Skip to main content

Showing 1–50 of 92 results for author: Gei**, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10209  [pdf, other

    cs.CL

    Be like a Goldfish, Don't Memorize! Mitigating Memorization in Generative LLMs

    Authors: Abhimanyu Hans, Yuxin Wen, Neel Jain, John Kirchenbauer, Hamid Kazemi, Prajwal Singhania, Siddharth Singh, Gowthami Somepalli, Jonas Gei**, Abhinav Bhatele, Tom Goldstein

    Abstract: Large language models can memorize and repeat their training data, causing privacy and copyright risks. To mitigate memorization, we introduce a subtle modification to the next-token training objective that we call the goldfish loss. During training, a randomly sampled subset of tokens are excluded from the loss computation. These dropped tokens are not memorized by the model, which prevents verba… ▽ More

    Submitted 14 June, 2024; originally announced June 2024.

    Comments: 9.5 pages, 8 figures, and 1 table in the main body. Code available at https://github.com/ahans30/goldfish-loss

  2. arXiv:2405.19524  [pdf, other

    cs.CR cs.AI

    AI Risk Management Should Incorporate Both Safety and Security

    Authors: Xiangyu Qi, Yangsibo Huang, Yi Zeng, Edoardo Debenedetti, Jonas Gei**, Luxi He, Kaixuan Huang, Udari Madhushani, Vikash Sehwag, Weijia Shi, Boyi Wei, Tinghao Xie, Danqi Chen, Pin-Yu Chen, Jeffrey Ding, Ruoxi Jia, Jiaqi Ma, Arvind Narayanan, Weijie J Su, Mengdi Wang, Chaowei Xiao, Bo Li, Dawn Song, Peter Henderson, Prateek Mittal

    Abstract: The exposure of security vulnerabilities in safety-aligned language models, e.g., susceptibility to adversarial attacks, has shed light on the intricate interplay between AI safety and AI security. Although the two disciplines now come together under the overarching goal of AI risk management, they have historically evolved separately, giving rise to differing perspectives. Therefore, in this pape… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  3. arXiv:2405.17399  [pdf, other

    cs.LG cs.AI

    Transformers Can Do Arithmetic with the Right Embeddings

    Authors: Sean McLeish, Arpit Bansal, Alex Stein, Neel Jain, John Kirchenbauer, Brian R. Bartoldson, Bhavya Kailkhura, Abhinav Bhatele, Jonas Gei**, Avi Schwarzschild, Tom Goldstein

    Abstract: The poor performance of transformers on arithmetic tasks seems to stem in large part from their inability to keep track of the exact position of each digit inside of a large span of digits. We mend this problem by adding an embedding to each digit that encodes its position relative to the start of the number. In addition to the boost these embeddings provide on their own, we show that this fix ena… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  4. arXiv:2405.06331  [pdf, other

    cs.LG cs.CL

    LMD3: Language Model Data Density Dependence

    Authors: John Kirchenbauer, Garrett Honke, Gowthami Somepalli, Jonas Gei**, Daphne Ippolito, Katherine Lee, Tom Goldstein, David Andre

    Abstract: We develop a methodology for analyzing language model task performance at the individual example level based on training data density estimation. Experiments with paraphrasing as a controlled intervention on finetuning data demonstrate that increasing the support in the training distribution for specific test queries results in a measurable increase in density, which is also a significant predicto… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 10 pages in the main body

  5. arXiv:2404.01292  [pdf, other

    cs.CV cs.LG

    Measuring Style Similarity in Diffusion Models

    Authors: Gowthami Somepalli, Anubhav Gupta, Kamal Gupta, Shramay Palta, Micah Goldblum, Jonas Gei**, Abhinav Shrivastava, Tom Goldstein

    Abstract: Generative models are now widely used by graphic designers and artists. Prior works have shown that these models remember and often replicate content from their training data during generation. Hence as their proliferation increases, it has become important to perform a database search to determine whether the properties of the image are attributable to specific training data, every time before a… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  6. arXiv:2404.01231  [pdf, other

    cs.CR cs.LG

    Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models

    Authors: Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Gei**, Tom Goldstein, Nicholas Carlini

    Abstract: It is commonplace to produce application-specific models by fine-tuning large pre-trained models using a small bespoke dataset. The widespread availability of foundation model checkpoints on the web poses considerable risks, including the vulnerability to backdoor attacks. In this paper, we unveil a new vulnerability: the privacy backdoor attack. This black-box privacy attack aims to amplify the p… ▽ More

    Submitted 1 April, 2024; originally announced April 2024.

