00463  [pdf, other

    cs.CL cs.CY cs.LG

    Addressing Both Statistical and Causal Gender Fairness in NLP Models

    Authors: Hannah Chen, Yangfeng Ji, David Evans

    Abstract: Statistical fairness stipulates equivalent outcomes for every protected group, whereas causal fairness prescribes that a model makes the same prediction for an individual regardless of their protected characteristics. Counterfactual data augmentation (CDA) is effective for reducing bias in NLP models, yet models trained with CDA are often evaluated only on metrics that are closely tied to the caus… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

    Comments: NAACL 2024 (Findings)

  15. arXiv:2402.18558  [pdf, other

    cs.RO

    Unifying F1TENTH Autonomous Racing: Survey, Methods and Benchmarks

    Authors: Benjamin David Evans, Raphael Trumpp, Marco Caccamo, Felix Jahncke, Johannes Betz, Hendrik Willem Jordaan, Herman Arnold Engelbrecht

    Abstract: The F1TENTH autonomous driving platform, consisting of 1:10-scale remote-controlled cars, has evolved into a well-established education and research platform. The many publications and real-world competitions span many domains, from classical path planning to novel learning-based algorithms. Consequently, the field is wide and disjointed, hindering direct comparison of developed methods and making… ▽ More

    Submitted 25 April, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: 12 pages, 18 figures. Sumbitted for publication

  16. arXiv:2402.07841  [pdf, other

    cs.CL

    Do Membership Inference Attacks Work on Large Language Models?

    Authors: Michael Duan, Anshuman Suri, Niloofar Mireshghallah, Sewon Min, Weijia Shi, Luke Zettlemoyer, Yulia Tsvetkov, Yejin Choi, David Evans, Hannaneh Hajishirzi

    Abstract: Membership inference attacks (MIAs) attempt to predict whether a particular datapoint is a member of a target model's training data. Despite extensive research on traditional machine learning models, there has been limited work studying MIA on the pre-training data of large language models (LLMs). We perform a large-scale evaluation of MIAs over a suite of language models (LMs) trained on the Pile… ▽ More

    Submitted 16 September, 2024; v1 submitted 12 February, 2024; originally announced February 2024.

    Comments: Accepted at Conference on Language Modeling (COLM), 2024

  17. arXiv:2401.17732  [pdf, other

    cs.RO

    High-performance Racing on Unmapped Tracks using Local Maps

    Authors: Benjamin David Evans, Hendrik Willem Jordaan, Herman Arnold Engelbrecht

    Abstract: Map-based methods for autonomous racing estimate the vehicle's location, which is used to follow a high-level plan. While map-based optimisation methods demonstrate high-performance results, they are limited by requiring a map of the environment. In contrast, mapless methods can operate in unmapped contexts since they directly process raw sensor data (often LiDAR) to calculate commands. However, a… ▽ More

    Submitted 31 January, 2024; originally announced January 2024.

    Comments: 6 pages, 14 figures. Submitted to IV 2024

  18. arXiv:2311.11544  [pdf, other

    cs.LG cs.CR

    Understanding Variation in Subpopulation Susceptibility to Poisoning Attacks

    Authors: Evan Rose, Fnu Suya, David Evans

    Abstract: Machine learning is susceptible to poisoning attacks, in which an attacker controls a small fraction of the training data and chooses that data with the goal of inducing some behavior unintended by the model developer in the trained model. We consider a realistic setting in which the adversary with the ability to insert a limited number of data points attempts to control the model's behavior on a… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

    Comments: 18 pages, 11 figures

  19. arXiv:2310.18362  [pdf, ps, other

    cs.CL cs.CR cs.LG

    SoK: Memorization in General-Purpose Large Language Models

    Authors: Valentin Hartmann, Anshuman Suri, Vincent Bindschaedler, David Evans, Shruti Tople, Robert West

    Abstract: Large Language Models (LLMs) are advancing at a remarkable pace, with myriad applications under development. Unlike most earlier machine learning models, they are no longer built for one specific application but are designed to excel in a wide range of tasks. A major part of this success is due to their huge training datasets and the unprecedented number of model parameters, which allow them to me… ▽ More

    Submitted 24 October, 2023; originally announced October 2023.

