-
Learning to Retrieve Iteratively for In-Context Learning
Authors:
Yunmo Chen,
Tongfei Chen,
Harsh Jhamtani,
Patrick Xia,
Richard Shin,
Jason Eisner,
Benjamin Van Durme
Abstract:
We introduce iterative retrieval, a novel framework that empowers retrievers to make iterative decisions through policy optimization. Finding an optimal portfolio of retrieved items is a combinatorial optimization problem, generally considered NP-hard. This approach provides a learned approximation to such a solution, meeting specific task requirements under a given family of large language models…
▽ More
We introduce iterative retrieval, a novel framework that empowers retrievers to make iterative decisions through policy optimization. Finding an optimal portfolio of retrieved items is a combinatorial optimization problem, generally considered NP-hard. This approach provides a learned approximation to such a solution, meeting specific task requirements under a given family of large language models (LLMs). We propose a training procedure based on reinforcement learning, incorporating feedback from LLMs. We instantiate an iterative retriever for composing in-context learning (ICL) exemplars and apply it to various semantic parsing tasks that demand synthesized programs as outputs. By adding only 4M additional parameters for state encoding, we convert an off-the-shelf dense retriever into a stateful iterative retriever, outperforming previous methods in selecting ICL exemplars on semantic parsing datasets such as CalFlow, TreeDST, and MTOP. Additionally, the trained iterative retriever generalizes across different inference LLMs beyond the one used during training.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
ToolTalk: Evaluating Tool-Usage in a Conversational Setting
Authors:
Nicholas Farn,
Richard Shin
Abstract:
Large language models (LLMs) have displayed massive improvements in reasoning and decision-making skills and can hold natural conversations with users. Many recent works seek to augment LLM-based assistants with external tools so they can access private or up-to-date information and carry out actions on behalf of users. To better measure the performance of these assistants, this paper introduces T…
▽ More
Large language models (LLMs) have displayed massive improvements in reasoning and decision-making skills and can hold natural conversations with users. Many recent works seek to augment LLM-based assistants with external tools so they can access private or up-to-date information and carry out actions on behalf of users. To better measure the performance of these assistants, this paper introduces ToolTalk, a benchmark consisting of complex user intents requiring multi-step tool usage specified through dialogue. ToolTalk contains 28 tools grouped into 7 plugins, and includes a complete simulated implementation of each tool, allowing for fully automated evaluation of assistants that rely on execution feedback. ToolTalk also emphasizes tools that externally affect the world rather than only tools for referencing or searching information. We evaluate GPT-3.5 and GPT-4 on ToolTalk resulting in success rates of 26% and 50% respectively. Our analysis of the errors reveals three major categories and suggests some future directions for improvement. We release ToolTalk at https://github.com/microsoft/ToolTalk.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation
Authors:
Xinyu Tang,
Richard Shin,
Huseyin A. Inan,
Andre Manoel,
Fatemehsadat Mireshghallah,
Zinan Lin,
Sivakanth Gopi,
Janardhan Kulkarni,
Robert Sim
Abstract:
We study the problem of in-context learning (ICL) with large language models (LLMs) on private datasets. This scenario poses privacy risks, as LLMs may leak or regurgitate the private examples demonstrated in the prompt. We propose a novel algorithm that generates synthetic few-shot demonstrations from the private dataset with formal differential privacy (DP) guarantees, and show empirically that…
▽ More
We study the problem of in-context learning (ICL) with large language models (LLMs) on private datasets. This scenario poses privacy risks, as LLMs may leak or regurgitate the private examples demonstrated in the prompt. We propose a novel algorithm that generates synthetic few-shot demonstrations from the private dataset with formal differential privacy (DP) guarantees, and show empirically that it can achieve effective ICL. We conduct extensive experiments on standard benchmarks and compare our algorithm with non-private ICL and zero-shot solutions. Our results demonstrate that our algorithm can achieve competitive performance with strong privacy levels. These results open up new possibilities for ICL with privacy protection for a broad range of applications.
△ Less
Submitted 27 January, 2024; v1 submitted 20 September, 2023;
originally announced September 2023.
-
Privacy-Preserving Domain Adaptation of Semantic Parsers
Authors:
Fatemehsadat Mireshghallah,
Yu Su,
Tatsunori Hashimoto,
Jason Eisner,
Richard Shin
Abstract:
Task-oriented dialogue systems often assist users with personal or confidential matters. For this reason, the developers of such a system are generally prohibited from observing actual usage. So how can they know where the system is failing and needs more training data or new functionality? In this work, we study ways in which realistic user utterances can be generated synthetically, to help incre…
▽ More
Task-oriented dialogue systems often assist users with personal or confidential matters. For this reason, the developers of such a system are generally prohibited from observing actual usage. So how can they know where the system is failing and needs more training data or new functionality? In this work, we study ways in which realistic user utterances can be generated synthetically, to help increase the linguistic and functional coverage of the system, without compromising the privacy of actual users. To this end, we propose a two-stage Differentially Private (DP) generation method which first generates latent semantic parses, and then generates utterances based on the parses. Our proposed approach improves MAUVE by 2.5$\times$ and parse tree function type overlap by 1.3$\times$ relative to current approaches for private synthetic data generation, improving both on fluency and semantic coverage. We further validate our approach on a realistic domain adaptation task of adding new functionality from private user data to a semantic parser, and show overall gains of 8.5% points in accuracy with the new feature.
