Skip to main content

Showing 1–50 of 168 results for author: Chang, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18844  [pdf, other

    cs.CV

    Revisiting Backdoor Attacks against Large Vision-Language Models

    Authors: Siyuan Liang, Jiawei Liang, Tianyu Pang, Chao Du, Aishan Liu, Ee-Chien Chang, Xiaochun Cao

    Abstract: Instruction tuning enhances large vision-language models (LVLMs) but raises security risks through potential backdoor attacks due to their openness. Previous backdoor studies focus on enclosed scenarios with consistent training and testing instructions, neglecting the practical domain gaps that could affect attack effectiveness. This paper empirically examines the generalizability of backdoor atta… ▽ More

    Submitted 1 July, 2024; v1 submitted 26 June, 2024; originally announced June 2024.

    Comments: 24 pages, 8 figures

  2. arXiv:2405.15877  [pdf, other

    cs.LG cs.AR cs.CL

    Basis Selection: Low-Rank Decomposition of Pretrained Large Language Models for Target Applications

    Authors: Yang Li, Changsheng Zhao, Hyungtak Lee, Ernie Chang, Yangyang Shi, Vikas Chandra

    Abstract: Large language models (LLMs) significantly enhance the performance of various applications, but they are computationally intensive and energy-demanding. This makes it challenging to deploy them on devices with limited resources, such as personal computers and mobile/wearable devices, and results in substantial inference costs in resource-rich environments like cloud servers. To extend the use of L… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  3. arXiv:2405.15808  [pdf, other

    cs.AI

    Ensuring Ground Truth Accuracy in Healthcare with the EVINCE framework

    Authors: Edward Y. Chang

    Abstract: Misdiagnosis is a significant issue in healthcare, leading to harmful consequences for patients. The propagation of mislabeled data through machine learning models into clinical practice is unacceptable. This paper proposes EVINCE, a system designed to 1) improve diagnosis accuracy and 2) rectify misdiagnoses and minimize training data errors. EVINCE stands for Entropy Variation through Informatio… ▽ More

    Submitted 28 May, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

    Comments: 23 pages, 4 tables, 4 figures

    ACM Class: I.2.7

  4. arXiv:2405.07076  [pdf, other

    cs.CL cs.AI

    Integrating Emotional and Linguistic Models for Ethical Compliance in Large Language Models

    Authors: Edward Y. Chang

    Abstract: This research develops advanced methodologies for Large Language Models (LLMs) to better manage linguistic behaviors related to emotions and ethics. We introduce DIKE, an adversarial framework that enhances the LLMs' ability to internalize and reflect global human values, adapting to varied cultural contexts to promote transparency and trust among users. The methodology involves detailed modeling… ▽ More

    Submitted 13 May, 2024; v1 submitted 11 May, 2024; originally announced May 2024.

    Comments: 29 pages, 10 tables, 6 figures

    ACM Class: I.2.7

  5. arXiv:2405.04753  [pdf, other

    cs.CR cs.AI

    AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models

    Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang

    Abstract: Attack knowledge graph construction seeks to convert textual cyber threat intelligence (CTI) reports into structured representations, portraying the evolutionary traces of cyber attacks. Even though previous research has proposed various methods to construct attack knowledge graphs, they generally suffer from limited generalization capability to diverse knowledge types as well as requirement of ex… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 20 pages, 5 figures

  6. arXiv:2404.13071  [pdf, other

    cs.CL cs.AI

    Modeling Emotions and Ethics with Large Language Models

    Authors: Edward Y. Chang

    Abstract: This paper explores the integration of human-like emotions and ethical considerations into Large Language Models (LLMs). We first model eight fundamental human emotions, presented as opposing pairs, and employ collaborative LLMs to reinterpret and express these emotions across a spectrum of intensity. Our focus extends to embedding a latent ethical dimension within LLMs, guided by a novel self-sup… ▽ More

    Submitted 25 June, 2024; v1 submitted 15 April, 2024; originally announced April 2024.

    Comments: 8 pages, 4 figures, 3 tables

    ACM Class: I.2.0

    Journal ref: IEEE MIPR 2024

  7. arXiv:2404.00869  [pdf, other

    cs.CR

    Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training

    Authors: Daisuke Mashima, Muhammad M. Roomi, Bennet Ng, Zbigniew Kalbarczyk, S. M. Suhail Hussain, Ee-chien Chang

    Abstract: Assurance of cybersecurity is crucial to ensure dependability and resilience of smart power grid systems. In order to evaluate the impact of potential cyber attacks, to assess deployability and effectiveness of cybersecurity measures, and to enable hands-on exercise and training of personals, an interactive, virtual environment that emulates the behaviour of a smart grid system, namely smart grid… ▽ More

    Submitted 31 March, 2024; originally announced April 2024.

