Skip to main content

Showing 1–11 of 11 results for author: Lokam, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.16006  [pdf, other

    cs.CL

    Exploring Continual Fine-Tuning for Enhancing Language Ability in Large Language Model

    Authors: Divyanshu Aggarwal, Sankarshan Damle, Navin Goyal, Satya Lokam, Sunayana Sitaram

    Abstract: A common challenge towards the adaptability of Large Language Models (LLMs) is their ability to learn new languages over time without hampering the model's performance on languages in which the model is already proficient (usually English). Continual fine-tuning (CFT) is the process of sequentially fine-tuning an LLM to enable the model to adapt to downstream tasks with varying data distributions… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

    Comments: 19 pages, 6 tables, 4 figures

  2. arXiv:2407.10886  [pdf, other

    cs.CR cs.LG stat.ML

    SLIP: Securing LLMs IP Using Weights Decomposition

    Authors: Yehonathan Refael, Adam Hakim, Lev Greenberg, Tal Aviv, Satya Lokam, Ben Fishman, Shachar Seidman

    Abstract: Large language models (LLMs) have recently seen widespread adoption, in both academia and industry. As these models grow, they become valuable intellectual property (IP), reflecting enormous investments by their owners. Moreover, the high cost of cloud-based deployment has driven interest towards deployment to edge devices, yet this risks exposing valuable parameters to theft and unauthorized use.… ▽ More

    Submitted 1 August, 2024; v1 submitted 15 July, 2024; originally announced July 2024.

  3. arXiv:2402.18386  [pdf, other

    cs.CR cs.DC

    TrustRate: A Decentralized Platform for Hijack-Resistant Anonymous Reviews

    Authors: Rohit Dwivedula, Sriram Sridhar, Sambhav Satija, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam

    Abstract: Reviews and ratings by users form a central component in several widely used products today (e.g., product reviews, ratings of online content, etc.), but today's platforms for managing such reviews are ad-hoc and vulnerable to various forms of tampering and hijack by fake reviews either by bots or motivated paid workers. We define a new metric called 'hijack-resistance' for such review platforms,… ▽ More

    Submitted 20 July, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: 23 pages. Poster at The 24th Privacy Enhancing Technologies Symposium, 2024, Bristol, United Kingdom

  4. arXiv:2303.16372  [pdf, other

    cs.LG cs.CR stat.ML

    On the Query Complexity of Training Data Reconstruction in Private Learning

    Authors: Prateeti Mukherjee, Satya Lokam

    Abstract: We analyze the number of queries that a whitebox adversary needs to make to a private learner in order to reconstruct its training data. For $(ε, δ)$ DP learners with training data drawn from any arbitrary compact metric space, we provide the \emph{first known lower bounds on the adversary's query complexity} as a function of the learner's privacy parameters. \emph{Our results are minimax optimal… ▽ More

    Submitted 11 January, 2024; v1 submitted 28 March, 2023; originally announced March 2023.

    Comments: Updated proof of Thm 10, fixed typos

  5. Telechain: Bridging Telecom Policy and Blockchain Practice

    Authors: Sudheesh Singanamalla, Apurv Mehra, Nishanth Chandran, Himanshi Lohchab, Seshanuradha Chava, Asit Kadayan, Sunil Bajpai, Kurtis Heimerl, Richard Anderson, Satya Lokam

    Abstract: The use of blockchain in regulatory ecosystems is a promising approach to address challenges of compliance among mutually untrusted entities. In this work, we consider applications of blockchain technologies in telecom regulations. In particular, we address growing concerns around Unsolicited Commercial Communication (UCC aka. spam) sent through text messages (SMS) and phone calls in India. Despit… ▽ More

    Submitted 24 May, 2022; originally announced May 2022.