△ Less
Submitted 8 June, 2023; v1 submitted 20 December, 2022;
originally announced December 2022.
-
SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and Usability
Authors:
Dipkamal Bhusal,
Rosalyn Shin,
Ajay Ashok Shewale,
Monish Kumar Manikya Veerabhadran,
Michael Clifford,
Sara Rampazzi,
Nidhi Rastogi
Abstract:
Interpretability, trustworthiness, and usability are key considerations in high-stake security applications, especially when utilizing deep learning models. While these models are known for their high accuracy, they behave as black boxes in which identifying important features and factors that led to a classification or a prediction is difficult. This can lead to uncertainty and distrust, especial…
▽ More
Interpretability, trustworthiness, and usability are key considerations in high-stake security applications, especially when utilizing deep learning models. While these models are known for their high accuracy, they behave as black boxes in which identifying important features and factors that led to a classification or a prediction is difficult. This can lead to uncertainty and distrust, especially when an incorrect prediction results in severe consequences. Thus, explanation methods aim to provide insights into the inner working of deep learning models. However, most explanation methods provide inconsistent explanations, have low fidelity, and are susceptible to adversarial manipulation, which can reduce model trustworthiness. This paper provides a comprehensive analysis of explainable methods and demonstrates their efficacy in three distinct security applications: anomaly detection using system logs, malware prediction, and detection of adversarial images. Our quantitative and qualitative analysis reveals serious limitations and concerns in state-of-the-art explanation methods in all three applications. We show that explanation methods for security applications necessitate distinct characteristics, such as stability, fidelity, robustness, and usability, among others, which we outline as the prerequisites for trustworthy explanation methods.
△ Less
Submitted 12 June, 2023; v1 submitted 31 October, 2022;
originally announced October 2022.
-
BenchCLAMP: A Benchmark for Evaluating Language Models on Syntactic and Semantic Parsing
Authors:
Subhro Roy,
Sam Thomson,
Tongfei Chen,
Richard Shin,
Adam Pauls,
Jason Eisner,
Benjamin Van Durme
Abstract:
Recent work has shown that generation from a prompted or fine-tuned language model can perform well at semantic parsing when the output is constrained to be a valid semantic representation. We introduce BenchCLAMP, a Benchmark to evaluate Constrained LAnguage Model Parsing, that includes context-free grammars for seven semantic parsing datasets and two syntactic parsing datasets with varied output…
▽ More
Recent work has shown that generation from a prompted or fine-tuned language model can perform well at semantic parsing when the output is constrained to be a valid semantic representation. We introduce BenchCLAMP, a Benchmark to evaluate Constrained LAnguage Model Parsing, that includes context-free grammars for seven semantic parsing datasets and two syntactic parsing datasets with varied output representations, as well as a constrained decoding interface to generate only valid outputs covered by these grammars. We provide low, medium, and high resource splits for each dataset, allowing accurate comparison of various language models under different data regimes. Our benchmark supports evaluation of language models using prompt-based learning as well as fine-tuning. We benchmark eight language models, including two GPT-3 variants available only through an API. Our experiments show that encoder-decoder pretrained language models can achieve similar performance or surpass state-of-the-art methods for syntactic and semantic parsing when the model output is constrained to be valid.
△ Less
Submitted 10 January, 2024; v1 submitted 21 June, 2022;
originally announced June 2022.