    Comments: Published at DSN 2023 Industry Track

  8. arXiv:2403.16271  [pdf, other

    cs.CV

    Object Detectors in the Open Environment: Challenges, Solutions, and Outlook

    Authors: Siyuan Liang, Wei Wang, Ruoyu Chen, Aishan Liu, Boxi Wu, Ee-Chien Chang, Xiaochun Cao, Dacheng Tao

    Abstract: With the emergence of foundation models, deep learning-based object detectors have shown practical usability in closed set scenarios. However, for real-world tasks, object detectors often operate in open environments, where crucial factors (e.g., data distribution, objective) that influence model learning are often changing. The dynamic and intricate nature of the open environment poses novel and… ▽ More

    Submitted 9 April, 2024; v1 submitted 24 March, 2024; originally announced March 2024.

    Comments: 37 pages, 17 figures

  9. arXiv:2403.16257  [pdf, other

    cs.CV

    Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning

    Authors: Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao

    Abstract: Multimodal contrastive learning has emerged as a powerful paradigm for building high-quality features using the complementary strengths of various data modalities. However, the open nature of such systems inadvertently increases the possibility of backdoor attacks. These attacks subtly embed malicious behaviors within the model during training, which can be activated by specific triggers in the in… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

    Comments: 6 pages, 2 figures

  10. arXiv:2403.05448  [pdf, other

    cs.CR

    On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers

    Authors: Zhiang Li, Daisuke Mashima, Wen Shei Ong, Ertem Esiner, Zbigniew Kalbarczyk, Ee-Chien Chang

    Abstract: Programmable logic controllers (PLCs) are crucial devices for implementing automated control in various industrial control systems (ICS), such as smart power grids, water treatment systems, manufacturing, and transportation systems. Owing to their importance, PLCs are often the target of cyber attackers that are aiming at disrupting the operation of ICS, including the nation's critical infrastruct… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

    Comments: To appear at ACM AsiaCCS 2024

  11. arXiv:2402.14905  [pdf, other

    cs.LG cs.AI cs.CL

    MobileLLM: Optimizing Sub-billion Parameter Language Models for On-Device Use Cases

    Authors: Zechun Liu, Changsheng Zhao, Forrest Iandola, Chen Lai, Yuandong Tian, Igor Fedorov, Yunyang Xiong, Ernie Chang, Yangyang Shi, Raghuraman Krishnamoorthi, Liangzhen Lai, Vikas Chandra

    Abstract: This paper addresses the growing need for efficient large language models (LLMs) on mobile devices, driven by increasing cloud costs and latency concerns. We focus on designing top-quality LLMs with fewer than a billion parameters, a practical choice for mobile deployment. Contrary to prevailing belief emphasizing the pivotal role of data and parameter quantity in determining model quality, our in… ▽ More

    Submitted 26 June, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

    Comments: ICML 2024. Code is available at https://github.com/facebookresearch/MobileLLM

  12. arXiv:2402.14872  [pdf, other

    cs.CL cs.AI cs.NE

    Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs

    Authors: Xiaoxia Li, Siyuan Liang, Jiyi Zhang, Han Fang, Aishan Liu, Ee-Chien Chang

    Abstract: Large Language Models (LLMs), used in creative writing, code generation, and translation, generate text based on input sequences but are vulnerable to jailbreak attacks, where crafted prompts induce harmful outputs. Most jailbreak prompt methods use a combination of jailbreak templates followed by questions to ask to create jailbreak prompts. However, existing jailbreak prompt designs generally su… ▽ More

    Submitted 27 February, 2024; v1 submitted 21 February, 2024; originally announced February 2024.