    Comments: 20 pages, 6 figures, 1 table

    ACM Class: J.7; K.4.1; K.4.3

    Journal ref: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies (COMPASS) (COMPASS '22), June 29-July 1, 2022, Seattle, WA, USA

  6. arXiv:2010.07277  [pdf, other

    cs.DC

    Blockene: A High-throughput Blockchain Over Mobile Devices

    Authors: Sambhav Satija, Apurv Mehra, Sudheesh Singanamalla, Karan Grover, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam

    Abstract: We introduce Blockene, a blockchain that reduces resource usage at member nodes by orders of magnitude, requiring only a smartphone to participate in block validation and consensus. Despite being lightweight, Blockene provides a high throughput of transactions and scales to a large number of participants. Blockene consumes negligible battery and data in smartphones, enabling millions of users to p… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

    Comments: A version of this paper (without the appendix) will appear in OSDI 2020

  7. arXiv:1903.11635  [pdf, ps, other

    cs.CC

    Fourier Entropy-Influence Conjecture for Random Linear Threshold Functions

    Authors: Sourav Chakraborty, Sushrut Karmalkar, Srijita Kundu, Satyanarayana V. Lokam, Nitin Saurabh

    Abstract: The Fourier-Entropy Influence (FEI) Conjecture states that for any Boolean function $f:\{+1,-1\}^n \to \{+1,-1\}$, the Fourier entropy of $f$ is at most its influence up to a universal constant factor. While the FEI conjecture has been proved for many classes of Boolean functions, it is still not known whether it holds for the class of Linear Threshold Functions. A natural question is: Does the FE… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

    Comments: Appeared in LATIN 2018

  8. arXiv:1807.01166  [pdf, ps, other

    cs.IT

    $ε$-MSR Codes: Contacting Fewer Code Blocks for Exact Repair

    Authors: Venkatesan Guruswami, Satyanarayana V. Lokam, Sai Vikneshwar Mani Jayaraman

    Abstract: $ε$-Minimum Storage Regenerating ($ε… ▽ More

    Submitted 3 July, 2018; originally announced July 2018.

    Comments: A preliminary conference version of this work was presented at ISIT 2018

  9. arXiv:1507.01095  [pdf, ps, other

    cs.IT

    Weight Enumerators and Higher Support Weights of Maximally Recoverable Codes

    Authors: V. Lalitha, Satyanarayana V. Lokam

    Abstract: In this paper, we establish the matroid structures corresponding to data-local and local maximally recoverable codes (MRC). The matroid structures of these codes can be used to determine the associated Tutte polynomial. Greene proved that the weight enumerators of any code can be determined from its associated Tutte polynomial. We will use this result to derive explicit expressions for the weight… ▽ More

    Submitted 4 July, 2015; originally announced July 2015.

    Comments: 19 pages

  10. arXiv:1502.00357  [pdf, ps, other

    cs.CC

    On Restricting No-Junta Boolean Function and Degree Lower Bounds by Polynomial Method

    Authors: Chia-Jung Lee, Satya V. Lokam, Shi-Chun Tsai, Ming-Chuan Yang

    Abstract: Let $\mathcal{F}_{n}^*$ be the set of Boolean functions depending on all $n$ variables. We prove that for any $f\in \mathcal{F}_{n}^*$, $f|_{x_i=0}$ or $f|_{x_i=1}$ depends on the remaining $n-1$ variables, for some variable $x_i$. This existent result suggests a possible way to deal with general Boolean functions via its subfunctions of some restrictions. As an application, we consider the degr… ▽ More

    Submitted 4 February, 2015; v1 submitted 1 February, 2015; originally announced February 2015.

    Comments: 5 pages, ISIT 2015. Simplified proof

  11. Using Elimination Theory to construct Rigid Matrices

    Authors: Abhinav Kumar, Satyanarayana V. Lokam, Vijay M. Patankar, Jayalal Sarma M. N

    Abstract: The rigidity of a matrix A for target rank r is the minimum number of entries of A that must be changed to ensure that the rank of the altered matrix is at most r. Since its introduction by Valiant (1977), rigidity and similar rank-robustness functions of matrices have found numerous applications in circuit complexity, communication complexity, and learning complexity. Almost all nxn matrices over… ▽ More

    Submitted 16 April, 2014; v1 submitted 28 October, 2009; originally announced October 2009.

    Comments: 25 Pages, minor typos corrected

    Journal ref: Computational Complexity 23 (2014), 531-563