Skip to main content

Showing 1–16 of 16 results for author: Kour, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.09600  [pdf, ps, other

    cs.MA cs.AI cs.CL cs.CR

    Effective Red-Teaming of Policy-Adherent Agents

    Authors: Itay Nakash, George Kour, Koren Lazar, Matan Vetzler, Guy Uziel, Ateret Anaby-Tavor

    Abstract: Task-oriented LLM-based agents are increasingly used in domains with strict policies, such as refund eligibility or cancellation rules. The challenge lies in ensuring that the agent consistently adheres to these rules and policies, appropriately refusing any request that would violate them, while still maintaining a helpful and natural interaction. This calls for the development of tailored design… ▽ More

    Submitted 22 June, 2025; v1 submitted 11 June, 2025; originally announced June 2025.

  2. arXiv:2505.19621  [pdf, ps, other

    cs.AI cs.CL

    Think Again! The Effect of Test-Time Compute on Preferences, Opinions, and Beliefs of Large Language Models

    Authors: George Kour, Itay Nakash, Ateret Anaby-Tavor, Michal Shmueli-Scheuer

    Abstract: As Large Language Models (LLMs) become deeply integrated into human life and increasingly influence decision-making, it's crucial to evaluate whether and to what extent they exhibit subjective preferences, opinions, and beliefs. These tendencies may stem from biases within the models, which may shape their behavior, influence the advice and recommendations they offer to users, and potentially rein… ▽ More

    Submitted 26 May, 2025; originally announced May 2025.

  3. arXiv:2410.16950  [pdf, other

    cs.CR cs.AI

    Breaking ReAct Agents: Foot-in-the-Door Attack Will Get You In

    Authors: Itay Nakash, George Kour, Guy Uziel, Ateret Anaby-Tavor

    Abstract: Following the advancement of large language models (LLMs), the development of LLM-based autonomous agents has become increasingly prevalent. As a result, the need to understand the security vulnerabilities of these agents has become a critical task. We examine how ReAct agents can be exploited using a straightforward yet effective method we refer to as the foot-in-the-door attack. Our experiments… ▽ More

    Submitted 22 October, 2024; originally announced October 2024.

  4. arXiv:2409.04822  [pdf, other

    cs.CL cs.AI

    Exploring Straightforward Conversational Red-Teaming

    Authors: George Kour, Naama Zwerdling, Marcel Zalmanovici, Ateret Anaby-Tavor, Ora Nova Fandina, Eitan Farchi

    Abstract: Large language models (LLMs) are increasingly used in business dialogue systems but they pose security and ethical risks. Multi-turn conversations, where context influences the model's behavior, can be exploited to produce undesired responses. In this paper, we examine the effectiveness of utilizing off-the-shelf LLMs in straightforward red-teaming approaches, where an attacker LLM aims to elicit… ▽ More

    Submitted 7 September, 2024; originally announced September 2024.

  5. arXiv:2408.12259  [pdf, other

    cs.AI

    How Safe is Your Safety Metric? Automatic Concatenation Tests for Metric Reliability

    Authors: Ora Nova Fandina, Leshem Choshen, Eitan Farchi, George Kour, Yotam Perlitz, Orna Raz

    Abstract: Consider a scenario where a harmfulness evaluation metric intended to filter unsafe responses from a Large Language Model. When applied to individual harmful prompt-response pairs, it correctly flags them as unsafe by assigning a high-risk score. Yet, if those same pairs are concatenated, the metrics decision unexpectedly reverses - labelling the combined content as safe with a low score, allowing… ▽ More

    Submitted 12 February, 2025; v1 submitted 22 August, 2024; originally announced August 2024.