  13. arXiv:2402.13851  [pdf, other

    cs.CV

    VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models

    Authors: Jiawei Liang, Siyuan Liang, Man Luo, Aishan Liu, Dongchen Han, Ee-Chien Chang, Xiaochun Cao

    Abstract: Autoregressive Visual Language Models (VLMs) showcase impressive few-shot learning capabilities in a multimodal context. Recently, multimodal instruction tuning has been proposed to further enhance instruction-following abilities. However, we uncover the potential threat posed by backdoor attacks on autoregressive VLMs during instruction tuning. Adversaries can implant a backdoor by injecting pois… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  14. arXiv:2402.13076  [pdf, other

    cs.SD cs.LG eess.AS

    Not All Weights Are Created Equal: Enhancing Energy Efficiency in On-Device Streaming Speech Recognition

    Authors: Yang Li, Yuan Shangguan, Yuhao Wang, Liangzhen Lai, Ernie Chang, Changsheng Zhao, Yangyang Shi, Vikas Chandra

    Abstract: Power consumption plays an important role in on-device streaming speech recognition, as it has a direct impact on the user experience. This study delves into how weight parameters in speech recognition models influence the overall power consumption of these models. We discovered that the impact of weight parameters on power consumption varies, influenced by factors including how often they are inv… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

  15. arXiv:2402.06634  [pdf, other

    cs.AI cs.CL cs.LG

    SocraSynth: Multi-LLM Reasoning with Conditional Statistics

    Authors: Edward Y. Chang

    Abstract: Large language models (LLMs), while promising, face criticisms for biases, hallucinations, and a lack of reasoning capability. This paper introduces SocraSynth, a multi-LLM agent reasoning platform developed to mitigate these issues. SocraSynth utilizes conditional statistics and systematic context enhancement through continuous arguments, alongside adjustable debate contentiousness levels. The pl… ▽ More

    Submitted 19 January, 2024; originally announced February 2024.

    Comments: 1 figure, 6 tables, 6 appendices

    ACM Class: I.2.7

  16. arXiv:2402.04640  [pdf, other

    cs.LG

    Domain Bridge: Generative model-based domain forensic for black-box models

    Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang

    Abstract: In forensic investigations of machine learning models, techniques that determine a model's data domain play an essential role, with prior work relying on large-scale corpora like ImageNet to approximate the target model's domain. Although such methods are effective in finding broad domains, they often struggle in identifying finer-grained classes within those domains. In this paper, we introduce a… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

  17. arXiv:2401.15484  [pdf, other

    cs.RO

    R$\times$R: Rapid eXploration for Reinforcement Learning via Sampling-based Reset Distributions and Imitation Pre-training

    Authors: Gagan Khandate, Tristan L. Saidi, Siqi Shang, Eric T. Chang, Yang Liu, Seth Dennis, Johnson Adams, Matei Ciocarlie

    Abstract: We present a method for enabling Reinforcement Learning of motor control policies for complex skills such as dexterous manipulation. We posit that a key difficulty for training such policies is the difficulty of exploring the problem state space, as the accessible and useful regions of this space form a complex structure along manifolds of the original high-dimensional state space. This work prese… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    Comments: 20 pages, 14 figures, submitted to Autonomous Robots, RSS 2023 Special Issue. arXiv admin note: substantial text overlap with arXiv:2303.03486

  18. arXiv:2401.11430  [pdf, other

    cs.CV

    Exploring Diffusion Time-steps for Unsupervised Representation Learning

    Authors: Zhongqi Yue, Jiankun Wang, Qianru Sun, Lei Ji, Eric I-Chao Chang, Hanwang Zhang

    Abstract: Representation learning is all about discovering the hidden modular attributes that generate the data faithfully. We explore the potential of Denoising Diffusion Probabilistic Model (DM) in unsupervised learning of the modular attributes. We build a theoretical framework that connects the diffusion time-steps and the hidden attributes, which serves as an effective inductive bias for unsupervised l… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

    Comments: Accepted by ICLR 2024

  19. arXiv:2401.11196  [pdf, ps, other

    eess.SY cs.LG

    Machine learning based state observer for discrete time systems evolving on Lie groups

    Authors: Soham Shanbhag, Dong Eui Chang

    Abstract: In this paper, a machine learning based observer for systems evolving on manifolds is designed such that the state of the observer is restricted to the Lie group on which the system evolves. Conventional techniques involving machine learning based observers on systems evolving on Lie groups involve designing charts for the Lie group, training a machine learning based observer for each chart, and s… ▽ More

    Submitted 20 January, 2024; originally announced January 2024.

  20. arXiv:2311.12075  [pdf, other

    cs.CV

    BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive Learning

    Authors: Siyuan Liang, Mingli Zhu, Aishan Liu, Baoyuan Wu, Xiaochun Cao, Ee-Chien Chang

    Abstract: Studying backdoor attacks is valuable for model copyright protection and enhancing defenses. While existing backdoor attacks have successfully infected multimodal contrastive learning models such as CLIP, they can be easily countered by specialized backdoor defenses for MCL models. This paper reveals the threats in this practical scenario that backdoor attacks can remain effective even after defen… ▽ More

    Submitted 4 March, 2024; v1 submitted 19 November, 2023; originally announced November 2023.

