Skip to main content

Showing 1–33 of 33 results for author: Fung, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.18889  [pdf, ps, other

    cs.CR cs.AI

    Security Concerns for Large Language Models: A Survey

    Authors: Miles Q. Li, Benjamin C. M. Fung

    Abstract: Large Language Models (LLMs) such as GPT-4 and its recent iterations, Google's Gemini, Anthropic's Claude 3 models, and xAI's Grok have caused a revolution in natural language processing, but their capabilities also introduce new security vulnerabilities. In this survey, we provide a comprehensive overview of the emerging security concerns around LLMs, categorizing threats into prompt injection an… ▽ More

    Submitted 31 May, 2025; v1 submitted 24 May, 2025; originally announced May 2025.

  2. arXiv:2504.21773  [pdf, other

    cs.CL cs.AI

    MAC-Tuning: LLM Multi-Compositional Problem Reasoning with Enhanced Knowledge Boundary Awareness

    Authors: Junsheng Huang, Zhitao He, Sandeep Polisetty, Qingyun Wang, May Fung

    Abstract: With the widespread application of large language models (LLMs), the issue of generating non-existing facts, known as hallucination, has garnered increasing attention. Previous research in enhancing LLM confidence estimation mainly focuses on the single problem setting. However, LLM awareness of its internal parameterized knowledge boundary under the more challenging multi-problem setting, which r… ▽ More

    Submitted 30 April, 2025; originally announced April 2025.

  3. arXiv:2504.08967  [pdf, other

    cs.CR

    RAG-Based Fuzzing of Cross-Architecture Compilers

    Authors: Rana Elnaggar, Brian Delgado, Jason M. Fung

    Abstract: OneAPI is an open standard that supports cross-architecture software development with minimal effort from developers. It brings DPC++ and C++ compilers which need to be thoroughly tested to verify their correctness, reliability, and security. Compilers have numerous code flows and optimization features. This process requires developers with deep understanding of the different compiler flows to cra… ▽ More

    Submitted 11 April, 2025; originally announced April 2025.

  4. arXiv:2503.08589  [pdf

    cs.CV

    Integration of nested cross-validation, automated hyperparameter optimization, high-performance computing to reduce and quantify the variance of test performance estimation of deep learning models

    Authors: Paul Calle, Averi Bates, Justin C. Reynolds, Yunlong Liu, Haoyang Cui, Sinaro Ly, Chen Wang, Qinghao Zhang, Alberto J. de Armendi, Shashank S. Shettar, Kar Ming Fung, Qinggong Tang, Chongle Pan

    Abstract: The variability and biases in the real-world performance benchmarking of deep learning models for medical imaging compromise their trustworthiness for real-world deployment. The common approach of holding out a single fixed test set fails to quantify the variance in the estimation of test performance metrics. This study introduces NACHOS (Nested and Automated Cross-validation and Hyperparameter Op… ▽ More

    Submitted 11 March, 2025; originally announced March 2025.

  5. arXiv:2502.10559  [pdf

    eess.IV cs.AI cs.CV

    SAMRI-2: A Memory-based Model for Cartilage and Meniscus Segmentation in 3D MRIs of the Knee Joint

    Authors: Danielle L. Ferreira, Bruno A. A. Nunes, Xuzhe Zhang, Laura Carretero Gomez, Maggie Fung, Ravi Soni

    Abstract: Accurate morphometric assessment of cartilage-such as thickness/volume-via MRI is essential for monitoring knee osteoarthritis. Segmenting cartilage remains challenging and dependent on extensive expert-annotated datasets, which are heavily subjected to inter-reader variability. Recent advancements in Visual Foundational Models (VFM), especially memory-based approaches, offer opportunities for imp… ▽ More

    Submitted 14 February, 2025; originally announced February 2025.

  6. arXiv:2501.18457  [pdf, other

    cs.CL

    CALM: Unleashing the Cross-Lingual Self-Aligning Ability of Language Model Question Answering

    Authors: Yumeng Wang, Zhiyuan Fan, Qingyun Wang, May Fung, Heng Ji

    Abstract: Large Language Models (LLMs) are pretrained on extensive multilingual corpora to acquire both language-specific cultural knowledge and general knowledge. Ideally, while LLMs should provide consistent responses to culture-independent questions across languages, we observe significant performance disparities. To address this, we explore the Cross-Lingual Self-Aligning ability of Language Models (CAL… ▽ More

    Submitted 10 February, 2025; v1 submitted 30 January, 2025; originally announced January 2025.