  20. arXiv:2310.17534  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    SoK: Pitfalls in Evaluating Black-Box Attacks

    Authors: Fnu Suya, Anshuman Suri, Tingwei Zhang, Jingtao Hong, Yuan Tian, David Evans

    Abstract: Numerous works study black-box attacks on image classifiers. However, these works make different assumptions on the adversary's knowledge and current literature lacks a cohesive organization centered around the threat model. To systematize knowledge in this area, we propose a taxonomy over the threat space spanning the axes of feedback granularity, the access of interactive queries, and the qualit… ▽ More

    Submitted 14 February, 2024; v1 submitted 26 October, 2023; originally announced October 2023.

    Comments: Accepted at SaTML 2024

  21. arXiv:2309.06651  [pdf, other

    cs.LG

    ConR: Contrastive Regularizer for Deep Imbalanced Regression

    Authors: Mahsa Keramati, Lili Meng, R. David Evans

    Abstract: Imbalanced distributions are ubiquitous in real-world data. They create constraints on Deep Neural Networks to represent the minority labels and avoid bias towards majority labels. The extensive body of imbalanced approaches address categorical label spaces but fail to effectively extend to regression problems where the label space is continuous. Local and global correlations among continuous labe… ▽ More

    Submitted 13 March, 2024; v1 submitted 12 September, 2023; originally announced September 2023.

  22. arXiv:2307.01073  [pdf, other

    cs.LG cs.CR

    What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?

    Authors: Fnu Suya, Xiao Zhang, Yuan Tian, David Evans

    Abstract: We study indiscriminate poisoning for linear learners where an adversary injects a few crafted examples into the training data with the goal of forcing the induced model to incur higher test error. Inspired by the observation that linear learners on some datasets are able to resist the best known attacks even without any defenses, we further investigate whether datasets can be inherently robust to… ▽ More

    Submitted 9 November, 2023; v1 submitted 3 July, 2023; originally announced July 2023.

    Comments: NeurIPS 2023 camera-ready version, 39 pages

  23. arXiv:2306.07003  [pdf, other

    cs.RO

    High-speed Autonomous Racing using Trajectory-aided Deep Reinforcement Learning

    Authors: Benjamin David Evans, Herman Arnold Engelbrecht, Hendrik Willem Jordaan

    Abstract: The classical method of autonomous racing uses real-time localisation to follow a precalculated optimal trajectory. In contrast, end-to-end deep reinforcement learning (DRL) can train agents to race using only raw LiDAR scans. While classical methods prioritise optimization for high-performance racing, DRL approaches have focused on low-performance contexts with little consideration of the speed p… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: 7 pages, 16 figures. Submitted for review

  24. arXiv:2305.18820  [pdf, other

    cs.LG cs.AI cs.IR

    Robust Reinforcement Learning Objectives for Sequential Recommender Systems

    Authors: Melissa Mozifian, Tristan Sylvain, Dave Evans, Lili Meng

    Abstract: Attention-based sequential recommendation methods have shown promise in accurately capturing users' evolving interests from their past interactions. Recent research has also explored the integration of reinforcement learning (RL) into these models, in addition to generating superior user representations. By framing sequential recommendation as an RL problem with reward signals, we can develop reco… ▽ More

    Submitted 17 April, 2024; v1 submitted 30 May, 2023; originally announced May 2023.

  25. arXiv:2304.06929  [pdf

    cs.CR

    Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment

    Authors: Rachel Cummings, Damien Desfontaines, David Evans, Roxana Geambasu, Yangsibo Huang, Matthew Jagielski, Peter Kairouz, Gautam Kamath, Sewoong Oh, Olga Ohrimenko, Nicolas Papernot, Ryan Rogers, Milan Shen, Shuang Song, Weijie Su, Andreas Terzis, Abhradeep Thakurta, Sergei Vassilvitskii, Yu-Xiang Wang, Li Xiong, Sergey Yekhanin, Da Yu, Huanyu Zhang, Wanrong Zhang

    Abstract: In this article, we present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP), with a focus of advancing DP's deployment in real-world applications. Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier," a workshop held in July 20… ▽ More

    Submitted 12 March, 2024; v1 submitted 14 April, 2023; originally announced April 2023.