    Comments: The paper lacks some work that needs to be cited

    Journal ref: CVPR 2024

  21. arXiv:2311.11017  [pdf, other

    cs.CV

    Improving Adversarial Transferability by Stable Diffusion

    Authors: Jiayang Liu, Siyu Zhu, Siyuan Liang, Jie Zhang, Han Fang, Weiming Zhang, Ee-Chien Chang

    Abstract: Deep neural networks (DNNs) are susceptible to adversarial examples, which introduce imperceptible perturbations to benign samples, deceiving DNN predictions. While some attack methods excel in the white-box setting, they often struggle in the black-box scenario, particularly against models fortified with defense mechanisms. Various techniques have emerged to enhance the transferability of adversa… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

  22. arXiv:2311.00897  [pdf, other

    cs.SD cs.CL eess.AS

    On The Open Prompt Challenge In Conditional Audio Generation

    Authors: Ernie Chang, Sidd Srinivasan, Mahi Luthra, Pin-Jie Lin, Varun Nagaraja, Forrest Iandola, Zechun Liu, Zhaoheng Ni, Changsheng Zhao, Yangyang Shi, Vikas Chandra

    Abstract: Text-to-audio generation (TTA) produces audio from a text description, learning from pairs of audio samples and hand-annotated text. However, commercializing audio generation is challenging as user-input prompts are often under-specified when compared to text descriptions used to train TTA models. In this work, we treat TTA models as a ``blackbox'' and address the user prompt challenge with two ke… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: 5 pages, 3 figures, 4 tables

  23. arXiv:2311.00895  [pdf, other

    cs.SD cs.CL eess.AS

    In-Context Prompt Editing For Conditional Audio Generation

    Authors: Ernie Chang, Pin-Jie Lin, Yang Li, Sidd Srinivasan, Gael Le Lan, David Kant, Yangyang Shi, Forrest Iandola, Vikas Chandra

    Abstract: Distributional shift is a central challenge in the deployment of machine learning models as they can be ill-equipped for real-world data. This is particularly evident in text-to-audio generation where the encoded representations are easily undermined by unseen prompts, which leads to the degradation of generated audio -- the limited set of the text-audio pairs remains inadequate for conditional au… ▽ More

    Submitted 1 November, 2023; originally announced November 2023.

    Comments: 5 pages, 3 figures, 2 tables

  24. arXiv:2310.18652  [pdf, other

    cs.CL cs.AI cs.CV

    EHRXQA: A Multi-Modal Question Answering Dataset for Electronic Health Records with Chest X-ray Images

    Authors: Seongsu Bae, Daeun Kyung, Jaehee Ryu, Eunbyeol Cho, Gyubok Lee, Sunjun Kweon, Jungwoo Oh, Lei Ji, Eric I-Chao Chang, Tackeun Kim, Edward Choi

    Abstract: Electronic Health Records (EHRs), which contain patients' medical histories in various multi-modal formats, often overlook the potential for joint reasoning across imaging and table modalities underexplored in current EHR Question Answering (QA) systems. In this paper, we introduce EHRXQA, a novel multi-modal question answering dataset combining structured EHRs and chest X-ray images. To develop o… ▽ More

    Submitted 25 December, 2023; v1 submitted 28 October, 2023; originally announced October 2023.

    Comments: Accepted at NeurIPS 2023 Datasets and Benchmarks Track (10 pages for main text, 4 pages for references, 39 pages for supplementary materials)

  25. arXiv:2310.14088  [pdf, other

    cs.CL

    MedEval: A Multi-Level, Multi-Task, and Multi-Domain Medical Benchmark for Language Model Evaluation

    Authors: Zexue He, Yu Wang, An Yan, Yao Liu, Eric Y. Chang, Amilcare Gentili, Julian McAuley, Chun-Nan Hsu

    Abstract: Curated datasets for healthcare are often limited due to the need of human annotations from experts. In this paper, we present MedEval, a multi-level, multi-task, and multi-domain medical benchmark to facilitate the development of language models for healthcare. MedEval is comprehensive and consists of data from several healthcare systems and spans 35 human body regions from 8 examination modaliti… ▽ More

    Submitted 14 November, 2023; v1 submitted 21 October, 2023; originally announced October 2023.