-
Addressing Resource and Privacy Constraints in Semantic Parsing Through Data Augmentation
Authors:
Kevin Yang,
Olivia Deng,
Charles Chen,
Richard Shin,
Subhro Roy,
Benjamin Van Durme
Abstract:
We introduce a novel setup for low-resource task-oriented semantic parsing which incorporates several constraints that may arise in real-world scenarios: (1) lack of similar datasets/models from a related domain, (2) inability to sample useful logical forms directly from a grammar, and (3) privacy requirements for unlabeled natural utterances. Our goal is to improve a low-resource semantic parser…
▽ More
We introduce a novel setup for low-resource task-oriented semantic parsing which incorporates several constraints that may arise in real-world scenarios: (1) lack of similar datasets/models from a related domain, (2) inability to sample useful logical forms directly from a grammar, and (3) privacy requirements for unlabeled natural utterances. Our goal is to improve a low-resource semantic parser using utterances collected through user interactions. In this highly challenging but realistic setting, we investigate data augmentation approaches involving generating a set of structured canonical utterances corresponding to logical forms, before simulating corresponding natural language and filtering the resulting pairs. We find that such approaches are effective despite our restrictive setup: in a low-resource setting on the complex SMCalFlow calendaring dataset (Andreas et al., 2020), we observe 33% relative improvement over a non-data-augmented baseline in top-1 match.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Application of Particle Swarm Optimization method to On-going Monitoring for estimating vehicle-bridge interaction system
Authors:
Kyosuke Yamamoto,
Kakeru Murakami,
Ryota Shin,
Yukihiko Okada
Abstract:
This study proposes a method for estimating the mechanical parameters of vehicles and bridges and the road unevenness, using only vehicle vibration and position data. In the proposed method, vehicle input and bridge vibration are estimated using randomly assumed vehicle and bridge parameters. Then, the road profiles at the front and rear wheels can be determined from the vehicle input and bridge v…
▽ More
This study proposes a method for estimating the mechanical parameters of vehicles and bridges and the road unevenness, using only vehicle vibration and position data. In the proposed method, vehicle input and bridge vibration are estimated using randomly assumed vehicle and bridge parameters. Then, the road profiles at the front and rear wheels can be determined from the vehicle input and bridge vibration. The difference between the two road profiles is used as the objective function because they are expected to coincide when synchronized. Using the particle swarm optimization (PSO) method, the vehicle and bridge parameters and the road unevenness can be estimated by updating the parameters to minimize the objective function. Numerical experiments also verify the applicability of this method. In the numerical experiments, it is confirmed that the proposed method can estimate the vehicle weight with reasonable accuracy, but the accuracy of other parameters is not sufficient. It is necessary to improve the accuracy of the proposed method in the future.
△ Less
Submitted 20 January, 2022;
originally announced January 2022.
-
Few-Shot Semantic Parsing with Language Models Trained On Code
Authors:
Richard Shin,
Benjamin Van Durme
Abstract:
Large language models can perform semantic parsing with little training data, when prompted with in-context examples. It has been shown that this can be improved by formulating the problem as paraphrasing into canonical utterances, which casts the underlying meaning representation into a controlled natural language-like representation. Intuitively, such models can more easily output canonical utte…
▽ More
Large language models can perform semantic parsing with little training data, when prompted with in-context examples. It has been shown that this can be improved by formulating the problem as paraphrasing into canonical utterances, which casts the underlying meaning representation into a controlled natural language-like representation. Intuitively, such models can more easily output canonical utterances as they are closer to the natural language used for pre-training. Recently, models also pre-trained on code, like OpenAI Codex, have risen in prominence. For semantic parsing tasks where we map natural language into code, such models may prove more adept at it. In this paper, we test this hypothesis and find that Codex performs better on such tasks than equivalent GPT-3 models. We evaluate on Overnight and SMCalFlow and find that unlike GPT-3, Codex performs similarly when targeting meaning representations directly, perhaps because meaning representations are structured similar to code in these datasets.
△ Less
Submitted 29 May, 2022; v1 submitted 16 December, 2021;
originally announced December 2021.
-
Pruning Pretrained Encoders with a Multitask Objective
Authors:
Patrick Xia,
Richard Shin
Abstract:
The sizes of pretrained language models make them challenging and expensive to use when there are multiple desired downstream tasks. In this work, we adopt recent strategies for model pruning during finetuning to explore the question of whether it is possible to prune a single encoder so that it can be used for multiple tasks. We allocate a fixed parameter budget and compare pruning a single model…
▽ More
The sizes of pretrained language models make them challenging and expensive to use when there are multiple desired downstream tasks. In this work, we adopt recent strategies for model pruning during finetuning to explore the question of whether it is possible to prune a single encoder so that it can be used for multiple tasks. We allocate a fixed parameter budget and compare pruning a single model with a multitask objective against the best ensemble of single-task models. We find that under two pruning strategies (element-wise and rank pruning), the approach with the multitask objective outperforms training models separately when averaged across all tasks, and it is competitive on each individual one. Additional analysis finds that using a multitask objective during pruning can also be an effective method for reducing model sizes for low-resource tasks.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
OutFlip: Generating Out-of-Domain Samples for Unknown Intent Detection with Natural Language Attack
Authors:
DongHyun Choi,
Myeong Cheol Shin,
EungGyun Kim,
Dong Ryeol Shin
Abstract:
Out-of-domain (OOD) input detection is vital in a task-oriented dialogue system since the acceptance of unsupported inputs could lead to an incorrect response of the system. This paper proposes OutFlip, a method to generate out-of-domain samples using only in-domain training dataset automatically. A white-box natural language attack method HotFlip is revised to generate out-of-domain samples inste…
▽ More
Out-of-domain (OOD) input detection is vital in a task-oriented dialogue system since the acceptance of unsupported inputs could lead to an incorrect response of the system. This paper proposes OutFlip, a method to generate out-of-domain samples using only in-domain training dataset automatically. A white-box natural language attack method HotFlip is revised to generate out-of-domain samples instead of adversarial examples. Our evaluation results showed that integrating OutFlip-generated out-of-domain samples into the training dataset could significantly improve an intent classification model's out-of-domain detection performance.
