Skip to main content

Showing 1–17 of 17 results for author: Parsons, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.19545  [pdf, other

    cs.CL cs.AI cs.LG

    Winning Big with Small Models: Knowledge Distillation vs. Self-Training for Reducing Hallucination in QA Agents

    Authors: Ashley Lewis, Michael White, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang

    Abstract: The deployment of Large Language Models (LLMs) in customer support is constrained by hallucination-generating false information-and the high cost of proprietary models. To address these challenges, we propose a retrieval-augmented question-answering (QA) pipeline and explore how to balance human input and automation. Using a dataset of questions about a Samsung Smart TV user manual, we demonstrate… ▽ More

    Submitted 26 February, 2025; originally announced February 2025.

  2. arXiv:2501.16497  [pdf, other

    cs.LG cs.AI cs.CL cs.CR stat.ML

    Smoothed Embeddings for Robust Language Models

    Authors: Ryo Hase, Md Rafi Ur Rashid, Ashley Lewis, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang

    Abstract: Improving the safety and reliability of large language models (LLMs) is a crucial aspect of realizing trustworthy AI systems. Although alignment methods aim to suppress harmful content generation, LLMs are often still vulnerable to jailbreaking attacks that employ adversarial inputs that subvert alignment and induce harmful outputs. We propose the Randomized Embedding Smoothing and Token Aggregati… ▽ More

    Submitted 27 January, 2025; originally announced January 2025.

    Comments: Presented in the Safe Generative AI Workshop at NeurIPS 2024

    MSC Class: 68T07 (Primary); 68T50 (Secondary)

  3. arXiv:2409.07291  [pdf, other

    cs.LG cs.AI cs.CR cs.CV stat.ML

    Exploring User-level Gradient Inversion with a Diffusion Prior

    Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Bradley Malin, Kieran Parsons, Ye Wang

    Abstract: We explore user-level gradient inversion as a new attack surface in distributed learning. We first investigate existing attacks on their ability to make inferences about private information beyond training data reconstruction. Motivated by the low reconstruction quality of existing methods, we propose a novel gradient inversion attack that applies a denoising diffusion model as a strong image prio… ▽ More

    Submitted 11 September, 2024; originally announced September 2024.

    Comments: Presented at the International Workshop on Federated Learning in the Age of Foundation Models in conjunction with NeurIPS 2023

  4. arXiv:2408.16913  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Analyzing Inference Privacy Risks Through Gradients in Machine Learning

    Authors: Zhuohang Li, Andrew Lowy, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Bradley Malin, Ye Wang

    Abstract: In distributed learning settings, models are iteratively updated with shared gradients computed from potentially sensitive user data. While previous work has studied various privacy risks of sharing gradients, our paper aims to provide a systematic approach to analyze private information leakage from gradients. We present a unified game-based framework that encompasses a broad range of attacks inc… ▽ More

    Submitted 29 August, 2024; originally announced August 2024.

  5. arXiv:2407.11844  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Variational Randomized Smoothing for Sample-Wise Adversarial Robustness

    Authors: Ryo Hase, Ye Wang, Toshiaki Koike-Akino, Jing Liu, Kieran Parsons

    Abstract: Randomized smoothing is a defensive technique to achieve enhanced robustness against adversarial examples which are small input perturbations that degrade the performance of neural network models. Conventional randomized smoothing adds random noise with a fixed noise level for every input sample to smooth out adversarial perturbations. This paper proposes a new variational framework that uses a pe… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: 20 pages, under preparation

  6. arXiv:2406.05257  [pdf, other

    cs.LG cs.CR

    Efficient Differentially Private Fine-Tuning of Diffusion Models

    Authors: Jing Liu, Andrew Lowy, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang

    Abstract: The recent developments of Diffusion Models (DMs) enable generation of astonishingly high-quality synthetic samples. Recent work showed that the synthetic samples generated by the diffusion model, which is pre-trained on public data and fully fine-tuned with differential privacy on private data, can train a downstream classifier, while achieving a good privacy-utility tradeoff. However, fully fine… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  7. arXiv:2403.10686  [pdf, other

    cs.AR cs.AI cs.LG

    AutoHLS: Learning to Accelerate Design Space Exploration for HLS Designs

    Authors: Md Rubel Ahmed, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang

    Abstract: High-level synthesis (HLS) is a design flow that leverages modern language features and flexibility, such as complex data structures, inheritance, templates, etc., to prototype hardware designs rapidly. However, exploring various design space parameters can take much time and effort for hardware engineers to meet specific design specifications. This paper proposes a novel framework called AutoHLS,… ▽ More

    Submitted 15 March, 2024; originally announced March 2024.

    Comments: 5 pages, 6 figures, MWSCAS 2023

  8. arXiv:2402.09540  [pdf, other

    cs.CR cs.AI cs.LG

    Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks?

    Authors: Andrew Lowy, Zhuohang Li, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang

    Abstract: For small privacy parameter $ε$, $ε$-differential privacy (DP) provides a strong worst-case guarantee that no membership inference attack (MIA) can succeed at determining whether a person's data was used to train a machine learning model. The guarantee of DP is worst-case because: a) it holds even if the attacker already knows the records of all but one person in the data set; and b) it holds unif… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: Accepted at PPAI-24: AAAI Workshop on Privacy-Preserving Artificial Intelligence

    MSC Class: 68P27

  9. arXiv:2310.08762  [pdf, other

    cs.LG cs.AI cs.HC eess.SP stat.ML

    Stabilizing Subject Transfer in EEG Classification with Divergence Estimation

    Authors: Niklas Smedemark-Margulies, Ye Wang, Toshiaki Koike-Akino, Jing Liu, Kieran Parsons, Yunus Bicer, Deniz Erdogmus

    Abstract: Classification models for electroencephalogram (EEG) data show a large decrease in performance when evaluated on unseen test sub jects. We reduce this performance decrease using new regularization techniques during model training. We propose several graphical models to describe an EEG classification task. From each model, we identify statistical relationships that should hold true in an idealized… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: 16 pages, 5 figures

  10. arXiv:2205.09529  [pdf, other

    cs.LG cs.NI eess.SP

    Mobility, Communication and Computation Aware Federated Learning for Internet of Vehicles

    Authors: Md Ferdous Pervej, Jianlin Guo, Kyeong Jin Kim, Kieran Parsons, Philip Orlik, Stefano Di Cairano, Marcel Menner, Karl Berntorp, Yukimasa Nagai, Huaiyu Dai

    Abstract: While privacy concerns entice connected and automated vehicles to incorporate on-board federated learning (FL) solutions, an integrated vehicle-to-everything communication with heterogeneous computation power aware learning platform is urgently necessary to make it a reality. Motivated by this, we propose a novel mobility, communication and computation aware online FL platform that uses on-road ve… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 9 pages, 12 figures

  11. arXiv:2205.08611  [pdf, other

    eess.SP cs.ET cs.LG

    Learning to Learn Quantum Turbo Detection

    Authors: Bryan Liu, Toshiaki Koike-Akino, Ye Wang, Kieran Parsons

    Abstract: This paper investigates a turbo receiver employing a variational quantum circuit (VQC). The VQC is configured with an ansatz of the quantum approximate optimization algorithm (QAOA). We propose a 'learning to learn' (L2L) framework to optimize the turbo VQC decoder such that high fidelity soft-decision output is generated. Besides demonstrating the proposed algorithm's computational complexity, we… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 6 pages, 3 figures, IEEE GLOBECOM 2022

  12. arXiv:2205.08603  [pdf, other

    eess.SP cs.ET cs.LG

    Variational Quantum Compressed Sensing for Joint User and Channel State Acquisition in Grant-Free Device Access Systems

    Authors: Bryan Liu, Toshiaki Koike-Akino, Ye Wang, Kieran Parsons

    Abstract: This paper introduces a new quantum computing framework integrated with a two-step compressed sensing technique, applied to a joint channel estimation and user identification problem. We propose a variational quantum circuit (VQC) design as a new denoising solution. For a practical grant-free communications system having correlated device activities, variational quantum parameters for Pauli rotati… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