    Comments: Accepted to EMNLP 2023. Camera-ready version: updated IRB, added more evaluation results on LLMs such as GPT4, LLaMa2, and LLaMa2-chat

  26. arXiv:2310.04645  [pdf, other

    q-bio.NC cs.AI cs.CL eess.AS

    Do self-supervised speech and language models extract similar representations as human brain?

    Authors: Peili Chen, Linyang He, Li Fu, Lu Fan, Edward F. Chang, Yuanning Li

    Abstract: Speech and language models trained through self-supervised learning (SSL) demonstrate strong alignment with brain activity during speech and language perception. However, given their distinct training modalities, it remains unclear whether they correlate with the same neural aspects. We directly address this question by evaluating the brain prediction performance of two representative SSL models,… ▽ More

    Submitted 31 January, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: To appear in 2024 IEEE International Conference on Acoustics, Speech and Signal Processing

  27. arXiv:2310.04644  [pdf, other

    cs.SD eess.AS q-bio.NC

    Neural2Speech: A Transfer Learning Framework for Neural-Driven Speech Reconstruction

    Authors: Jiawei Li, Chunxu Guo, Li Fu, Lu Fan, Edward F. Chang, Yuanning Li

    Abstract: Reconstructing natural speech from neural activity is vital for enabling direct communication via brain-computer interfaces. Previous efforts have explored the conversion of neural recordings into speech using complex deep neural network (DNN) models trained on extensive neural recording data, which is resource-intensive under regular clinical constraints. However, achieving satisfactory performan… ▽ More

    Submitted 31 January, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

    Comments: To appear in 2024 IEEE International Conference on Acoustics, Speech and Signal Processing

  28. arXiv:2310.00206  [pdf, other

    cs.RO

    An Investigation of Multi-feature Extraction and Super-resolution with Fast Microphone Arrays

    Authors: Eric T. Chang, Runsheng Wang, Peter Ballentine, **gxi Xu, Trey Smith, Brian Coltin, Ioannis Kymissis, Matei Ciocarlie

    Abstract: In this work, we use MEMS microphones as vibration sensors to simultaneously classify texture and estimate contact position and velocity. Vibration sensors are an important facet of both human and robotic tactile sensing, providing fast detection of contact and onset of slip. Microphones are an attractive option for implementing vibration sensing as they offer a fast response and can be sampled qu… ▽ More

    Submitted 7 March, 2024; v1 submitted 29 September, 2023; originally announced October 2023.

    Comments: 6 pages, 4 figures, accepted to 2024 IEEE International Conference on Robotics and Automation (ICRA)

  29. arXiv:2309.17124  [pdf, other

    cs.CR

    Mostree : Malicious Secure Private Decision Tree Evaluation with Sublinear Communication

    Authors: Jianli Bai, Xiangfu Song, Xiaowu Zhang, Qifan Wang, Shujie Cui, Ee-Chien Chang, Giovanni Russello

    Abstract: A private decision tree evaluation (PDTE) protocol allows a feature vector owner (FO) to classify its data using a tree model from a model owner (MO) and only reveals an inference result to the FO. This paper proposes Mostree, a PDTE protocol secure in the presence of malicious parties with sublinear communication. We design Mostree in the three-party honest-majority setting, where an (untrusted)… ▽ More

    Submitted 29 September, 2023; originally announced September 2023.

    Comments: This paper has been accepted by ACSAC2023

  30. arXiv:2309.10537  [pdf, other

    eess.AS cs.MM cs.SD

    FoleyGen: Visually-Guided Audio Generation

    Authors: Xinhao Mei, Varun Nagaraja, Gael Le Lan, Zhaoheng Ni, Ernie Chang, Yangyang Shi, Vikas Chandra

    Abstract: Recent advancements in audio generation have been spurred by the evolution of large-scale deep learning models and expansive datasets. However, the task of video-to-audio (V2A) generation continues to be a challenge, principally because of the intricate relationship between the high-dimensional visual and auditory data, and the challenges associated with temporal synchronization. In this study, we… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

  31. arXiv:2309.08804  [pdf, other

    eess.AS cs.SD

    Stack-and-Delay: a new codebook pattern for music generation

    Authors: Gael Le Lan, Varun Nagaraja, Ernie Chang, David Kant, Zhaoheng Ni, Yangyang Shi, Forrest Iandola, Vikas Chandra

    Abstract: In language modeling based music generation, a generated waveform is represented by a sequence of hierarchical token stacks that can be decoded either in an auto-regressive manner or in parallel, depending on the codebook patterns. In particular, flattening the codebooks represents the highest quality decoding strategy, while being notoriously slow. To this end, we propose a novel stack-and-delay… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  32. arXiv:2309.08773  [pdf, other

    cs.SD cs.AI cs.LG eess.AS

    Enhance audio generation controllability through representation similarity regularization