△ Less
Submitted 12 May, 2021;
originally announced May 2021.
-
Constrained Language Models Yield Few-Shot Semantic Parsers
Authors:
Richard Shin,
Christopher H. Lin,
Sam Thomson,
Charles Chen,
Subhro Roy,
Emmanouil Antonios Platanios,
Adam Pauls,
Dan Klein,
Jason Eisner,
Benjamin Van Durme
Abstract:
We explore the use of large pretrained language models as few-shot semantic parsers. The goal in semantic parsing is to generate a structured meaning representation given a natural language input. However, language models are trained to generate natural language. To bridge the gap, we use language models to paraphrase inputs into a controlled sublanguage resembling English that can be automaticall…
▽ More
We explore the use of large pretrained language models as few-shot semantic parsers. The goal in semantic parsing is to generate a structured meaning representation given a natural language input. However, language models are trained to generate natural language. To bridge the gap, we use language models to paraphrase inputs into a controlled sublanguage resembling English that can be automatically mapped to a target meaning representation. Our results demonstrate that with only a small amount of data and very little code to convert into English-like representations, our blueprint for rapidly bootstrap** semantic parsers leads to surprisingly effective performance on multiple community tasks, greatly exceeding baseline methods also trained on the same limited data.
△ Less
Submitted 16 November, 2021; v1 submitted 18 April, 2021;
originally announced April 2021.
-
Integrated Eojeol Embedding for Erroneous Sentence Classification in Korean Chatbots
Authors:
DongHyun Choi,
IlNam Park,
Myeong Cheol Shin,
EungGyun Kim,
Dong Ryeol Shin
Abstract:
This paper attempts to analyze the Korean sentence classification system for a chatbot. Sentence classification is the task of classifying an input sentence based on predefined categories. However, spelling or space error contained in the input sentence causes problems in morphological analysis and tokenization. This paper proposes a novel approach of Integrated Eojeol (Korean syntactic word separ…
▽ More
This paper attempts to analyze the Korean sentence classification system for a chatbot. Sentence classification is the task of classifying an input sentence based on predefined categories. However, spelling or space error contained in the input sentence causes problems in morphological analysis and tokenization. This paper proposes a novel approach of Integrated Eojeol (Korean syntactic word separated by space) Embedding to reduce the effect that poorly analyzed morphemes may make on sentence classification. It also proposes two noise insertion methods that further improve classification performance. Our evaluation results indicate that the proposed system classifies erroneous sentences more accurately than the baseline system by 17%p.0
△ Less
Submitted 12 April, 2020;
originally announced April 2020.
-
RYANSQL: Recursively Applying Sketch-based Slot Fillings for Complex Text-to-SQL in Cross-Domain Databases
Authors:
DongHyun Choi,
Myeong Cheol Shin,
EungGyun Kim,
Dong Ryeol Shin
Abstract:
Text-to-SQL is the problem of converting a user question into an SQL query, when the question and database are given. In this paper, we present a neural network approach called RYANSQL (Recursively Yielding Annotation Network for SQL) to solve complex Text-to-SQL tasks for cross-domain databases. State-ment Position Code (SPC) is defined to trans-form a nested SQL query into a set of non-nested SE…
▽ More
Text-to-SQL is the problem of converting a user question into an SQL query, when the question and database are given. In this paper, we present a neural network approach called RYANSQL (Recursively Yielding Annotation Network for SQL) to solve complex Text-to-SQL tasks for cross-domain databases. State-ment Position Code (SPC) is defined to trans-form a nested SQL query into a set of non-nested SELECT statements; a sketch-based slot filling approach is proposed to synthesize each SELECT statement for its corresponding SPC. Additionally, two input manipulation methods are presented to improve generation performance further. RYANSQL achieved 58.2% accuracy on the challenging Spider benchmark, which is a 3.2%p improvement over previous state-of-the-art approaches. At the time of writing, RYANSQL achieves the first position on the Spider leaderboard.
△ Less
Submitted 7 April, 2020;
originally announced April 2020.