  7. arXiv:2403.16365  [pdf, other

    cs.LG cs.CR cs.CV

    Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion

    Authors: Hossein Souri, Arpit Bansal, Hamid Kazemi, Liam Fowl, Aniruddha Saha, Jonas Gei**, Andrew Gordon Wilson, Rama Chellappa, Tom Goldstein, Micah Goldblum

    Abstract: Modern neural networks are often trained on massive datasets that are web scraped with minimal human inspection. As a result of this insecure curation pipeline, an adversary can poison or backdoor the resulting model by uploading malicious data to the internet and waiting for a victim to scrape and train on it. Existing approaches for creating poisons and backdoors start with randomly sampled clea… ▽ More

    Submitted 24 March, 2024; originally announced March 2024.

  8. arXiv:2403.02580  [pdf, other

    cs.CV cs.LG

    What do we learn from inverting CLIP models?

    Authors: Hamid Kazemi, Atoosa Chegini, Jonas Gei**, Soheil Feizi, Tom Goldstein

    Abstract: We employ an inversion-based approach to examine CLIP models. Our examination reveals that inverting CLIP models results in the generation of images that exhibit semantic alignment with the specified target prompts. We leverage these inverted images to gain insights into various aspects of CLIP models, such as their ability to blend concepts and inclusion of gender biases. We notably observe insta… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

    Comments: Warning: This paper contains sexually explicit images and language, offensive visuals and terminology, discussions on pornography, gender bias, and other potentially unsettling, distressing, and/or offensive content for certain readers

  9. arXiv:2402.16543  [pdf, other

    physics.flu-dyn cs.CE cs.LG

    Model-based deep reinforcement learning for accelerated learning from flow simulations

    Authors: Andre Weiner, Janis Geise

    Abstract: In recent years, deep reinforcement learning has emerged as a technique to solve closed-loop flow control problems. Employing simulation-based environments in reinforcement learning enables a priori end-to-end optimization of the control system, provides a virtual testbed for safety-critical control applications, and allows to gain a deep understanding of the control mechanisms. While reinforcemen… ▽ More

    Submitted 10 April, 2024; v1 submitted 26 February, 2024; originally announced February 2024.

  10. arXiv:2402.14020  [pdf, other

    cs.LG cs.CL cs.CR

    Coercing LLMs to do and reveal (almost) anything

    Authors: Jonas Gei**, Alex Stein, Manli Shu, Khalid Saifullah, Yuxin Wen, Tom Goldstein

    Abstract: It has recently been shown that adversarial attacks on large language models (LLMs) can "jailbreak" the model into making harmful statements. In this work, we argue that the spectrum of adversarial attacks on LLMs is much larger than merely jailbreaking. We provide a broad overview of possible attack surfaces and attack goals. Based on a series of concrete examples, we discuss, categorize and syst… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Comments: 32 pages. Implementation available at https://github.com/JonasGei**/carving

  11. arXiv:2401.12070  [pdf, other

    cs.CL cs.AI cs.LG

    Spotting LLMs With Binoculars: Zero-Shot Detection of Machine-Generated Text

    Authors: Abhimanyu Hans, Avi Schwarzschild, Valeriia Cherepanova, Hamid Kazemi, Aniruddha Saha, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: Detecting text generated by modern large language models is thought to be hard, as both LLMs and humans can exhibit a wide range of complex behaviors. However, we find that a score based on contrasting two closely related language models is highly accurate at separating human-generated and machine-generated text. Based on this mechanism, we propose a novel LLM detector that only requires simple ca… ▽ More

