-
Holistic Evaluation of Language Models
Authors:
Percy Liang,
Rishi Bommasani,
Tony Lee,
Dimitris Tsipras,
Dilara Soylu,
Michihiro Yasunaga,
Yian Zhang,
Deepak Narayanan,
Yuhuai Wu,
Ananya Kumar,
Benjamin Newman,
Binhang Yuan,
Bobby Yan,
Ce Zhang,
Christian Cosgrove,
Christopher D. Manning,
Christopher Ré,
Diana Acosta-Navas,
Drew A. Hudson,
Eric Zelikman,
Esin Durmus,
Faisal Ladhak,
Frieda Rong,
Hongyu Ren,
Huaxiu Yao
, et al. (25 additional authors not shown)
Abstract:
Language models (LMs) are becoming the foundation for almost all major language technologies, but their capabilities, limitations, and risks are not well understood. We present Holistic Evaluation of Language Models (HELM) to improve the transparency of language models. First, we taxonomize the vast space of potential scenarios (i.e. use cases) and metrics (i.e. desiderata) that are of interest fo…
▽ More
Language models (LMs) are becoming the foundation for almost all major language technologies, but their capabilities, limitations, and risks are not well understood. We present Holistic Evaluation of Language Models (HELM) to improve the transparency of language models. First, we taxonomize the vast space of potential scenarios (i.e. use cases) and metrics (i.e. desiderata) that are of interest for LMs. Then we select a broad subset based on coverage and feasibility, noting what's missing or underrepresented (e.g. question answering for neglected English dialects, metrics for trustworthiness). Second, we adopt a multi-metric approach: We measure 7 metrics (accuracy, calibration, robustness, fairness, bias, toxicity, and efficiency) for each of 16 core scenarios when possible (87.5% of the time). This ensures metrics beyond accuracy don't fall to the wayside, and that trade-offs are clearly exposed. We also perform 7 targeted evaluations, based on 26 targeted scenarios, to analyze specific aspects (e.g. reasoning, disinformation). Third, we conduct a large-scale evaluation of 30 prominent language models (spanning open, limited-access, and closed models) on all 42 scenarios, 21 of which were not previously used in mainstream LM evaluation. Prior to HELM, models on average were evaluated on just 17.9% of the core HELM scenarios, with some prominent models not sharing a single scenario in common. We improve this to 96.0%: now all 30 models have been densely benchmarked on the same core scenarios and metrics under standardized conditions. Our evaluation surfaces 25 top-level findings. For full transparency, we release all raw model prompts and completions publicly for further analysis, as well as a general modular toolkit. We intend for HELM to be a living benchmark for the community, continuously updated with new scenarios, metrics, and models.
△ Less
Submitted 1 October, 2023; v1 submitted 16 November, 2022;
originally announced November 2022.
-
Factorization of Ising correlations C(M,N) for $ ν= \, -k$ and M+N odd, $M \le N$, $T < T_c$ and their lambda extensions
Authors:
S. Boukraa,
C. Cosgrove,
J. -M. Maillard,
B. M. McCoy
Abstract:
We study the factorizations of Ising low-temperature correlations C(M,N) for $ν=-k$ and M+N odd, $M \le N$, for both the cases $M\neq 0$ where there are two factors, and $M=0$ where there are four factors. We find that the two factors for $ M \neq 0$ satisfy the same non-linear differential equation and, similarly, for M=0 the four factors each satisfy Okamoto sigma-form of Painlevé VI equations w…
▽ More
We study the factorizations of Ising low-temperature correlations C(M,N) for $ν=-k$ and M+N odd, $M \le N$, for both the cases $M\neq 0$ where there are two factors, and $M=0$ where there are four factors. We find that the two factors for $ M \neq 0$ satisfy the same non-linear differential equation and, similarly, for M=0 the four factors each satisfy Okamoto sigma-form of Painlevé VI equations with the same Okamoto parameters. Using a Landen transformation we show, for $M\neq 0$, that the previous non-linear differential equation can actually be reduced to an Okamoto sigma-form of Painlevé VI equation. For both the two and four factor case, we find that there is a one parameter family of boundary conditions on the Okamoto sigma-form of Painlevé VI equations which generalizes the factorization of the correlations C(M,N) to an additive decomposition of the corresponding sigma's solutions of the Okamoto sigma-form of Painlevé VI equation which we call lambda extensions. At a special value of the parameter, the lambda-extensions of the factors of C(M,N) reduce to homogeneous polynomials in the complete elliptic functions of the first and second kind. We also generalize some Tracy-Widom (Painlevé V) relations between the sum and difference of sigma's to this Painlevé VI framework.
△ Less
Submitted 26 December, 2022; v1 submitted 21 April, 2022;
originally announced April 2022.