    MSC Class: 68T50

  6. arXiv:2405.20341  [pdf, other

    cs.LG cs.CL

    From Zero to Hero: Cold-Start Anomaly Detection

    Authors: Tal Reiss, George Kour, Naama Zwerdling, Ateret Anaby-Tavor, Yedid Hoshen

    Abstract: When first deploying an anomaly detection system, e.g., to detect out-of-scope queries in chatbots, there are no observed data, making data-driven approaches ineffective. Zero-shot anomaly detection methods offer a solution to such "cold-start" cases, but unfortunately they are often not accurate enough. This paper studies the realistic but underexplored cold-start setting where an anomaly detecti… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: ACL 2024. Our code is available at https://github.com/talreiss/ColdFusion

  7. arXiv:2403.06009  [pdf, other

    cs.LG

    Detectors for Safe and Reliable LLMs: Implementations, Uses, and Limitations

    Authors: Swapnaja Achintalwar, Adriana Alvarado Garcia, Ateret Anaby-Tavor, Ioana Baldini, Sara E. Berger, Bishwaranjan Bhattacharjee, Djallel Bouneffouf, Subhajit Chaudhury, Pin-Yu Chen, Lamogha Chiazor, Elizabeth M. Daly, Kirushikesh DB, Rogério Abreu de Paula, Pierre Dognin, Eitan Farchi, Soumya Ghosh, Michael Hind, Raya Horesh, George Kour, Ja Young Lee, Nishtha Madaan, Sameep Mehta, Erik Miehling, Keerthiram Murugesan, Manish Nagireddy , et al. (13 additional authors not shown)

    Abstract: Large language models (LLMs) are susceptible to a variety of risks, from non-faithful output to biased and toxic generations. Due to several limiting factors surrounding LLMs (training cost, API access, data availability, etc.), it may not always be feasible to impose direct safety constraints on a deployed model. Therefore, an efficient and reliable alternative is required. To this end, we presen… ▽ More

    Submitted 19 August, 2024; v1 submitted 9 March, 2024; originally announced March 2024.

  8. arXiv:2311.04124  [pdf, other

    cs.CL cs.AI cs.LG

    Unveiling Safety Vulnerabilities of Large Language Models

    Authors: George Kour, Marcel Zalmanovici, Naama Zwerdling, Esther Goldbraich, Ora Nova Fandina, Ateret Anaby-Tavor, Orna Raz, Eitan Farchi

    Abstract: As large language models become more prevalent, their possible harmful or inappropriate responses are a cause for concern. This paper introduces a unique dataset containing adversarial examples in the form of questions, which we call AttaQ, designed to provoke such harmful or inappropriate responses. We assess the efficacy of our dataset by analyzing the vulnerabilities of various models when subj… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

    Comments: To be published in GEM workshop. Conference on Empirical Methods in Natural Language Processing (EMNLP). 2023

    ACM Class: I.2.7

  9. arXiv:2310.14829  [pdf

    cs.CL stat.AP

    Characterizing how 'distributional' NLP corpora distance metrics are

    Authors: Samuel Ackerman, George Kour, Eitan Farchi

    Abstract: A corpus of vector-embedded text documents has some empirical distribution. Given two corpora, we want to calculate a single metric of distance (e.g., Mauve, Frechet Inception) between them. We describe an abstract quality, called `distributionality', of such metrics. A non-distributional metric tends to use very local measurements, or uses global measurements in a way that does not fully reflect… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

    Comments: Published in the August 2023 Joint Statistical Meetings proceedings

  10. arXiv:2211.16259  [pdf, other

    cs.CL

    Measuring the Measuring Tools: An Automatic Evaluation of Semantic Metrics for Text Corpora

    Authors: George Kour, Samuel Ackerman, Orna Raz, Eitan Farchi, Boaz Carmeli, Ateret Anaby-Tavor

    Abstract: The ability to compare the semantic similarity between text corpora is important in a variety of natural language processing applications. However, standard methods for evaluating these metrics have yet to be established. We propose a set of automatic and interpretable measures for assessing the characteristics of corpus-level semantic similarity metrics, allowing sensible comparison of their beha… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: Published at GEM (https://gem-benchmark.com/workshop) workshop at the Empirical Methods in Natural Language Processing (EMNLP) conference in 2022

  11. arXiv:2206.11219  [pdf, other

    cs.CL

    Understanding the Properties of Generated Corpora

    Authors: Naama Zwerdling, Segev Shlomov, Esther Goldbraich, George Kour, Boaz Carmeli, Naama Tepper, Inbal Ronen, Vitaly Zabershinsky, Ateret Anaby-Tavor

    Abstract: Models for text generation have become focal for many research tasks and especially for the generation of sentence corpora. However, understanding the properties of an automatically generated text corpus remains challenging. We propose a set of tools that examine the properties of generated text corpora. Applying these tools on various generated corpora allowed us to gain new insights into the pro… ▽ More

    Submitted 27 October, 2022; v1 submitted 22 June, 2022; originally announced June 2022.

