Skip to main content

Showing 1–7 of 7 results for author: Bastounis, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12670  [pdf, other

    cs.AI cs.LG

    Stealth edits for provably fixing or attacking large language models

    Authors: Oliver J. Sutton, Qinghua Zhou, Wei Wang, Desmond J. Higham, Alexander N. Gorban, Alexander Bastounis, Ivan Y. Tyukin

    Abstract: We reveal new methods and the theoretical foundations of techniques for editing large language models. We also show how the new theory can be used to assess the editability of models and to expose their susceptibility to previously unknown malicious attacks. Our theoretical approach shows that a single metric (a specific measure of the intrinsic dimensionality of the model's features) is fundament… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 24 pages, 9 figures. Open source implementation: https://github.com/qinghua-zhou/stealth-edits

    MSC Class: 68T07; 68T50; 68W40 ACM Class: I.2.7; F.2.0

  2. arXiv:2312.11425  [pdf, other

    math.OC cs.DS cs.LG

    When can you trust feature selection? -- I: A condition-based analysis of LASSO and generalised hardness of approximation

    Authors: Alexander Bastounis, Felipe Cucker, Anders C. Hansen

    Abstract: The arrival of AI techniques in computations, with the potential for hallucinations and non-robustness, has made trustworthiness of algorithms a focal point. However, trustworthiness of the many classical approaches are not well understood. This is the case for feature selection, a classical problem in the sciences, statistics, machine learning etc. Here, the LASSO optimisation problem is standard… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

    Comments: 24 pages, 1 figure

  3. arXiv:2309.07072  [pdf, ps, other

    cs.LG

    The Boundaries of Verifiable Accuracy, Robustness, and Generalisation in Deep Learning

    Authors: Alexander Bastounis, Alexander N. Gorban, Anders C. Hansen, Desmond J. Higham, Danil Prokhorov, Oliver Sutton, Ivan Y. Tyukin, Qinghua Zhou

    Abstract: In this work, we assess the theoretical limitations of determining guaranteed stability and accuracy of neural networks in classification tasks. We consider classical distribution-agnostic framework and algorithms minimising empirical risks and potentially subjected to some weights regularisation. We show that there is a large family of tasks for which computing and verifying ideal stable and accu… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    MSC Class: 68T07; 68T05

  4. arXiv:2309.03665  [pdf, other

    cs.LG cs.AI

    How adversarial attacks can disrupt seemingly stable accurate classifiers

    Authors: Oliver J. Sutton, Qinghua Zhou, Ivan Y. Tyukin, Alexander N. Gorban, Alexander Bastounis, Desmond J. Higham

    Abstract: Adversarial attacks dramatically change the output of an otherwise accurate learning system using a seemingly inconsequential modification to a piece of input data. Paradoxically, empirical evidence indicates that even systems which are robust to large random perturbations of the input data remain susceptible to small, easily constructed, adversarial perturbations of their inputs. Here, we show th… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

    Comments: 11 pages, 8 figures, additional supplementary materials

  5. arXiv:2109.06098  [pdf, ps, other

    cs.LG cs.CV math.NA stat.ML

    The mathematics of adversarial attacks in AI -- Why deep learning is unstable despite the existence of stable neural networks

    Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić

    Abstract: The unprecedented success of deep learning (DL) makes it unchallenged when it comes to classification problems. However, it is well established that the current DL methodology produces universally unstable neural networks (NNs). The instability problem has caused an enormous research effort -- with a vast literature on so-called adversarial attacks -- yet there has been no solution to the problem.… ▽ More

    Submitted 13 September, 2021; originally announced September 2021.

    Comments: 29 pages, 1 figure

  6. arXiv:2106.13997  [pdf, other

    cs.CR cs.AI cs.LG

    The Feasibility and Inevitability of Stealth Attacks

    Authors: Ivan Y. Tyukin, Desmond J. Higham, Alexander Bastounis, Eliyas Woldegeorgis, Alexander N. Gorban

    Abstract: We develop and study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence (AI) systems including deep learning neural networks. In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself. Such a stealth attack could be conducted by a mischievous, corrupt or disgr… ▽ More

    Submitted 4 January, 2023; v1 submitted 26 June, 2021; originally announced June 2021.

    MSC Class: 68T01; 68T05; 90C31

    Journal ref: IMA Journal of Applied Mathematics, October 2023, hxad027

  7. arXiv:1411.4449  [pdf, other

    cs.IT math.NA

    On the absence of the RIP in real-world applications of compressed sensing and the RIP in levels

    Authors: Alexander Bastounis, Anders C. Hansen

    Abstract: The purpose of this paper is twofold. The first is to point out that the Restricted Isometry Property (RIP) does not hold in many applications where compressed sensing is successfully used. This includes fields like Magnetic Resonance Imaging (MRI), Computerized Tomography, Electron Microscopy, Radio Interferometry and Fluorescence Microscopy. We demonstrate that for natural compressed sensing mat… ▽ More

    Submitted 16 October, 2015; v1 submitted 17 November, 2014; originally announced November 2014.