    Comments: 6 pages, 6 figures, IEEE ICC 2022

  13. Huffman-coded Sphere Shaping and Distribution Matching Algorithms via Lookup Tables

    Authors: Tobias Fehenberger, David S. Millar, Toshiaki Koike-Akino, Keisuke Kojima, Kieran Parsons, Helmut Griesser

    Abstract: In this paper, we study amplitude shaping schemes for the probabilistic amplitude shaping (PAS) framework as well as algorithms for constant-composition distribution matching (CCDM). Huffman-coded sphere shaping (HCSS) is discussed in detail, which internally uses Huffman coding to determine the composition to be used and relies on conventional CCDM algorithms for mapping and demapping. Numerical… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

    Comments: The work has been partially funded by the German Ministry of Education and Research in the project PEARLS (contract #13N14937)

    Journal ref: IEEE/OSA Journal of Lightwave Technology, vol. 38, no. 10, pp. 2826-2834, May 2020

  14. Analysis of Nonlinear Fiber Interactions for Finite-Length Constant-Composition Sequences

    Authors: Tobias Fehenberger, David S. Millar, Toshiaki Koike-Akino, Keisuke Kojima, Kieran Parsons, Helmut Griesser

    Abstract: In order to realize probabilistically shaped signaling within the probabilistic amplitude shaping (PAS) framework, a shaping device outputs sequences that follow a certain nonuniform distribution. In case of constant-composition (CC) distribution matching (CCDM), the sequences differ only in the ordering of their constituent symbols, whereas the number of occurrences of each symbol is constant in… ▽ More

    Submitted 12 June, 2020; originally announced June 2020.

    Comments: The work was supported in part by the German Ministry of Education and Research in the projects SpeeD (contract #13N1374) and PEARLS (contract #13N14937)

    Journal ref: IEEE/OSA Journal of Lightwave Technology, vol. 38, no. 2, pp. 457-465, Jan 2020

  15. arXiv:1911.10131  [pdf, other

    eess.SP cs.IT cs.LG

    Neural Turbo Equalization: Deep Learning for Fiber-Optic Nonlinearity Compensation

    Authors: Toshiaki Koike-Akino, Ye Wang, David S. Millar, Keisuke Kojima, Kieran Parsons

    Abstract: Recently, data-driven approaches motivated by modern deep learning have been applied to optical communications in place of traditional model-based counterparts. The application of deep neural networks (DNN) allows flexible statistical analysis of complicated fiber-optic systems without relying on any specific physical models. Due to the inherent nonlinearity in DNN, various equalizers based on DNN… ▽ More

    Submitted 22 November, 2019; originally announced November 2019.

    Comments: 7 pages, 13 figures

  16. arXiv:1606.00887  [pdf

    cs.CY cs.CR

    Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails

    Authors: Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, Agata McCormac

    Abstract: We examined the influence of three social engineering strategies on users' judgments of how safe it is to click on a link in an email. The three strategies examined were authority, scarcity and social proof, and the emails were either genuine, phishing or spear-phishing. Of the three strategies, the use of authority was the most effective strategy in convincing users that a link in an email was sa… ▽ More

    Submitted 28 May, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/57

  17. arXiv:1605.04717  [pdf

    cs.CY cs.CR

    Do Users Focus on the Correct Cues to Differentiate Between Phishing and Genuine Emails?

    Authors: Kathryn Parsons, Marcus Butavicius, Malcolm Pattinson, Dragana Calic, Agata Mccormac, Cate Jerram

    Abstract: This paper examines the cues that typically differentiate phishing emails from genuine emails. The research is conducted in two stages. In the first stage, we identify the cues that actually differentiate between phishing and genuine emails. These are the consistency and personalisation of the message, the perceived legitimacy of links and sender, and the presence of spelling or grammatical irregu… ▽ More

    Submitted 16 May, 2016; originally announced May 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/27