-
Hierarchical Variational Imitation Learning of Control Programs
Authors:
Roy Fox,
Richard Shin,
William Paul,
Yitian Zou,
Dawn Song,
Ken Goldberg,
Pieter Abbeel,
Ion Stoica
Abstract:
Autonomous agents can learn by imitating teacher demonstrations of the intended behavior. Hierarchical control policies are ubiquitously useful for such learning, having the potential to break down structured tasks into simpler sub-tasks, thereby improving data efficiency and generalization. In this paper, we propose a variational inference method for imitation learning of a control policy represe…
▽ More
Autonomous agents can learn by imitating teacher demonstrations of the intended behavior. Hierarchical control policies are ubiquitously useful for such learning, having the potential to break down structured tasks into simpler sub-tasks, thereby improving data efficiency and generalization. In this paper, we propose a variational inference method for imitation learning of a control policy represented by parametrized hierarchical procedures (PHP), a program-like structure in which procedures can invoke sub-procedures to perform sub-tasks. Our method discovers the hierarchical structure in a dataset of observation-action traces of teacher demonstrations, by learning an approximate posterior distribution over the latent sequence of procedure calls and terminations. Samples from this learned distribution then guide the training of the hierarchical control policy. We identify and demonstrate a novel benefit of variational inference in the context of hierarchical imitation learning: in decomposing the policy into simpler procedures, inference can leverage acausal information that is unused by other methods. Training PHP with variational inference outperforms LSTM baselines in terms of data efficiency and generalization, requiring less than half as much data to achieve a 24% error rate in executing the bubble sort algorithm, and to achieve no error in executing Karel programs.
△ Less
Submitted 29 December, 2019;
originally announced December 2019.
-
Synthetic Datasets for Neural Program Synthesis
Authors:
Richard Shin,
Neel Kant,
Kavi Gupta,
Christopher Bender,
Brandon Trabucco,
Rishabh Singh,
Dawn Song
Abstract:
The goal of program synthesis is to automatically generate programs in a particular language from corresponding specifications, e.g. input-output behavior. Many current approaches achieve impressive results after training on randomly generated I/O examples in limited domain-specific languages (DSLs), as with string transformations in RobustFill. However, we empirically discover that applying test…
▽ More
The goal of program synthesis is to automatically generate programs in a particular language from corresponding specifications, e.g. input-output behavior. Many current approaches achieve impressive results after training on randomly generated I/O examples in limited domain-specific languages (DSLs), as with string transformations in RobustFill. However, we empirically discover that applying test input generation techniques for languages with control flow and rich input space causes deep networks to generalize poorly to certain data distributions; to correct this, we propose a new methodology for controlling and evaluating the bias of synthetic data distributions over both programs and specifications. We demonstrate, using the Karel DSL and a small Calculator DSL, that training deep networks on these distributions leads to improved cross-distribution generalization performance.
△ Less
Submitted 27 December, 2019;
originally announced December 2019.
-
RAT-SQL: Relation-Aware Schema Encoding and Linking for Text-to-SQL Parsers
Authors:
Bailin Wang,
Richard Shin,
Xiaodong Liu,
Oleksandr Polozov,
Matthew Richardson
Abstract:
When translating natural language questions into SQL queries to answer questions from a database, contemporary semantic parsing models struggle to generalize to unseen database schemas. The generalization challenge lies in (a) encoding the database relations in an accessible way for the semantic parser, and (b) modeling alignment between database columns and their mentions in a given query. We pre…
▽ More
When translating natural language questions into SQL queries to answer questions from a database, contemporary semantic parsing models struggle to generalize to unseen database schemas. The generalization challenge lies in (a) encoding the database relations in an accessible way for the semantic parser, and (b) modeling alignment between database columns and their mentions in a given query. We present a unified framework, based on the relation-aware self-attention mechanism, to address schema encoding, schema linking, and feature representation within a text-to-SQL encoder. On the challenging Spider dataset this framework boosts the exact match accuracy to 57.2%, surpassing its best counterparts by 8.7% absolute improvement. Further augmented with BERT, it achieves the new state-of-the-art performance of 65.6% on the Spider leaderboard. In addition, we observe qualitative improvements in the model's understanding of schema linking and alignment. Our implementation will be open-sourced at https://github.com/Microsoft/rat-sql.
△ Less
Submitted 24 August, 2021; v1 submitted 10 November, 2019;
originally announced November 2019.
-
Encoding Database Schemas with Relation-Aware Self-Attention for Text-to-SQL Parsers
Authors:
Richard Shin
Abstract:
When translating natural language questions into SQL queries to answer questions from a database, we would like our methods to generalize to domains and database schemas outside of the training set. To handle complex questions and database schemas with a neural encoder-decoder paradigm, it is critical to properly encode the schema as part of the input with the question. In this paper, we use relat…
▽ More
When translating natural language questions into SQL queries to answer questions from a database, we would like our methods to generalize to domains and database schemas outside of the training set. To handle complex questions and database schemas with a neural encoder-decoder paradigm, it is critical to properly encode the schema as part of the input with the question. In this paper, we use relation-aware self-attention within the encoder so that it can reason about how the tables and columns in the provided schema relate to each other and use this information in interpreting the question. We achieve significant gains on the recently-released Spider dataset with 42.94% exact match accuracy, compared to the 18.96% reported in published work.
△ Less
Submitted 27 June, 2019;
originally announced June 2019.