    Authors: Yangyang Shi, Gael Le Lan, Varun Nagaraja, Zhaoheng Ni, Xinhao Mei, Ernie Chang, Forrest Iandola, Yang Liu, Vikas Chandra

    Abstract: This paper presents an innovative approach to enhance control over audio generation by emphasizing the alignment between audio and text representations during model training. In the context of language model-based audio generation, the model leverages input from both textual and audio token representations to predict subsequent audio tokens. However, the current configuration lacks explicit regula… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

    Comments: 5 pages

  33. arXiv:2309.07988  [pdf, other

    cs.LG cs.AR cs.SD eess.AS

    Folding Attention: Memory and Power Optimization for On-Device Transformer-based Streaming Speech Recognition

    Authors: Yang Li, Liangzhen Lai, Yuan Shangguan, Forrest N. Iandola, Zhaoheng Ni, Ernie Chang, Yangyang Shi, Vikas Chandra

    Abstract: Transformer-based models excel in speech recognition. Existing efforts to optimize Transformer inference, typically for long-context applications, center on simplifying attention score calculations. However, streaming speech recognition models usually process a limited number of tokens each time, making attention score calculation less of a bottleneck. Instead, the bottleneck lies in the linear pr… ▽ More

    Submitted 18 January, 2024; v1 submitted 14 September, 2023; originally announced September 2023.

  34. Historia: Refuting Callback Reachability with Message-History Logics (Extended Version)

    Authors: Shawn Meier, Sergio Mover, Gowtham Kaki, Bor-Yuh Evan Chang

    Abstract: This paper determines if a callback can be called by an event-driven framework in an unexpected state.Event-driven programming frameworks are pervasive for creating user-interactive apps on just about every modern platform.Control flow between callbacks is determined by the framework and largely opaque to the programmer.This opacity of the callback control flow not only causes difficulty for the p… ▽ More

    Submitted 11 September, 2023; v1 submitted 8 September, 2023; originally announced September 2023.

    Comments: 40 pages, 8 figures, Accepted to OOPSLA 2023

    MSC Class: 68Q60 ACM Class: D.3.3

  35. arXiv:2308.10443  [pdf, other

    cs.AI cs.CL cs.CY

    Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions

    Authors: Wesley Tann, Yuancheng Liu, Jun Heng Sim, Choon Meng Seah, Ee-Chien Chang

    Abstract: The assessment of cybersecurity Capture-The-Flag (CTF) exercises involves participants finding text strings or ``flags'' by exploiting system vulnerabilities. Large Language Models (LLMs) are natural-language models trained on vast amounts of words to understand and generate text; they can perform well on many CTF challenges. Such LLMs are freely available to students. In the context of CTF exerci… ▽ More

    Submitted 20 August, 2023; originally announced August 2023.

  36. arXiv:2308.06443  [pdf, other

    cs.LG eess.AS

    Neural Latent Aligner: Cross-trial Alignment for Learning Representations of Complex, Naturalistic Neural Data

    Authors: Cheol Jun Cho, Edward F. Chang, Gopala K. Anumanchipalli

    Abstract: Understanding the neural implementation of complex human behaviors is one of the major goals in neuroscience. To this end, it is crucial to find a true representation of the neural data, which is challenging due to the high complexity of behaviors and the low signal-to-ratio (SNR) of the signals. Here, we propose a novel unsupervised learning framework, Neural Latent Aligner (NLA), to find well-co… ▽ More

    Submitted 11 August, 2023; originally announced August 2023.

    Comments: Accepted at ICML 2023

    Journal ref: Proceedings of the 40th International Conference on Machine Learning (2023), PMLR 202:5661-5676

  37. arXiv:2308.02075  [pdf, ps, other

    math.CO cs.DM math-ph math.PR

    Upper bounds on the $2$-colorability threshold of random $d$-regular $k$-uniform hypergraphs for $k\geq 3$

    Authors: Evan Chang, Neel Kolhe, Youngtak Sohn

    Abstract: For a large class of random constraint satisfaction problems (CSP), deep but non-rigorous theory from statistical physics predict the location of the sharp satisfiability transition. The works of Ding, Sly, Sun (2014, 2016) and Coja-Oghlan, Panagiotou (2014) established the satisfiability threshold for random regular $k$-NAE-SAT, random $k$-SAT, and random regular $k$-SAT for large enough… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