    Comments: Accepted by NAACL 2025

  7. arXiv:2412.13335  [pdf, other

    cs.CL cs.AI

    Training Dynamics of a 1.7B LLaMa Model: A Data-Efficient Approach

    Authors: Miles Q. Li, Benjamin C. M. Fung, Shih-Chia Huang

    Abstract: Pretraining large language models is a complex endeavor influenced by multiple factors, including model architecture, data quality, training continuity, and hardware constraints. In this paper, we share insights gained from the experience of training DMaS-LLaMa-Lite, a fully open source, 1.7-billion-parameter, LLaMa-based model, on approximately 20 billion tokens of carefully curated data. We chro… ▽ More

    Submitted 6 April, 2025; v1 submitted 17 December, 2024; originally announced December 2024.

  8. arXiv:2411.18700  [pdf, other

    cs.CL cs.AI

    On the Effectiveness of Incremental Training of Large Language Models

    Authors: Miles Q. Li, Benjamin C. M. Fung, Shih-Chia Huang

    Abstract: Training large language models is a computationally intensive process that often requires substantial resources to achieve state-of-the-art results. Incremental layer-wise training has been proposed as a potential strategy to optimize the training process by progressively introducing layers, with the expectation that this approach would lead to faster convergence and more efficient use of computat… ▽ More

    Submitted 27 November, 2024; originally announced November 2024.

  9. arXiv:2410.18935  [pdf, other

    cs.AI cs.CL

    Schema-Guided Culture-Aware Complex Event Simulation with Multi-Agent Role-Play

    Authors: Sha Li, Revanth Gangi Reddy, Khanh Duy Nguyen, Qingyun Wang, May Fung, Chi Han, Jiawei Han, Kartik Natarajan, Clare R. Voss, Heng Ji

    Abstract: Complex news events, such as natural disasters and socio-political conflicts, require swift responses from the government and society. Relying on historical events to project the future is insufficient as such events are sparse and do not cover all possible conditions and nuanced situations. Simulation of these complex events can help better prepare and reduce the negative impact. We develop a con… ▽ More

    Submitted 24 October, 2024; originally announced October 2024.

    Comments: Accepted as EMNLP 2024 Demo

  10. arXiv:2410.06845  [pdf, other

    cs.CL cs.AI cs.MA

    MentalArena: Self-play Training of Language Models for Diagnosis and Treatment of Mental Health Disorders

    Authors: Cheng Li, May Fung, Qingyun Wang, Chi Han, Manling Li, Jindong Wang, Heng Ji

    Abstract: Mental health disorders are one of the most serious diseases in the world. Most people with such a disease lack access to adequate care, which highlights the importance of training models for the diagnosis and treatment of mental health disorders. However, in the mental health domain, privacy concerns limit the accessibility of personalized treatment data, making it challenging to build powerful m… ▽ More

    Submitted 5 February, 2025; v1 submitted 9 October, 2024; originally announced October 2024.

    Comments: Technical Report; 26 pages

  11. arXiv:2410.03642  [pdf, other

    cs.CL cs.AI cs.HC

    Aligning LLMs with Individual Preferences via Interaction

    Authors: Shujin Wu, May Fung, Cheng Qian, Jeonghwan Kim, Dilek Hakkani-Tur, Heng Ji

    Abstract: As large language models (LLMs) demonstrate increasingly advanced capabilities, aligning their behaviors with human values and preferences becomes crucial for their wide adoption. While previous research focuses on general alignment to principles such as helpfulness, harmlessness, and honesty, the need to account for individual and diverse preferences has been largely overlooked, potentially under… ▽ More

    Submitted 15 December, 2024; v1 submitted 4 October, 2024; originally announced October 2024.

    Comments: Accepted to COLING 2025. The code and dataset are made public at https://github.com/ShujinWu-0814/ALOE

  12. arXiv:2409.18997  [pdf, other

    cs.CL cs.AI cs.SI

    PropaInsight: Toward Deeper Understanding of Propaganda in Terms of Techniques, Appeals, and Intent

    Authors: Jiateng Liu, Lin Ai, Zizhou Liu, Payam Karisani, Zheng Hui, May Fung, Preslav Nakov, Julia Hirschberg, Heng Ji

    Abstract: Propaganda plays a critical role in shaping public opinion and fueling disinformation. While existing research primarily focuses on identifying propaganda techniques, it lacks the ability to capture the broader motives and the impacts of such content. To address these challenges, we introduce propainsight, a conceptual framework grounded in foundational social science research, which systematicall… ▽ More

    Submitted 13 February, 2025; v1 submitted 19 September, 2024; originally announced September 2024.