    Submitted 1 July, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

    Comments: 20 pages, code available at https://github.com/ahans30/Binoculars

  12. arXiv:2312.02142  [pdf, other

    cs.CV

    Object Recognition as Next Token Prediction

    Authors: Kaiyu Yue, Bor-Chun Chen, Jonas Gei**, Hengduo Li, Tom Goldstein, Ser-Nam Lim

    Abstract: We present an approach to pose object recognition as next token prediction. The idea is to apply a language decoder that auto-regressively predicts the text tokens from image embeddings to form labels. To ground this prediction process in auto-regression, we customize a non-causal attention mask for the decoder, incorporating two key features: modeling tokens from different labels to be independen… ▽ More

    Submitted 31 March, 2024; v1 submitted 4 December, 2023; originally announced December 2023.

    Comments: CVPR 2024

  13. arXiv:2311.10273  [pdf, ps, other

    cs.AR

    Improving FSM State Enumeration Performance for Hardware Security with RECUT and REFSM-SAT

    Authors: Jim Geist, Travis Meade, Shaojie Zhang, Yier **

    Abstract: Finite state machines (FSM's) are implemented with sequential circuits and are used to orchestrate the operation of hardware designs. Sequential obfuscation schemes aimed at preventing IP theft often operate by augmenting a design's FSM post-synthesis. Many such schemes are based on the ability to recover the FSM's topology from the synthesized design. In this paper, we present two tools which can… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

    Comments: 7 pages, 2 figures, 2 algorithms

    MSC Class: 68U07

  14. arXiv:2311.05877  [pdf, other

    cs.LG cs.AI

    A Performance-Driven Benchmark for Feature Selection in Tabular Deep Learning

    Authors: Valeriia Cherepanova, Roman Levin, Gowthami Somepalli, Jonas Gei**, C. Bayan Bruss, Andrew Gordon Wilson, Tom Goldstein, Micah Goldblum

    Abstract: Academic tabular benchmarks often contain small sets of curated features. In contrast, data scientists typically collect as many features as possible into their datasets, and even engineer new features from existing ones. To prevent overfitting in subsequent downstream modeling, practitioners commonly use automated feature selection methods that identify a reduced subset of informative features. E… ▽ More

    Submitted 10 November, 2023; originally announced November 2023.

    Journal ref: Conference on Neural Information Processing Systems 2023

  15. arXiv:2311.03386  [pdf, other

    cs.CV cs.LG

    A Simple and Efficient Baseline for Data Attribution on Images

    Authors: Vasu Singla, Pedro Sandoval-Segura, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: Data attribution methods play a crucial role in understanding machine learning models, providing insight into which training data points are most responsible for model outputs during deployment. However, current state-of-the-art approaches require a large ensemble of as many as 300,000 models to accurately attribute model predictions. These approaches therefore come at a high computational cost, a… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

    Comments: Code available at https://github.com/vasusingla/simple-data-attribution

  16. arXiv:2310.15264  [pdf, other

    cs.CL cs.AI

    Towards Possibilities & Impossibilities of AI-generated Text Detection: A Survey

    Authors: Soumya Suvra Ghosal, Souradip Chakraborty, Jonas Gei**, Furong Huang, Dinesh Manocha, Amrit Singh Bedi

    Abstract: Large Language Models (LLMs) have revolutionized the domain of natural language processing (NLP) with remarkable capabilities of generating human-like text responses. However, despite these advancements, several works in the existing literature have raised serious concerns about the potential misuse of LLMs such as spreading misinformation, generating fake news, plagiarism in academia, and contami… ▽ More

    Submitted 23 October, 2023; originally announced October 2023.