    Comments: 23 pages, 1 table

  38. arXiv:2307.07409  [pdf, other

    cs.CL cs.AI eess.IV

    KU-DMIS-MSRA at RadSum23: Pre-trained Vision-Language Model for Radiology Report Summarization

    Authors: Gangwoo Kim, Hajung Kim, Lei Ji, Seongsu Bae, Chanhwi Kim, Mujeen Sung, Hyunjae Kim, Kun Yan, Eric Chang, Jaewoo Kang

    Abstract: In this paper, we introduce CheXOFA, a new pre-trained vision-language model (VLM) for the chest X-ray domain. Our model is initially pre-trained on various multimodal datasets within the general domain before being transferred to the chest X-ray domain. Following a prominent VLM, we unify various domain-specific tasks into a simple sequence-to-sequence schema. It enables the model to effectively… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

    Comments: Published at BioNLP workshop @ ACL 2023

  39. arXiv:2307.00382  [pdf, other

    cs.CL

    Low-Resource Cross-Lingual Adaptive Training for Nigerian Pidgin

    Authors: Pin-Jie Lin, Muhammed Saeed, Ernie Chang, Merel Scholman

    Abstract: Develo** effective spoken language processing systems for low-resource languages poses several challenges due to the lack of parallel data and limited resources for fine-tuning models. In this work, we target on improving upon both text classification and translation of Nigerian Pidgin (Naija) by collecting a large-scale parallel English-Pidgin corpus and further propose a framework of cross-lin… ▽ More

    Submitted 1 July, 2023; originally announced July 2023.

    Comments: To appear in INTERSPEECH 2023

  40. arXiv:2307.00374  [pdf, other

    cs.CL

    Revisiting Sample Size Determination in Natural Language Understanding

    Authors: Ernie Chang, Muhammad Hassan Rashid, Pin-Jie Lin, Changsheng Zhao, Vera Demberg, Yangyang Shi, Vikas Chandra

    Abstract: Knowing exactly how many data points need to be labeled to achieve a certain model performance is a hugely beneficial step towards reducing the overall budgets for annotation. It pertains to both active learning and traditional data annotation, and is particularly beneficial for low resource scenarios. Nevertheless, it remains a largely under-explored area of research in NLP. We therefore explored… ▽ More

    Submitted 1 July, 2023; originally announced July 2023.

    Comments: Accepted to ACL 2023

  41. arXiv:2306.03566  [pdf, other

    cs.LG stat.ML

    Memory-Based Dual Gaussian Processes for Sequential Learning

    Authors: Paul E. Chang, Prakhar Verma, S. T. John, Arno Solin, Mohammad Emtiyaz Khan

    Abstract: Sequential learning with Gaussian processes (GPs) is challenging when access to past data is limited, for example, in continual and active learning. In such cases, errors can accumulate over time due to inaccuracies in the posterior, hyperparameters, and inducing points, making accurate learning challenging. Here, we present a method to keep all such errors in check using the recently proposed dua… ▽ More

    Submitted 6 June, 2023; originally announced June 2023.

    Comments: International Conference on Machine Learning (ICML) 2023

  42. arXiv:2306.01400  [pdf, other

    cs.LG cs.CR

    Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

    Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang

    Abstract: In the seller-buyer setting on machine learning models, the seller generates different copies based on the original model and distributes them to different buyers, such that adversarial samples generated on one buyer's copy would likely not work on other copies. A known approach achieves this using attractor-based rewriter which injects different attractors to different copies. This induces differ… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

  43. arXiv:2305.17888  [pdf, other

    cs.CL

    LLM-QAT: Data-Free Quantization Aware Training for Large Language Models

    Authors: Zechun Liu, Barlas Oguz, Changsheng Zhao, Ernie Chang, Pierre Stock, Yashar Mehdad, Yangyang Shi, Raghuraman Krishnamoorthi, Vikas Chandra

    Abstract: Several post-training quantization methods have been applied to large language models (LLMs), and have been shown to perform well down to 8-bits. We find that these methods break down at lower bit precision, and investigate quantization aware training for LLMs (LLM-QAT) to push quantization levels even further. We propose a data-free distillation method that leverages generations produced by the p… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

  44. arXiv:2305.05869  [pdf, other

    cs.LG cs.CV

    Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation

    Authors: Jiyi Zhang, Han Fang, Hwee Kuan Lee, Ee-Chien Chang

    Abstract: Given a poorly documented neural network model, we take the perspective of a forensic investigator who wants to find out the model's data domain (e.g. whether on face images or traffic signs). Although existing methods such as membership inference and model inversion can be used to uncover some information about an unknown model, they still require knowledge of the data domain to start with. In th… ▽ More

    Submitted 9 May, 2023; originally announced May 2023.