  13. arXiv:2409.09186  [pdf, other

    cs.CY

    Quantitative Insights into Large Language Model Usage and Trust in Academia: An Empirical Study

    Authors: Minseok Jung, Aurora Zhang, May Fung, Junho Lee, Paul Pu Liang

    Abstract: Large Language Models (LLMs) are transforming writing, reading, teaching, and knowledge retrieval in many academic fields. However, concerns regarding their misuse and erroneous outputs have led to varying degrees of trust in LLMs within academic communities. In response, various academic organizations have proposed and adopted policies regulating their usage. However, these policies are not based… ▽ More

    Submitted 6 February, 2025; v1 submitted 13 September, 2024; originally announced September 2024.

  14. arXiv:2404.08562  [pdf, other

    cs.CR cs.AI cs.LG

    Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection

    Authors: Litao Li, Steven H. H. Ding, Andrew Walenstein, Philippe Charland, Benjamin C. M. Fung

    Abstract: Software vulnerabilities are a challenge in cybersecurity. Manual security patches are often difficult and slow to be deployed, while new vulnerabilities are created. Binary code vulnerability detection is less studied and more complex compared to source code, and this has important practical implications. Deep learning has become an efficient and powerful tool in the security domain, where it pro… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  15. arXiv:2402.08749  [pdf

    cs.CV cs.LG

    Automated detection of motion artifacts in brain MR images using deep learning and explainable artificial intelligence

    Authors: Marina Manso Jimeno, Keerthi Sravan Ravi, Maggie Fung, John Thomas Vaughan, Jr., Sairam Geethanath

    Abstract: Quality assessment, including inspecting the images for artifacts, is a critical step during MRI data acquisition to ensure data quality and downstream analysis or interpretation success. This study demonstrates a deep learning model to detect rigid motion in T1-weighted brain images. We leveraged a 2D CNN for three-class classification and tested it on publicly available retrospective and prospec… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: 25 pages, 9 figures, 1 table. Submitted to NMR in Biomedicine

  16. arXiv:2402.01905  [pdf, other

    cs.SI cs.CY cs.MA

    Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media

    Authors: Jwen Fai Low, Benjamin C. M. Fung, Farkhund Iqbal, Claude Fachkha

    Abstract: For a state or non-state actor whose credibility is bankrupt, relying on bots to conduct non-attributable, non-accountable, and seemingly-grassroots-but-decentralized-in-actuality influence/information operations (info ops) on social media can help circumvent the issue of trust deficit while advancing its interests. Planning and/or defending against decentralized info ops can be aided by computati… ▽ More

    Submitted 6 February, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: 60 pages, 9 figures, 1 table

  17. arXiv:2311.03818  [pdf, other

    cs.CR

    Theoretical Patchability Quantification for IP-Level Hardware Patching Designs

    Authors: Wei-Kai Liu, Benjamin Tan, Jason M. Fung, Krishnendu Chakrabarty

    Abstract: As the complexity of System-on-Chip (SoC) designs continues to increase, ensuring thorough verification becomes a significant challenge for system integrators. The complexity of verification can result in undetected bugs. Unlike software or firmware bugs, hardware bugs are hard to fix after deployment and they require additional logic, i.e., patching logic integrated with the design in advance in… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  18. arXiv:2307.10631  [pdf, other

    cs.SE cs.AI

    Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck

    Authors: Zhiwei Fu, Steven H. H. Ding, Furkan Alaca, Benjamin C. M. Fung, Philippe Charland

    Abstract: The practice of code reuse is crucial in software development for a faster and more efficient development lifecycle. In reality, however, code reuse practices lack proper control, resulting in issues such as vulnerability propagation and intellectual property infringements. Assembly clone search, a critical shift-right defence mechanism, has been effective in identifying vulnerable code resulting… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 13 pages and 4 figures. This work has been submitted to the IEEE for possible publication

  19. Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design

    Authors: Baleegh Ahmad, Wei-Kai Liu, Luca Collini, Hammond Pearce, Jason M. Fung, Jonathan Valamehr, Mohammad Bidmeshki, Piotr Sapiecha, Steve Brown, Krishnendu Chakrabarty, Ramesh Karri, Benjamin Tan

    Abstract: To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns as early as possible, such as in RTL designs. In this work, we investigate the practical implications and feasibility of producing a set of security-specific scanners that operate on Verilog source files. The scanners indicate parts of code t… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

  20. arXiv:2207.10284  [pdf, other

    cs.LG cs.CL eess.SP

    Multi Resolution Analysis (MRA) for Approximate Self-Attention

    Authors: Zhanpeng Zeng, Sourav Pal, Jeffery Kline, Glenn M Fung, Vikas Singh

    Abstract: Transformers have emerged as a preferred model for many tasks in natural langugage processing and vision. Recent efforts on training and deploying Transformers more efficiently have identified many strategies to approximate the self-attention matrix, a key module in a Transformer architecture. Effective ideas include various prespecified sparsity patterns, low-rank basis expansions and combination… ▽ More

    Submitted 20 July, 2022; originally announced July 2022.