  26. arXiv:2303.11643  [pdf, other

    cs.LG cs.AI cs.CR

    Manipulating Transfer Learning for Property Inference

    Authors: Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans

    Abstract: Transfer learning is a popular method for tuning pretrained (upstream) models for different downstream tasks using limited data and computational resources. We study how an adversary with control over an upstream model used in transfer learning can conduct property inference attacks on a victim's tuned downstream model. For example, to infer the presence of images of a specific individual in the d… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted to CVPR 2023

  27. arXiv:2303.01621  [pdf, other

    cs.LG cs.CR

    GlucoSynth: Generating Differentially-Private Synthetic Glucose Traces

    Authors: Josephine Lamp, Mark Derdzinski, Christopher Hannemann, Joost van der Linden, Lu Feng, Tianhao Wang, David Evans

    Abstract: We focus on the problem of generating high-quality, private synthetic glucose traces, a task generalizable to many other time series sources. Existing methods for time series data synthesis, such as those using Generative Adversarial Networks (GANs), are not able to capture the innate characteristics of glucose data and cannot provide any formal privacy guarantees without severely degrading the ut… ▽ More

    Submitted 31 October, 2023; v1 submitted 2 March, 2023; originally announced March 2023.

    Journal ref: Advances in Neural Information Processing Systems 36 (2023)

  28. arXiv:2301.02344  [pdf, other

    cs.CR cs.LG

    TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

    Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim

    Abstract: With tools like GitHub Copilot, automatic code suggestion is no longer a dream in software engineering. These tools, based on large language models, are typically trained on massive corpora of code mined from unvetted public sources. As a result, these models are susceptible to data poisoning attacks where an adversary manipulates the model's training by injecting malicious data. Poisoning attacks… ▽ More

    Submitted 24 January, 2024; v1 submitted 5 January, 2023; originally announced January 2023.

  29. arXiv:2212.10986  [pdf, other

    cs.LG cs.CR cs.GT

    SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

    Authors: Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin

    Abstract: Deploying machine learning models in production may allow adversaries to infer sensitive information about training data. There is a vast literature analyzing different types of inference risks, ranging from membership inference to reconstruction attacks. Inspired by the success of games (i.e., probabilistic experiments) to study security properties in cryptography, some authors describe privacy i… ▽ More

    Submitted 20 April, 2023; v1 submitted 21 December, 2022; originally announced December 2022.

    Comments: 20 pages, to appear in 2023 IEEE Symposium on Security and Privacy

  30. arXiv:2212.07591  [pdf, other

    cs.LG cs.AI cs.CR

    Dissecting Distribution Inference

    Authors: Anshuman Suri, Yifu Lu, Yanjin Chen, David Evans

    Abstract: A distribution inference attack aims to infer statistical properties of data used to train machine learning models. These attacks are sometimes surprisingly potent, but the factors that impact distribution inference risk are not well understood and demonstrated attacks often rely on strong and unrealistic assumptions such as full knowledge of training environments even in supposedly black-box thre… ▽ More

    Submitted 5 April, 2024; v1 submitted 14 December, 2022; originally announced December 2022.

    Comments: Accepted at SaTML 2023 (updated Yifu's email address)

  31. arXiv:2210.11498  [pdf, other

    cs.CL

    Balanced Adversarial Training: Balancing Tradeoffs between Fickleness and Obstinacy in NLP Models

    Authors: Hannah Chen, Yangfeng Ji, David Evans

    Abstract: Traditional (fickle) adversarial examples involve finding a small perturbation that does not change an input's true label but confuses the classifier into outputting a different prediction. Conversely, obstinate adversarial examples occur when an adversary finds a small perturbation that preserves the classifier's prediction but changes the true label of an input. Adversarial training and certifie… ▽ More

    Submitted 28 October, 2022; v1 submitted 20 October, 2022; originally announced October 2022.

    Comments: EMNLP 2022

  32. arXiv:2210.04106  [pdf, other

    cs.CV cs.LG

    The effect of variable labels on deep learning models trained to predict breast density

    Authors: Steven Squires, Elaine F. Harkness, D. Gareth Evans, Susan M. Astley

    Abstract: Purpose: High breast density is associated with reduced efficacy of mammographic screening and increased risk of developing breast cancer. Accurate and reliable automated density estimates can be used for direct risk prediction and passing density related information to further predictive models. Expert reader assessments of density show a strong relationship to cancer risk but also inter-reader v… ▽ More

    Submitted 8 October, 2022; originally announced October 2022.