  17. arXiv:2310.05914  [pdf, other

    cs.CL cs.LG

    NEFTune: Noisy Embeddings Improve Instruction Finetuning

    Authors: Neel Jain, **-yeh Chiang, Yuxin Wen, John Kirchenbauer, Hong-Min Chu, Gowthami Somepalli, Brian R. Bartoldson, Bhavya Kailkhura, Avi Schwarzschild, Aniruddha Saha, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: We show that language model finetuning can be improved, sometimes dramatically, with a simple augmentation. NEFTune adds noise to the embedding vectors during training. Standard finetuning of LLaMA-2-7B using Alpaca achieves 29.79% on AlpacaEval, which rises to 64.69% using noisy embeddings. NEFTune also improves over strong baselines on modern instruction datasets. Models trained with Evol-Instru… ▽ More

    Submitted 10 October, 2023; v1 submitted 9 October, 2023; originally announced October 2023.

    Comments: 25 pages, Code is available on Github: https://github.com/neelsjain/NEFTune

  18. arXiv:2309.00614  [pdf, other

    cs.LG cs.CL cs.CR

    Baseline Defenses for Adversarial Attacks Against Aligned Language Models

    Authors: Neel Jain, Avi Schwarzschild, Yuxin Wen, Gowthami Somepalli, John Kirchenbauer, **-yeh Chiang, Micah Goldblum, Aniruddha Saha, Jonas Gei**, Tom Goldstein

    Abstract: As Large Language Models quickly become ubiquitous, it becomes critical to understand their security vulnerabilities. Recent work shows that text optimizers can produce jailbreaking prompts that bypass moderation and alignment. Drawing from the rich body of work on adversarial machine learning, we approach these attacks with three questions: What threat models are practically useful in this domain… ▽ More

    Submitted 4 September, 2023; v1 submitted 1 September, 2023; originally announced September 2023.

    Comments: 12 pages

  19. arXiv:2307.05564  [pdf, other

    cs.CL

    Augmenters at SemEval-2023 Task 1: Enhancing CLIP in Handling Compositionality and Ambiguity for Zero-Shot Visual WSD through Prompt Augmentation and Text-To-Image Diffusion

    Authors: Jie S. Li, Yow-Ting Shiue, Yong-Siang Shih, Jonas Gei**

    Abstract: This paper describes our zero-shot approaches for the Visual Word Sense Disambiguation (VWSD) Task in English. Our preliminary study shows that the simple approach of matching candidate images with the phrase using CLIP suffers from the many-to-many nature of image-text pairs. We find that the CLIP text encoder may have limited abilities in capturing the compositionality in natural language. Conve… ▽ More

    Submitted 9 July, 2023; originally announced July 2023.

    Comments: Proceedings of the 17th International Workshop on Semantic Evaluation (SemEval-2023)

  20. arXiv:2307.00028  [pdf, other

    cs.CV cs.AI cs.CL cs.LG

    Seeing in Words: Learning to Classify through Language Bottlenecks

    Authors: Khalid Saifullah, Yuxin Wen, Jonas Gei**, Micah Goldblum, Tom Goldstein

    Abstract: Neural networks for computer vision extract uninterpretable features despite achieving high accuracy on benchmarks. In contrast, humans can explain their predictions using succinct and intuitive descriptions. To incorporate explainability into neural networks, we train a vision model whose feature representations are text. We show that such a model can effectively classify ImageNet images, and we… ▽ More

    Submitted 28 June, 2023; originally announced July 2023.

    Comments: 5 pages, 2 figures, Published as a Tiny Paper at ICLR 2023

  21. arXiv:2306.17194  [pdf, other

    cs.CR cs.CL cs.LG

    On the Exploitability of Instruction Tuning

    Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Gei**, Chaowei Xiao, Tom Goldstein

    Abstract: Instruction tuning is an effective technique to align large language models (LLMs) with human intents. In this work, we investigate how an adversary can exploit instruction tuning by injecting specific instruction-following examples into the training data that intentionally changes the model's behavior. For example, an adversary can achieve content injection by injecting training examples that men… ▽ More

    Submitted 28 October, 2023; v1 submitted 28 June, 2023; originally announced June 2023.