    Comments: ICML2022

  21. arXiv:2111.02303  [pdf, other

    cs.LG cs.AI

    On the Effectiveness of Interpretable Feedforward Neural Network

    Authors: Miles Q. Li, Benjamin C. M. Fung, Adel Abusitta

    Abstract: Deep learning models have achieved state-of-the-art performance in many classification tasks. However, most of them cannot provide an interpretation for their classification results. Machine learning models that are interpretable are usually linear or piecewise linear and yield inferior performance. Non-linear models achieve much better classification performance, but it is hard to interpret their… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  22. An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors

    Authors: Mohammad Rahmani Fadiheh, Alex Wezel, Johannes Mueller, Joerg Bormann, Sayak Ray, Jason M. Fung, Subhasish Mitra, Dominik Stoffel, Wolfgang Kunz

    Abstract: Hardware (HW) security issues have been emerging at an alarming rate in recent years. Transient execution attacks, in particular, pose a genuine threat to the security of modern computing systems. Despite recent advances, understanding the intricate implications of microarchitectural design decisions on processor security remains a great challenge and has caused a number of update cycles in the pa… ▽ More

    Submitted 22 February, 2022; v1 submitted 4 August, 2021; originally announced August 2021.

  23. arXiv:2104.08530  [pdf, other

    cs.CL

    The Topic Confusion Task: A Novel Scenario for Authorship Attribution

    Authors: Malik H. Altakrori, Jackie Chi Kit Cheung, Benjamin C. M. Fung

    Abstract: Authorship attribution is the problem of identifying the most plausible author of an anonymous text from a set of candidate authors. Researchers have investigated same-topic and cross-topic scenarios of authorship attribution, which differ according to whether new, unseen topics are used in the testing phase. However, neither scenario allows us to explain whether errors are caused by a failure to… ▽ More

    Submitted 9 September, 2021; v1 submitted 17 April, 2021; originally announced April 2021.

    Comments: 15 pages (9 + ref./appin.), 6 figures, Accepted to Findings of EMNLP 2021

  24. Learning Inter-Modal Correspondence and Phenotypes from Multi-Modal Electronic Health Records

    Authors: Kejing Yin, William K. Cheung, Benjamin C. M. Fung, Jonathan Poon

    Abstract: Non-negative tensor factorization has been shown a practical solution to automatically discover phenotypes from the electronic health records (EHR) with minimal human supervision. Such methods generally require an input tensor describing the inter-modal interactions to be pre-established; however, the correspondence between different modalities (e.g., correspondence between medications and diagnos… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: Accepted by IEEE Transactions on Knowledge and Data Engineering (TKDE)

  25. arXiv:2007.00121  [pdf

    eess.IV cs.CV physics.med-ph

    Accelerating Prostate Diffusion Weighted MRI using Guided Denoising Convolutional Neural Network: Retrospective Feasibility Study

    Authors: Elena A. Kaye, Emily A. Aherne, Cihan Duzgol, Ida Häggström, Erich Kobler, Yousef Mazaheri, Maggie M Fung, Zhigang Zhang, Ricardo Otazo, Herbert A. Vargas, Oguz Akin

    Abstract: Purpose: To investigate feasibility of accelerating prostate diffusion-weighted imaging (DWI) by reducing the number of acquired averages and denoising the resulting image using a proposed guided denoising convolutional neural network (DnCNN). Materials and Methods: Raw data from the prostate DWI scans were retrospectively gathered (between July 2018 and July 2019) from six single-vendor MRI scann… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

    Comments: This manuscript has been accepted for publication in Radiology: Artificial Intelligence (https://pubs.rsna.org/journal/ai), which is published by the Radiological Society of North America (RSNA)

  26. arXiv:2006.06862   

    cs.LG q-bio.NC stat.AP stat.ML

    Deep Learning-based Stress Determinator for Mouse Psychiatric Analysis using Hippocampus Activity

    Authors: Donghan Liu, Benjamin C. M. Fung, Tak Pan Wong

    Abstract: Decoding neurons to extract information from transmission and employ them into other use is the goal of neuroscientists' study. Due to that the field of neuroscience is utilizing the traditional methods presently, we hence combine the state-of-the-art deep learning techniques with the theory of neuron decoding to discuss its potential of accomplishment. Besides, the stress level that is related to… ▽ More