  33. arXiv:2209.11082  [pdf, other

    cs.RO

    Bypassing the Simulation-to-reality Gap: Online Reinforcement Learning using a Supervisor

    Authors: Benjamin David Evans, Johannes Betz, Hongrui Zheng, Herman A. Engelbrecht, Rahul Mangharam, Hendrik W. Jordaan

    Abstract: Deep reinforcement learning (DRL) is a promising method to learn control policies for robots only from demonstration and experience. To cover the whole dynamic behaviour of the robot, DRL training is an active exploration process typically performed in simulation environments. Although this simulation training is cheap and fast, applying DRL algorithms to real-world settings is difficult. If agent… ▽ More

    Submitted 13 July, 2023; v1 submitted 22 September, 2022; originally announced September 2022.

    Comments: 7 Pages, 10 Figures, 1 Table

  34. arXiv:2209.01292  [pdf, other

    cs.CR cs.LG

    Are Attribute Inference Attacks Just Imputation?

    Authors: Bargav Jayaraman, David Evans

    Abstract: Models can expose sensitive information about their training data. In an attribute inference attack, an adversary has partial knowledge of some training records and access to a model trained on those records, and infers the unknown values of a sensitive feature of those records. We study a fine-grained variant of attribute inference we call \emph{sensitive value inference}, where the adversary's g… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: 13 (main body) + 4 (references and appendix) pages. To appear in CCS'22

  35. arXiv:2207.10802  [pdf, other

    cs.CR cs.CL cs.LG

    Combing for Credentials: Active Pattern Extraction from Smart Reply

    Authors: Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai, David Evans

    Abstract: Pre-trained large language models, such as GPT\nobreakdash-2 and BERT, are often fine-tuned to achieve state-of-the-art performance on a downstream task. One natural example is the ``Smart Reply'' application where a pre-trained model is tuned to provide suggested responses for a given query message. Since the tuning data is often sensitive data such as emails or chat transcripts, it is important… ▽ More

    Submitted 2 September, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

  36. arXiv:2206.06444  [pdf

    cs.AI cs.CY stat.AP

    A method for comparing multiple imputation techniques: a case study on the U.S. National COVID Cohort Collaborative

    Authors: Elena Casiraghi, Rachel Wong, Margaret Hall, Ben Coleman, Marco Notaro, Michael D. Evans, Jena S. Tronieri, Hannah Blau, Bryan Laraway, Tiffany J. Callahan, Lauren E. Chan, Carolyn T. Bramante, John B. Buse, Richard A. Moffitt, Til Sturmer, Steven G. Johnson, Yu Raymond Shao, Justin Reese, Peter N. Robinson, Alberto Paccanaro, Giorgio Valentini, Jared D. Huling, Kenneth Wilkins, :, Tell Bennet , et al. (12 additional authors not shown)

    Abstract: Healthcare datasets obtained from Electronic Health Records have proven to be extremely useful to assess associations between patients' predictors and outcomes of interest. However, these datasets often suffer from missing values in a high proportion of cases and the simple removal of these cases may introduce severe bias. For these reasons, several multiple imputation algorithms have been propose… ▽ More

    Submitted 25 September, 2022; v1 submitted 13 June, 2022; originally announced June 2022.

  37. arXiv:2205.12506  [pdf, other

    cs.CL cs.LG

    Memorization in NLP Fine-tuning Methods

    Authors: Fatemehsadat Mireshghallah, Archit Uniyal, Tianhao Wang, David Evans, Taylor Berg-Kirkpatrick

    Abstract: Large language models are shown to present privacy risks through memorization of training data, and several recent works have studied such risks for the pre-training phase. Little attention, however, has been given to the fine-tuning phase and it is not well understood how different fine-tuning methods (such as fine-tuning the full model, the model head, and adapter) compare in terms of memorizati… ▽ More

    Submitted 3 November, 2022; v1 submitted 25 May, 2022; originally announced May 2022.

  38. arXiv:2112.09315  [pdf, other

    cs.LG cs.AI math.OC

    Optimal discharge of patients from intensive care via a data-driven policy learning framework

    Authors: Fernando Lejarza, Jacob Calvert, Misty M Attwood, Daniel Evans, Qingqing Mao

    Abstract: Clinical decision support tools rooted in machine learning and optimization can provide significant value to healthcare providers, including through better management of intensive care units. In particular, it is important that the patient discharge task addresses the nuanced trade-off between decreasing a patient's length of stay (and associated hospitalization costs) and the risk of readmission… ▽ More

    Submitted 16 December, 2021; originally announced December 2021.