    Comments: NeurIPS 2023 camera-ready (21 pages, 10 figures)

  22. arXiv:2306.13651  [pdf, other

    cs.CL cs.LG

    Bring Your Own Data! Self-Supervised Evaluation for Large Language Models

    Authors: Neel Jain, Khalid Saifullah, Yuxin Wen, John Kirchenbauer, Manli Shu, Aniruddha Saha, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: With the rise of Large Language Models (LLMs) and their ubiquitous deployment in diverse domains, measuring language model behavior on realistic data is imperative. For example, a company deploying a client-facing chatbot must ensure that the model will not respond to client requests with profanity. Current evaluations approach this problem using small, domain-specific datasets with human-curated… ▽ More

    Submitted 29 June, 2023; v1 submitted 23 June, 2023; originally announced June 2023.

    Comments: Code is available at https://github.com/neelsjain/BYOD. First two authors contributed equally. 21 pages, 22 figures

  23. arXiv:2306.04634  [pdf, other

    cs.LG cs.CL cs.CR

    On the Reliability of Watermarks for Large Language Models

    Authors: John Kirchenbauer, Jonas Gei**, Yuxin Wen, Manli Shu, Khalid Saifullah, Kezhi Kong, Kasun Fernando, Aniruddha Saha, Micah Goldblum, Tom Goldstein

    Abstract: As LLMs become commonplace, machine-generated text has the potential to flood the internet with spam, social media bots, and valueless content. Watermarking is a simple and effective strategy for mitigating such harms by enabling the detection and documentation of LLM-generated text. Yet a crucial question remains: How reliable is watermarking in realistic settings in the wild? There, watermarked… ▽ More

    Submitted 1 May, 2024; v1 submitted 7 June, 2023; originally announced June 2023.

    Comments: 9 pages in the main body. Published at ICLR 2024. Code is available at https://github.com/jwkirchenbauer/lm-watermarking

  24. arXiv:2305.20086  [pdf, other

    cs.LG cs.CR cs.CV

    Understanding and Mitigating Copying in Diffusion Models

    Authors: Gowthami Somepalli, Vasu Singla, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: Images generated by diffusion models like Stable Diffusion are increasingly widespread. Recent works and even lawsuits have shown that these models are prone to replicating their training data, unbeknownst to the user. In this paper, we first analyze this memorization problem in text-to-image diffusion models. While it is widely believed that duplicated images in the training set are responsible f… ▽ More

    Submitted 31 May, 2023; originally announced May 2023.

    Comments: 17 pages, preprint. Code is available at https://github.com/somepago/DCR

  25. arXiv:2305.20030  [pdf, other

    cs.LG cs.CR cs.CV

    Tree-Ring Watermarks: Fingerprints for Diffusion Images that are Invisible and Robust

    Authors: Yuxin Wen, John Kirchenbauer, Jonas Gei**, Tom Goldstein

    Abstract: Watermarking the outputs of generative models is a crucial technique for tracing copyright and preventing potential harm from AI-generated content. In this paper, we introduce a novel technique called Tree-Ring Watermarking that robustly fingerprints diffusion model outputs. Unlike existing methods that perform post-hoc modifications to images after sampling, Tree-Ring Watermarking subtly influenc… ▽ More

    Submitted 3 July, 2023; v1 submitted 31 May, 2023; originally announced May 2023.

    Comments: 16 pages, 8 figures, code is available at https://github.com/YuxinWenRick/tree-ring-watermark, fixed the repo link

  26. arXiv:2305.19254  [pdf, other

    cs.LG cs.CR

    What Can We Learn from Unlearnable Datasets?