  45. arXiv:2304.02438  [pdf, other

    cs.OH

    CoCoMo: Computational Consciousness Modeling for Generative and Ethical AI

    Authors: Edward Y. Chang

    Abstract: The CoCoMo model proposes a computational solution to the challenge of incorporating ethical and emotional intelligence considerations into AI systems, with the aim of creating AI agents that combine knowledge with compassion. To achieve this goal, CoCoMo prioritizes fairness, beneficence, non-maleficence, empathy, adaptability, transparency, and critical and exploratory thinking abilities. The mo… ▽ More

    Submitted 8 April, 2023; v1 submitted 17 March, 2023; originally announced April 2023.

    Comments: 10 pages, 3 figures, 5 tables

    ACM Class: I.2.7

  46. arXiv:2303.08769  [pdf, other

    cs.LG

    Prompting Large Language Models With the Socratic Method

    Authors: Edward Y. Chang

    Abstract: This paper presents a systematic approach to using the Socratic method in develo** prompt templates that effectively interact with large language models, including GPT-3. Various methods are examined, and those that yield precise answers and justifications while fostering creativity and imagination to enhance creative writing are identified. Techniques such as {\em definition}, {\em elenchus}, {… ▽ More

    Submitted 15 March, 2023; v1 submitted 17 February, 2023; originally announced March 2023.

    Comments: 10 pages

    ACM Class: I.2.7

    Journal ref: IEEE Computing and Communication Workshop and Conference (CCWC), March 2023

  47. arXiv:2303.03486  [pdf, other

    cs.RO

    Sampling-based Exploration for Reinforcement Learning of Dexterous Manipulation

    Authors: Gagan Khandate, Siqi Shang, Eric T. Chang, Tristan Luca Saidi, Yang Liu, Seth Matthew Dennis, Johnson Adams, Matei Ciocarlie

    Abstract: In this paper, we present a novel method for achieving dexterous manipulation of complex objects, while simultaneously securing the object without the use of passive support surfaces. We posit that a key difficulty for training such policies in a Reinforcement Learning framework is the difficulty of exploring the problem state space, as the accessible regions of this space form a complex structure… ▽ More

    Submitted 23 May, 2023; v1 submitted 6 March, 2023; originally announced March 2023.

    Comments: 10 pages, 7 figures, accepted at Robotics Science & Systems 2023

  48. arXiv:2301.01218  [pdf, other

    cs.CR cs.CV cs.LG

    Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence

    Authors: Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang

    Abstract: Deep neural networks are vulnerable to adversarial attacks. In this paper, we take the role of investigators who want to trace the attack and identify the source, that is, the particular model which the adversarial examples are generated from. Techniques derived would aid forensic investigation of attack incidents and serve as deterrence to potential attacks. We consider the buyers-seller setting… ▽ More

    Submitted 30 December, 2022; originally announced January 2023.

  49. arXiv:2212.13591  [pdf, other

    cs.AI cs.LG

    Knowledge-Guided Data-Centric AI in Healthcare: Progress, Shortcomings, and Future Directions

    Authors: Edward Y. Chang

    Abstract: The success of deep learning is largely due to the availability of large amounts of training data that cover a wide range of examples of a particular concept or meaning. In the field of medicine, having a diverse set of training data on a particular disease can lead to the development of a model that is able to accurately predict the disease. However, despite the potential benefits, there have not… ▽ More

    Submitted 30 April, 2023; v1 submitted 27 December, 2022; originally announced December 2022.

    Comments: 21 pages, 13 figures, 4 tables. arXiv admin note: text overlap with arXiv:1707.09873

    ACM Class: I.2.7; K.3.2

  50. arXiv:2212.00612  [pdf, other

    cs.LG cs.CR

    Purifier: Defending Data Inference Attacks via Transforming Confidence Scores

    Authors: Ziqi Yang, Li** Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren

    Abstract: Neural networks are susceptible to data inference attacks such as the membership inference attack, the adversarial model inversion attack and the attribute inference attack, where the attacker could infer useful information such as the membership, the reconstruction or the sensitive attributes of a data sample from the confidence scores predicted by the target classifier. In this paper, we propose… ▽ More

    Submitted 1 December, 2022; originally announced December 2022.

    Comments: accepted by AAAI 2023