-
Program Synthesis and Semantic Parsing with Learned Code Idioms
Authors:
Richard Shin,
Miltiadis Allamanis,
Marc Brockschmidt,
Oleksandr Polozov
Abstract:
Program synthesis of general-purpose source code from natural language specifications is challenging due to the need to reason about high-level patterns in the target program and low-level implementation details at the same time. In this work, we present PATOIS, a system that allows a neural program synthesizer to explicitly interleave high-level and low-level reasoning at every generation step. I…
▽ More
Program synthesis of general-purpose source code from natural language specifications is challenging due to the need to reason about high-level patterns in the target program and low-level implementation details at the same time. In this work, we present PATOIS, a system that allows a neural program synthesizer to explicitly interleave high-level and low-level reasoning at every generation step. It accomplishes this by automatically mining common code idioms from a given corpus, incorporating them into the underlying language for neural synthesis, and training a tree-based neural synthesizer to use these idioms during code generation. We evaluate PATOIS on two complex semantic parsing datasets and show that using learned code idioms improves the synthesizer's accuracy.
△ Less
Submitted 4 November, 2019; v1 submitted 25 June, 2019;
originally announced June 2019.
-
Making Neural Programming Architectures Generalize via Recursion
Authors:
Jonathon Cai,
Richard Shin,
Dawn Song
Abstract:
Empirically, neural networks that attempt to learn programs from data have exhibited poor generalizability. Moreover, it has traditionally been difficult to reason about the behavior of these models beyond a certain level of input complexity. In order to address these issues, we propose augmenting neural architectures with a key abstraction: recursion. As an application, we implement recursion in…
▽ More
Empirically, neural networks that attempt to learn programs from data have exhibited poor generalizability. Moreover, it has traditionally been difficult to reason about the behavior of these models beyond a certain level of input complexity. In order to address these issues, we propose augmenting neural architectures with a key abstraction: recursion. As an application, we implement recursion in the Neural Programmer-Interpreter framework on four tasks: grade-school addition, bubble sort, topological sort, and quicksort. We demonstrate superior generalizability and interpretability with small amounts of training data. Recursion divides the problem into smaller pieces and drastically reduces the domain of each neural network component, making it tractable to prove guarantees about the overall system's behavior. Our experience suggests that in order for neural architectures to robustly learn program semantics, it is necessary to incorporate a concept like recursion.
△ Less
Submitted 21 April, 2017;
originally announced April 2017.
-
PIANO: Proximity-based User Authentication on Voice-Powered Internet-of-Things Devices
Authors:
Neil Zhenqiang Gong,
Altay Ozen,
Yu Wu,
Xiaoyu Cao,
Richard Shin,
Dawn Song,
Hongxia **,
Xuan Bao
Abstract:
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices. PIANO leverages the built-in speaker, microphone, and Bluetooth that voice-powered IoT devices often already have. Specifically, we assume that a user carries a personal voi…
▽ More
Voice is envisioned to be a popular way for humans to interact with Internet-of-Things (IoT) devices. We propose a proximity-based user authentication method (called PIANO) for access control on such voice-powered IoT devices. PIANO leverages the built-in speaker, microphone, and Bluetooth that voice-powered IoT devices often already have. Specifically, we assume that a user carries a personal voice-powered device (e.g., smartphone, smartwatch, or smartglass), which serves as the user's identity. When another voice-powered IoT device of the user requires authentication, PIANO estimates the distance between the two devices by playing and detecting certain acoustic signals; PIANO grants access if the estimated distance is no larger than a user-selected threshold. We implemented a proof-of-concept prototype of PIANO. Through theoretical and empirical evaluations, we find that PIANO is secure, reliable, personalizable, and efficient.
△ Less
Submitted 10 April, 2017;
originally announced April 2017.
-
Latent Attention For If-Then Program Synthesis
Authors:
Xinyun Chen,
Chang Liu,
Richard Shin,
Dawn Song,
Mingcheng Chen
Abstract:
Automatic translation from natural language descriptions into programs is a longstanding challenging problem. In this work, we consider a simple yet important sub-problem: translation from textual descriptions to If-Then programs. We devise a novel neural network architecture for this task which we train end-to-end. Specifically, we introduce Latent Attention, which computes multiplicative weights…
▽ More
Automatic translation from natural language descriptions into programs is a longstanding challenging problem. In this work, we consider a simple yet important sub-problem: translation from textual descriptions to If-Then programs. We devise a novel neural network architecture for this task which we train end-to-end. Specifically, we introduce Latent Attention, which computes multiplicative weights for the words in the description in a two-stage process with the goal of better leveraging the natural language structures that indicate the relevant parts for predicting program elements. Our architecture reduces the error rate by 28.57% compared to prior art. We also propose a one-shot learning scenario of If-Then program synthesis and simulate it with our existing dataset. We demonstrate a variation on the training procedure for this scenario that outperforms the original procedure, significantly closing the gap to the model trained with all data.
△ Less
Submitted 6 November, 2016;
originally announced November 2016.
-
Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners
Authors:
Frank Li,
Richard Shin,
Vern Paxson
Abstract:
The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing. However, k-NN is often run on sensitive data such as medical records, user images, or personal information. It is important to protect the privacy of data in an outsourced k-NN system.