  39. arXiv:2109.06024  [pdf, other

    cs.LG cs.AI cs.CR

    Formalizing and Estimating Distribution Inference Risks

    Authors: Anshuman Suri, David Evans

    Abstract: Distribution inference, sometimes called property inference, infers statistical properties about a training set from access to a model trained on that data. Distribution inference attacks can pose serious risks when models are trained on private data, but are difficult to distinguish from the intrinsic purpose of statistical machine learning -- namely, to produce models that capture statistical pr… ▽ More

    Submitted 5 July, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: Update: Accepted at PETS 2022

  40. arXiv:2107.03250  [pdf, other

    cs.LG cs.CR

    Understanding Intrinsic Robustness Using Label Uncertainty

    Authors: Xiao Zhang, David Evans

    Abstract: A fundamental question in adversarial machine learning is whether a robust classifier exists for a given task. A line of research has made some progress towards this goal by studying the concentration of measure, but we argue standard concentration fails to fully characterize the intrinsic robustness of a classification problem since it ignores data labels which are essential to any classification… ▽ More

    Submitted 17 March, 2022; v1 submitted 7 July, 2021; originally announced July 2021.

    Comments: ICLR 2022; 23 pages, 8 figures, 1 table

  41. arXiv:2106.03699  [pdf, other

    cs.LG cs.AI cs.CR

    Formalizing Distribution Inference Risks

    Authors: Anshuman Suri, David Evans

    Abstract: Property inference attacks reveal statistical properties about a training set but are difficult to distinguish from the primary purposes of statistical machine learning, which is to produce models that capture statistical properties about a distribution. Motivated by Yeom et al.'s membership inference framework, we propose a formal and generic definition of property inference attacks. The proposed… ▽ More

    Submitted 24 September, 2021; v1 submitted 7 June, 2021; originally announced June 2021.

    Comments: ICML 2021 Workshop on Theory and Practice of Differential Privacy. Longer version of work available at arXiv:2109.06024 Update: Labelling error for Census[Race], where graphs were mirror-images because of 1-ratio being used instead of the ratio. Comparison with SOTA also updated; conclusions remain unchanged

  42. arXiv:2104.15129  [pdf, other

    cs.CR cs.AI

    Stealthy Backdoors as Compression Artifacts

    Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans

    Abstract: In a backdoor attack on a machine learning model, an adversary produces a model that performs well on normal inputs but outputs targeted misclassifications on inputs containing a small trigger pattern. Model compression is a widely-used approach for reducing the size of deep learning models without much accuracy loss, enabling resource-hungry models to be compressed for use on resource-constrained… ▽ More

    Submitted 30 April, 2021; originally announced April 2021.

    Comments: 20 pages, 9 figures, 14 tables

  43. arXiv:2103.12913  [pdf, other

    cs.LG stat.ML

    Improved Estimation of Concentration Under $\ell_p$-Norm Distance Metrics Using Half Spaces

    Authors: Jack Prescott, Xiao Zhang, David Evans

    Abstract: Concentration of measure has been argued to be the fundamental cause of adversarial vulnerability. Mahloujifar et al. presented an empirical way to measure the concentration of a data distribution using samples, and employed it to find lower bounds on intrinsic robustness for several benchmark datasets. However, it remains unclear whether these lower bounds are tight enough to provide a useful app… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: ICLR 2021

  44. arXiv:2011.01856  [pdf, other

    cs.CL

    Finding Friends and Flipping Frenemies: Automatic Paraphrase Dataset Augmentation Using Graph Theory

    Authors: Hannah Chen, Yangfeng Ji, David Evans

    Abstract: Most NLP datasets are manually labeled, so suffer from inconsistent labeling or limited size. We propose methods for automatically improving datasets by viewing them as graphs with expected semantic properties. We construct a paraphrase graph from the provided sentence pair labels, and create an augmented dataset by directly inferring labels from the original sentence pairs using a transitivity pr… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    Comments: EMNLP 2020 (Findings)

  45. arXiv:2008.11790  [pdf

    q-bio.QM cs.LG stat.ML

    MutaGAN: A Seq2seq GAN Framework to Predict Mutations of Evolving Protein Populations

    Authors: Daniel S. Berman, Craig Howser, Thomas Mehoke, Jared D. Evans

    Abstract: The ability to predict the evolution of a pathogen would significantly improve the ability to control, prevent, and treat disease. Despite significant progress in other problem spaces, deep learning has yet to contribute to the issue of predicting mutations of evolving populations. To address this gap, we developed a novel machine learning framework using generative adversarial networks (GANs) wit… ▽ More

    Submitted 26 August, 2020; originally announced August 2020.