    Submitted 27 June, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: The paper need re-evaluated and reviewed, may cause some significant changes

  27. arXiv:1909.12398  [pdf, other

    cs.CV cs.LG

    Optimizing Nondecomposable Data Dependent Regularizers via Lagrangian Reparameterization offers Significant Performance and Efficiency Gains

    Authors: Sathya N. Ravi, Abhay Venkatesh, Glenn Moo Fung, Vikas Singh

    Abstract: Data dependent regularization is known to benefit a wide variety of problems in machine learning. Often, these regularizers cannot be easily decomposed into a sum over a finite number of terms, e.g., a sum over individual example-wise terms. The $F_β$ measure, Area under the ROC curve (AUCROC) and Precision at a fixed recall (P@R) are some prominent examples that are used in many applications. We… ▽ More

    Submitted 26 September, 2019; originally announced September 2019.

  28. arXiv:1909.06865  [pdf, other

    cs.LG cs.CR stat.ML

    I-MAD: Interpretable Malware Detector Using Galaxy Transformer

    Authors: Miles Q. Li, Benjamin C. M. Fung, Philippe Charland, Steven H. H. Ding

    Abstract: Malware currently presents a number of serious threats to computer users. Signature-based malware detection methods are limited in detecting new malware samples that are significantly different from known ones. Therefore, machine learning-based methods have been proposed, but there are two challenges these methods face. The first is to model the full semantics behind the assembly code of malware.… ▽ More

    Submitted 20 June, 2021; v1 submitted 15 September, 2019; originally announced September 2019.

    Comments: Published by Elsevier Computers & Security

  29. arXiv:1907.08736  [pdf, other

    cs.CR cs.CL cs.LG

    ER-AE: Differentially Private Text Generation for Authorship Anonymization

    Authors: Haohan Bo, Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal

    Abstract: Most of privacy protection studies for textual data focus on removing explicit sensitive identifiers. However, personal writing style, as a strong indicator of the authorship, is often neglected. Recent studies, such as SynTF, have shown promising results on privacy-preserving text mining. However, their anonymization algorithm can only output numeric term vectors which are difficult for the recip… ▽ More

    Submitted 13 May, 2021; v1 submitted 19 July, 2019; originally announced July 2019.

  30. arXiv:1812.00197  [pdf, other

    cs.CR

    When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

    Authors: Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran

    Abstract: In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect hardware vulnerabilities during the design phase. We show that a protection gap currently exists in practice that leaves chip designs vulnerable to software-based attacks. In particular, existing verification approaches fail to detect specific cl… ▽ More

    Submitted 1 December, 2018; originally announced December 2018.

  31. arXiv:1606.01219  [pdf, other

    cs.CL cs.CY cs.SI

    Learning Stylometric Representations for Authorship Analysis

    Authors: Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal, William K. Cheung

    Abstract: Authorship analysis (AA) is the study of unveiling the hidden properties of authors from a body of exponentially exploding textual data. It extracts an author's identity and sociolinguistic characteristics based on the reflected writing styles in the text. It is an essential process for various areas, such as cybercrime investigation, psycholinguistics, political socialization, etc. However, most… ▽ More

    Submitted 3 June, 2016; originally announced June 2016.

    ACM Class: K.4.1; I.7.5; I.2.7

  32. arXiv:1208.2773  [pdf, other

    cs.DB

    Privacy Preserving Record Linkage via grams Projections

    Authors: Luca Bonomi, Li Xiong, Rui Chen, Benjamin C. M. Fung

    Abstract: Record linkage has been extensively used in various data mining applications involving sharing data. While the amount of available data is growing, the concern of disclosing sensitive information poses the problem of utility vs privacy. In this paper, we study the problem of private record linkage via secure data transformations. In contrast to the existing techniques in this area, we propose a no… ▽ More

    Submitted 13 August, 2012; originally announced August 2012.

  33. arXiv:1112.2020  [pdf, ps, other

    cs.DB

    Differentially Private Trajectory Data Publication

    Authors: Rui Chen, Benjamin C. M. Fung, Bipin C. Desai

    Abstract: With the increasing prevalence of location-aware devices, trajectory data has been generated and collected in various application domains. Trajectory data carries rich information that is useful for many data analysis tasks. Yet, improper publishing and use of trajectory data could jeopardize individual privacy. However, it has been shown that existing privacy-preserving trajectory data publishing… ▽ More

    Submitted 9 December, 2011; originally announced December 2011.