  12. arXiv:2204.13043  [pdf, other

    cs.HC stat.AP

    High-quality Conversational Systems

    Authors: Samuel Ackerman, Ateret Anaby-Tavor, Eitan Farchi, Esther Goldbraich, George Kour, Ella Rabinovich, Orna Raz, Saritha Route, Marcel Zalmanovici, Naama Zwerdling

    Abstract: Conversational systems or chatbots are an example of AI-Infused Applications (AIIA). Chatbots are especially important as they are often the first interaction of clients with a business and are the entry point of a business into the AI (Artificial Intelligence) world. The quality of the chatbot is, therefore, key. However, as is the case in general with AIIAs, it is especially challenging to asses… ▽ More

    Submitted 28 April, 2022; v1 submitted 27 April, 2022; originally announced April 2022.

  13. arXiv:2112.11832  [pdf, other

    cs.LG

    Classifier Data Quality: A Geometric Complexity Based Method for Automated Baseline And Insights Generation

    Authors: George Kour, Marcel Zalmanovici, Orna Raz, Samuel Ackerman, Ateret Anaby-Tavor

    Abstract: Testing Machine Learning (ML) models and AI-Infused Applications (AIIAs), or systems that contain ML models, is highly challenging. In addition to the challenges of testing classical software, it is acceptable and expected that statistical ML models sometimes output incorrect results. A major challenge is to determine when the level of incorrectness, e.g., model accuracy or F1 score for classifier… ▽ More

    Submitted 27 October, 2022; v1 submitted 22 December, 2021; originally announced December 2021.

    Comments: Accepted to EDSMLS workshop at AAAI conference

  14. arXiv:1911.03118  [pdf, other

    cs.CL cs.LG

    Not Enough Data? Deep Learning to the Rescue!

    Authors: Ateret Anaby-Tavor, Boaz Carmeli, Esther Goldbraich, Amir Kantor, George Kour, Segev Shlomov, Naama Tepper, Naama Zwerdling

    Abstract: Based on recent advances in natural language modeling and those in text generation capabilities, we propose a novel data augmentation method for text classification tasks. We use a powerful pre-trained neural network model to artificially synthesize new labeled data for supervised learning. We mainly focus on cases with scarce labeled data. Our method, referred to as language-model-based data augm… ▽ More

    Submitted 27 November, 2019; v1 submitted 8 November, 2019; originally announced November 2019.

    Comments: 20 pages

  15. arXiv:1901.03995  [pdf, other

    cs.LG stat.ML

    Neural network gradient-based learning of black-box function interfaces

    Authors: Alon Jacovi, Guy Hadash, Einat Kermany, Boaz Carmeli, Ofer Lavi, George Kour, Jonathan Berant

    Abstract: Deep neural networks work well at approximating complicated functions when provided with data and trained by gradient descent methods. At the same time, there is a vast amount of existing functions that programmatically solve different tasks in a precise manner eliminating the need for training. In many cases, it is possible to decompose a task to a series of functions, of which for some we may pr… ▽ More

    Submitted 13 January, 2019; originally announced January 2019.

    Comments: Published as a conference paper at ICLR 2019

  16. arXiv:1804.09028  [pdf, other

    cs.LG cs.CL stat.ML

    Estimate and Replace: A Novel Approach to Integrating Deep Neural Networks with Existing Applications

    Authors: Guy Hadash, Einat Kermany, Boaz Carmeli, Ofer Lavi, George Kour, Alon Jacovi

    Abstract: Existing applications include a huge amount of knowledge that is out of reach for deep neural networks. This paper presents a novel approach for integrating calls to existing applications into deep learning architectures. Using this approach, we estimate each application's functionality with an estimator, which is implemented as a deep neural network (DNN). The estimator is then embedded into a ba… ▽ More

    Submitted 24 April, 2018; originally announced April 2018.