    Comments: 28 pages, 9 figures, 2 tables, Daniel S. Berman and Craig Howser contributed equally to this work. This paper was submitted to Artificial Intelligence

  46. arXiv:2006.16469  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Model-Targeted Poisoning Attacks with Provable Convergence

    Authors: Fnu Suya, Saeed Mahloujifar, Anshuman Suri, David Evans, Yuan Tian

    Abstract: In a poisoning attack, an adversary with control over a small fraction of the training data attempts to select that data in a way that induces a corrupted model that misbehaves in favor of the adversary. We consider poisoning attacks against convex machine learning models and propose an efficient poisoning attack designed to induce a specified model. Unlike previous model-targeted poisoning attack… ▽ More

    Submitted 21 April, 2021; v1 submitted 29 June, 2020; originally announced June 2020.

    Comments: 32 pages, code available at: https://github.com/suyeecav/model-targeted-poisoning

  47. arXiv:2005.11996  [pdf, other

    cs.CL

    Pointwise Paraphrase Appraisal is Potentially Problematic

    Authors: Hannah Chen, Yangfeng Ji, David Evans

    Abstract: The prevailing approach for training and evaluating paraphrase identification models is constructed as a binary classification problem: the model is given a pair of sentences, and is judged by how accurately it classifies pairs as either paraphrases or non-paraphrases. This pointwise-based evaluation method does not match well the objective of most real world applications, so the goal of our work… ▽ More

    Submitted 4 June, 2020; v1 submitted 25 May, 2020; originally announced May 2020.

    Comments: ACL 2020 Student Research Workshop

    Journal ref: Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics: Student Research Workshop (2020) 150-155

  48. arXiv:2005.10881  [pdf, other

    cs.CR cs.LG stat.ML

    Revisiting Membership Inference Under Realistic Assumptions

    Authors: Bargav Jayaraman, Lingxiao Wang, Katherine Knipmeyer, Quanquan Gu, David Evans

    Abstract: We study membership inference in settings where some of the assumptions typically used in previous research are relaxed. First, we consider skewed priors, to cover cases such as when only a small fraction of the candidate pool targeted by the adversary are actually members and develop a PPV-based metric suitable for this setting. This setting is more realistic than the balanced prior setting typic… ▽ More

    Submitted 13 January, 2021; v1 submitted 21 May, 2020; originally announced May 2020.

  49. arXiv:2004.10250  [pdf, other

    cs.LG cs.CR stat.ML

    Certifying Joint Adversarial Robustness for Model Ensembles

    Authors: Mainuddin Ahmad Jonas, David Evans

    Abstract: Deep Neural Networks (DNNs) are often vulnerable to adversarial examples.Several proposed defenses deploy an ensemble of models with the hope that, although the individual models may be vulnerable, an adversary will not be able to find an adversarial example that succeeds against the ensemble. Depending on how the ensemble is used, an attacker may need to find a single adversarial example that suc… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

    Comments: Open source code for our implementation and for reproducing our experiments is available at https://github.com/jonas-maj/ensemble-adversarial-robustness

  50. arXiv:2003.09372  [pdf, other

    cs.LG stat.ML

    One Neuron to Fool Them All

    Authors: Anshuman Suri, David Evans

    Abstract: Despite vast research in adversarial examples, the root causes of model susceptibility are not well understood. Instead of looking at attack-specific robustness, we propose a notion that evaluates the sensitivity of individual neurons in terms of how robust the model's output is to direct perturbations of that neuron's output. Analyzing models from this perspective reveals distinctive characterist… ▽ More

    Submitted 9 June, 2020; v1 submitted 20 March, 2020; originally announced March 2020.

    Comments: Updated 'PGD' columns of Table 1: numbers reported earlier for this column were (100 - accuracy) instead of attack success rates. Observations and conclusions remain unchanged