    Authors: Pedro Sandoval-Segura, Vasu Singla, Jonas Gei**, Micah Goldblum, Tom Goldstein

    Abstract: In an era of widespread web scra**, unlearnable dataset methods have the potential to protect data privacy by preventing deep neural networks from generalizing. But in addition to a number of practical limitations that make their use unlikely, we make a number of findings that call into question their ability to safeguard data. First, it is widely believed that neural networks trained on unlearn… ▽ More

    Submitted 7 November, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: Accepted to NeurIPS 2023. Code available at https://github.com/psandovalsegura/learn-from-unlearnable

  27. arXiv:2304.12210  [pdf, other

    cs.LG cs.CV

    A Cookbook of Self-Supervised Learning

    Authors: Randall Balestriero, Mark Ibrahim, Vlad Sobal, Ari Morcos, Shashank Shekhar, Tom Goldstein, Florian Bordes, Adrien Bardes, Gregoire Mialon, Yuandong Tian, Avi Schwarzschild, Andrew Gordon Wilson, Jonas Gei**, Quentin Garrido, Pierre Fernandez, Amir Bar, Hamed Pirsiavash, Yann LeCun, Micah Goldblum

    Abstract: Self-supervised learning, dubbed the dark matter of intelligence, is a promising path to advance machine learning. Yet, much like cooking, training SSL methods is a delicate art with a high barrier to entry. While many components are familiar, successfully training a SSL method involves a dizzying set of choices from the pretext tasks to training hyper-parameters. Our goal is to lower the barrier… ▽ More

    Submitted 28 June, 2023; v1 submitted 24 April, 2023; originally announced April 2023.

  28. arXiv:2304.02234  [pdf, other

    cs.LG cs.CR cs.CV

    JPEG Compressed Images Can Bypass Protections Against AI Editing

    Authors: Pedro Sandoval-Segura, Jonas Gei**, Tom Goldstein

    Abstract: Recently developed text-to-image diffusion models make it easy to edit or create high-quality images. Their ease of use has raised concerns about the potential for malicious editing or deepfake creation. Imperceptible perturbations have been proposed as a means of protecting images from malicious editing by preventing diffusion models from generating realistic images. However, we find that the afo… ▽ More

    Submitted 7 April, 2023; v1 submitted 5 April, 2023; originally announced April 2023.

    Comments: 8 pages, 8 figures

  29. arXiv:2302.07121  [pdf, other

    cs.CV cs.LG

    Universal Guidance for Diffusion Models

    Authors: Arpit Bansal, Hong-Min Chu, Avi Schwarzschild, Soumyadip Sengupta, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: Typical diffusion models are trained to accept a particular form of conditioning, most commonly text, and cannot be conditioned on other modalities without retraining. In this work, we propose a universal guidance algorithm that enables diffusion models to be controlled by arbitrary guidance modalities without the need to retrain any use-specific components. We show that our algorithm successfully… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

  30. arXiv:2302.03668  [pdf, other

    cs.LG cs.CL

    Hard Prompts Made Easy: Gradient-Based Discrete Optimization for Prompt Tuning and Discovery

    Authors: Yuxin Wen, Neel Jain, John Kirchenbauer, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: The strength of modern generative models lies in their ability to be controlled through text-based prompts. Typical "hard" prompts are made from interpretable words and tokens, and must be hand-crafted by humans. There are also "soft" prompts, which consist of continuous feature vectors. These can be discovered using powerful optimization methods, but they cannot be easily interpreted, re-used acr… ▽ More

    Submitted 1 June, 2023; v1 submitted 7 February, 2023; originally announced February 2023.

    Comments: 15 pages, 12 figures, Code is available at https://github.com/YuxinWenRick/hard-prompts-made-easy

  31. arXiv:2301.10226  [pdf, other

    cs.LG cs.CL cs.CR

    A Watermark for Large Language Models

    Authors: John Kirchenbauer, Jonas Gei**, Yuxin Wen, Jonathan Katz, Ian Miers, Tom Goldstein

    Abstract: Potential harms of large language models can be mitigated by watermarking model output, i.e., embedding signals into generated text that are invisible to humans but algorithmically detectable from a short span of tokens. We propose a watermarking framework for proprietary language models. The watermark can be embedded with negligible impact on text quality, and can be detected using an efficient o… ▽ More

    Submitted 1 May, 2024; v1 submitted 24 January, 2023; originally announced January 2023.