Prior works have all ass…
▽ More
The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing. However, k-NN is often run on sensitive data such as medical records, user images, or personal information. It is important to protect the privacy of data in an outsourced k-NN system.
Prior works have all assumed the data owners (who submit data to the outsourced k-NN system) are a single trusted party. However, we observe that in many practical scenarios, there may be multiple mutually distrusting data owners. In this work, we present the first framing and exploration of privacy preservation in an outsourced k-NN system with multiple data owners. We consider the various threat models introduced by this modification. We discover that under a particularly practical threat model that covers numerous scenarios, there exists a set of adaptive attacks that breach the data privacy of any exact k-NN system. The vulnerability is a result of the mathematical properties of k-NN and its output. Thus, we propose a privacy-preserving alternative system supporting kernel density estimation using a Gaussian kernel, a classification algorithm from the same family as k-NN. In many applications, this similar algorithm serves as a good substitute for k-NN. We additionally investigate solutions for other threat models, often through extensions on prior single data owner systems.
△ Less
Submitted 29 July, 2015;
originally announced July 2015.
-
The study of Anisotropic Flows at LHC with purturbative simulation
Authors:
Ghi R. Shin
Abstract:
We study the harmonic flows, for example, the directed, elliptic, third and fourth flow of the system of partons formed just after relativistic heavy ion collisions. We calculate the minijets produced during the primary collisions using standard parton distributions for the incomming projectile and target nucleus. We solve the Boltzmann equations of motion for the system of minijets by Monte Carlo…
▽ More
We study the harmonic flows, for example, the directed, elliptic, third and fourth flow of the system of partons formed just after relativistic heavy ion collisions. We calculate the minijets produced during the primary collisions using standard parton distributions for the incomming projectile and target nucleus. We solve the Boltzmann equations of motion for the system of minijets by Monte Carlo method within only the perturbative sector. Based on the flow data calculated, we conclude the simulation can not explain the experimental results at RHIC and LHC so that the nonperturbative sector plays much more important roles even from the earliest stage of heavy ion collisions.
△ Less
Submitted 23 June, 2013;
originally announced June 2013.
-
Jointly Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)
Authors:
Neil Zhenqiang Gong,
Ameet Talwalkar,
Lester Mackey,
Ling Huang,
Eui Chul Richard Shin,
Emil Stefanov,
Elaine,
Shi,
Dawn Song
Abstract:
The effects of social influence and homophily suggest that both network structure and node attribute information should inform the tasks of link prediction and node attribute inference. Recently, Yin et al. proposed Social-Attribute Network (SAN), an attribute-augmented social network, to integrate network structure and node attributes to perform both link prediction and attribute inference. They…
▽ More
The effects of social influence and homophily suggest that both network structure and node attribute information should inform the tasks of link prediction and node attribute inference. Recently, Yin et al. proposed Social-Attribute Network (SAN), an attribute-augmented social network, to integrate network structure and node attributes to perform both link prediction and attribute inference. They focused on generalizing the random walk with restart algorithm to the SAN framework and showed improved performance. In this paper, we extend the SAN framework with several leading supervised and unsupervised link prediction algorithms and demonstrate performance improvement for each algorithm on both link prediction and attribute inference. Moreover, we make the novel observation that attribute inference can help inform link prediction, i.e., link prediction accuracy is further improved by first inferring missing attributes. We comprehensively evaluate these algorithms and compare them with other existing algorithms using a novel, large-scale Google+ dataset, which we make publicly available.
△ Less
Submitted 22 June, 2012; v1 submitted 14 December, 2011;
originally announced December 2011.
-
Control of defect-mediated tunneling barrier heights in ultrathin MgO films
Authors:
D. J. Kim,
W. S. Choi,
F. Schleicher,
R. H. Shin,
S. Boukari,
V. Davesne,
C. Kieber,
J. Arabski,
G. Schmerber,
E. Beaurepaire,
W. Jo,
M. Bowen
Abstract:
The impact of oxygen vacancies on local tunneling properties across rf-sputtered MgO thin films was investigated by optical absorption spectroscopy and conducting atomic force microscopy. Adding O$_2$ to the Ar plasma during MgO growth alters the oxygen defect populations, leading to improved local tunneling characteristics such as a lower density of current hotspots and a lower tunnel current amp…
▽ More
The impact of oxygen vacancies on local tunneling properties across rf-sputtered MgO thin films was investigated by optical absorption spectroscopy and conducting atomic force microscopy. Adding O$_2$ to the Ar plasma during MgO growth alters the oxygen defect populations, leading to improved local tunneling characteristics such as a lower density of current hotspots and a lower tunnel current amplitude. We discuss a defect-based potential landscape across ultrathin MgO barriers.
△ Less
Submitted 22 November, 2010; v1 submitted 12 October, 2010;
originally announced October 2010.