-
Robustness Out of the Box: Compositional Representations Naturally Defend Against Black-Box Patch Attacks
Authors:
Christian Cosgrove,
Adam Kortylewski,
Chenglin Yang,
Alan Yuille
Abstract:
Patch-based adversarial attacks introduce a perceptible but localized change to the input that induces misclassification. While progress has been made in defending against imperceptible attacks, it remains unclear how patch-based attacks can be resisted. In this work, we study two different approaches for defending against black-box patch attacks. First, we show that adversarial training, which is…
▽ More
Patch-based adversarial attacks introduce a perceptible but localized change to the input that induces misclassification. While progress has been made in defending against imperceptible attacks, it remains unclear how patch-based attacks can be resisted. In this work, we study two different approaches for defending against black-box patch attacks. First, we show that adversarial training, which is successful against imperceptible attacks, has limited effectiveness against state-of-the-art location-optimized patch attacks. Second, we find that compositional deep networks, which have part-based representations that lead to innate robustness to natural occlusion, are robust to patch attacks on PASCAL3D+ and the German Traffic Sign Recognition Benchmark, without adversarial training. Moreover, the robustness of compositional models outperforms that of adversarially trained standard models by a large margin. However, on GTSRB, we observe that they have problems discriminating between similar traffic signs with fine-grained differences. We overcome this limitation by introducing part-based finetuning, which improves fine-grained recognition. By leveraging compositional representations, this is the first work that defends against black-box patch attacks without expensive adversarial training. This defense is more robust than adversarial training and more interpretable because it can locate and ignore adversarial patches.
△ Less
Submitted 1 December, 2020;
originally announced December 2020.
-
Adversarial Examples for Edge Detection: They Exist, and They Transfer
Authors:
Christian Cosgrove,
Alan L. Yuille
Abstract:
Convolutional neural networks have recently advanced the state of the art in many tasks including edge and object boundary detection. However, in this paper, we demonstrate that these edge detectors inherit a troubling property of neural networks: they can be fooled by adversarial examples. We show that adding small perturbations to an image causes HED, a CNN-based edge detection model, to fail to…
▽ More
Convolutional neural networks have recently advanced the state of the art in many tasks including edge and object boundary detection. However, in this paper, we demonstrate that these edge detectors inherit a troubling property of neural networks: they can be fooled by adversarial examples. We show that adding small perturbations to an image causes HED, a CNN-based edge detection model, to fail to locate edges, to detect nonexistent edges, and even to hallucinate arbitrary configurations of edges. More surprisingly, we find that these adversarial examples transfer to other CNN-based vision models. In particular, attacks on edge detection result in significant drops in accuracy in models trained to perform unrelated, high-level tasks like image classification and semantic segmentation. Our code will be made public.
△ Less
Submitted 1 June, 2019;
originally announced June 2019.
-
Integrability, Random Matrices and Painlevé Transcendents
Authors:
N. S. Witte,
P. J. Forrester,
Christopher M. Cosgrove
Abstract:
The probability that an interval $I$ is free of eigenvalues in a matrix ensemble with unitary symmetry is given by a Fredholm determinant. When the weight function in the matrix ensemble is a classical weight function, and the interval $I$ includes an endpoint of the support, Tracy and Widom have given a formalism which gives coupled differential equations for the required probability and some a…
▽ More
The probability that an interval $I$ is free of eigenvalues in a matrix ensemble with unitary symmetry is given by a Fredholm determinant. When the weight function in the matrix ensemble is a classical weight function, and the interval $I$ includes an endpoint of the support, Tracy and Widom have given a formalism which gives coupled differential equations for the required probability and some auxilary quantities. We summarize and extend earlier work by expressing the probability and some of the auxilary quantities in terms of Painlevé transcendents.
△ Less
Submitted 23 August, 2000;
originally announced August 2000.
-
Gap Probabilities for Edge Intervals in Finite Gaussian and Jacobi Unitary Matrix Ensembles
Authors:
N. S. Witte,
P. J. Forrester,
Christopher M. Cosgrove
Abstract:
The probabilities for gaps in the eigenvalue spectrum of the finite dimension $ N \times N $ random matrix Hermite and Jacobi unitary ensembles on some single and disconnected double intervals are found. These are cases where a reflection symmetry exists and the probability factors into two other related probabilities, defined on single intervals. Our investigation uses the system of partial dif…
▽ More
The probabilities for gaps in the eigenvalue spectrum of the finite dimension $ N \times N $ random matrix Hermite and Jacobi unitary ensembles on some single and disconnected double intervals are found. These are cases where a reflection symmetry exists and the probability factors into two other related probabilities, defined on single intervals. Our investigation uses the system of partial differential equations arising from the Fredholm determinant expression for the gap probability and the differential-recurrence equations satisfied by Hermite and Jacobi orthogonal polynomials. In our study we find second and third order nonlinear ordinary differential equations defining the probabilities in the general $N$ case. For N=1 and N=2 the probabilities and thus the solution of the equations are given explicitly. An asymptotic expansion for large gap size is obtained from the equation in the Hermite case, and also studied is the scaling at the edge of the Hermite spectrum as $ N \to \infty $, and the Jacobi to Hermite limit; these last two studies make correspondence to other cases reported here or known previously. Moreover, the differential equation arising in the Hermite ensemble is solved in terms of an explicit rational function of a {Painlevé-V} transcendent and its derivative, and an analogous solution is provided in the two Jacobi cases but this time involving a {Painlevé-VI} transcendent.
△ Less
Submitted 23 August, 2000;
originally announced August 2000.