-
Transport Theoretical Description of Collisional Energy Loss in Infinite Quark-Gluon Matter
Authors:
Ghi R. Shin,
Steffen A. Bass,
Berndt Mueller
Abstract:
We study the time evolution of a high-momentum gluon or quark propagating through an infinite, thermalized, partonic medium utilizing a Boltzmann equation approach. We calculate the collisional energy loss of the parton, study its temperature and flavor dependence as well as the the momentum broadening incurred through multiple interactions. Our transport calculations agree well with analytic calc…
▽ More
We study the time evolution of a high-momentum gluon or quark propagating through an infinite, thermalized, partonic medium utilizing a Boltzmann equation approach. We calculate the collisional energy loss of the parton, study its temperature and flavor dependence as well as the the momentum broadening incurred through multiple interactions. Our transport calculations agree well with analytic calculations of collisional energy-loss where available, but offer the unique opportunity to address the medium response as well in a consistent fashion.
△ Less
Submitted 11 June, 2010; v1 submitted 8 June, 2010;
originally announced June 2010.
-
Elliptic Flow and Jet Quenching of a Parton System after Relativistic Heavy Ion Collision
Authors:
Ghi R. Shin
Abstract:
We obtain the initial phase space distribution after relativistic heavy ion collision by the CGC shattering method incorporating the uncertainty principle and solve the semi-classical Boltzmann equation which includes the gluon radiation processes. We present as a function of time the attenuation rate of high $p_T$ partons, which have transverse momenta over 6 $GeV/c$, in the medium which is for…
▽ More
We obtain the initial phase space distribution after relativistic heavy ion collision by the CGC shattering method incorporating the uncertainty principle and solve the semi-classical Boltzmann equation which includes the gluon radiation processes. We present as a function of time the attenuation rate of high $p_T$ partons, which have transverse momenta over 6 $GeV/c$, in the medium which is formed after relativistic heavy ion collision. We calculate the elliptic flow as a function of an impact parameter, time and transverse momentum and also present the polar anisotropy, which gives the initial condition for color filamentation.
△ Less
Submitted 26 April, 2007;
originally announced April 2007.
-
Initial Parton Distribution just after Heavy Ion Collisions
Authors:
Ghi R. Shin,
Kang S. Lee
Abstract:
We study the initial distribution of a parton system which is formed just after relativistic heavy ion collision by the elastic scattering among the constituent partons in details and analyze the baryon and strangeness contents of the primary parton system. We present the rapidity and energy distributions of the system.
We study the initial distribution of a parton system which is formed just after relativistic heavy ion collision by the elastic scattering among the constituent partons in details and analyze the baryon and strangeness contents of the primary parton system. We present the rapidity and energy distributions of the system.
△ Less
Submitted 7 December, 2006; v1 submitted 1 December, 2006;
originally announced December 2006.
-
Studies of parton thermalization at RHIC
Authors:
Ghi R. Shin,
Berndt Müller
Abstract:
We consider the evolution of a parton system which is formed in the central region just after a relativistic heavy ion collision. The parton consist of mostly gluons, minijets, which are produced by elastic scattering between constituent partons of the colliding nuclei. We assume the system can be described by a semi-classical Boltzmann transport equation, which we solve by means of the test par…
▽ More
We consider the evolution of a parton system which is formed in the central region just after a relativistic heavy ion collision. The parton consist of mostly gluons, minijets, which are produced by elastic scattering between constituent partons of the colliding nuclei. We assume the system can be described by a semi-classical Boltzmann transport equation, which we solve by means of the test particle Monte-Carlo method including retardation. The partons proliferate via secondary radiative $gg \to ggg$ processes until the thermalization is reached for some assumptions. The extended system is thermalized at about $t=1.6$ fm/$c$ with $T = 570$ MeV and stays in equilibrium for about 2 fm/$c$ with breaking temperature $T = 360$ MeV in the rapidity central region.
△ Less
Submitted 22 July, 2003;
originally announced July 2003.
-
A relativistic parton cascade with radiation
Authors:
Ghi R. Shin,
Berndt Müller
Abstract:
We consider the evolution of a parton system which is formed at the central rapidity region just after an ultrarelativistic heavy ion collision. The evolution of the system, which is composed of gluons, quarks and antiquarks, is described by a relativistic Boltzmann equations with collision terms including radiation and retardation effects. The equations are solved by the test particle method us…
▽ More
We consider the evolution of a parton system which is formed at the central rapidity region just after an ultrarelativistic heavy ion collision. The evolution of the system, which is composed of gluons, quarks and antiquarks, is described by a relativistic Boltzmann equations with collision terms including radiation and retardation effects. The equations are solved by the test particle method using Monte-Carlo sampling. Our simulations do not show any evidence of kinetic equilibration, unless the cross sections are artificially increased to unrealistically large values.
△ Less
Submitted 8 August, 2002; v1 submitted 15 July, 2002;
originally announced July 2002.