    Comments: 13 pages in the main body. Published at ICML 2023. Code is available at github.com/jwkirchenbauer/lm-watermarking

  32. arXiv:2212.14034  [pdf, other

    cs.CL cs.LG

    Cramming: Training a Language Model on a Single GPU in One Day

    Authors: Jonas Gei**, Tom Goldstein

    Abstract: Recent trends in language modeling have focused on increasing performance through scaling, and have resulted in an environment where training language models is out of reach for most researchers and practitioners. While most in the community are asking how to push the limits of extreme computation, we ask the opposite question: How far can we get with a single GPU in just one day? We investigate… ▽ More

    Submitted 28 December, 2022; originally announced December 2022.

    Comments: 22 pages, we provide code at https://github.com/JonasGei**/cramming

  33. arXiv:2212.03860  [pdf, other

    cs.LG cs.CV cs.CY

    Diffusion Art or Digital Forgery? Investigating Data Replication in Diffusion Models

    Authors: Gowthami Somepalli, Vasu Singla, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: Cutting-edge diffusion models produce images with high quality and customizability, enabling them to be used for commercial art and graphic design purposes. But do diffusion models create unique works of art, or are they replicating content directly from their training sets? In this work, we study image retrieval frameworks that enable us to compare generated images with training samples and detec… ▽ More

    Submitted 12 December, 2022; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: Updated draft with the following changes (1) Clarified the LAION Aesthetics versions everywhere (2) Correction on which LAION Aesthetics version SD - 1.4 is finetuned on and updated figure 12 based on this (3) A section on possible causes of replication

  34. arXiv:2211.13219  [pdf, other

    cs.GR cs.AI cs.LG cs.NE cs.RO

    Automating Rigid Origami Design

    Authors: Jeremia Geiger, Karolis Martinkus, Oliver Richter, Roger Wattenhofer

    Abstract: Rigid origami has shown potential in large diversity of practical applications. However, current rigid origami crease pattern design mostly relies on known tessellations. This strongly limits the diversity and novelty of patterns that can be created. In this work, we build upon the recently developed principle of three units method to formulate rigid origami design as a discrete optimization probl… ▽ More

    Submitted 28 April, 2023; v1 submitted 20 November, 2022; originally announced November 2022.

    Comments: IJCAI 2023 AI, Arts & Creativity Special Track

  35. arXiv:2210.12864  [pdf, other

    cs.LG cs.CV

    K-SAM: Sharpness-Aware Minimization at the Speed of SGD

    Authors: Renkun Ni, **-yeh Chiang, Jonas Gei**, Micah Goldblum, Andrew Gordon Wilson, Tom Goldstein

    Abstract: Sharpness-Aware Minimization (SAM) has recently emerged as a robust technique for improving the accuracy of deep neural networks. However, SAM incurs a high computational cost in practice, requiring up to twice as much computation as vanilla SGD. The computational challenge posed by SAM arises because each iteration requires both ascent and descent steps and thus double the gradient computations.… ▽ More

    Submitted 23 October, 2022; originally announced October 2022.

    Comments: 13 pages, 2 figures

  36. arXiv:2210.10750  [pdf, other

    cs.LG cs.CR

    Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries

    Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: As industrial applications are increasingly automated by machine learning models, enforcing personal data ownership and intellectual property rights requires tracing training data back to their rightful owners. Membership inference algorithms approach this problem by using statistical techniques to discern whether a target sample was included in a model's training set. However, existing methods on… ▽ More

    Submitted 1 June, 2023; v1 submitted 19 October, 2022; originally announced October 2022.

    Comments: Code is available at https://github.com/YuxinWenRick/canary-in-a-coalmine, published as a conference paper at ICLR 2023

  37. arXiv:2210.09305  [pdf, other

    cs.LG cs.CR

    Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning

    Authors: Yuxin Wen, Jonas Gei**, Liam Fowl, Hossein Souri, Rama Chellappa, Micah Goldblum, Tom Goldstein

    Abstract: Federated learning is particularly susceptible to model poisoning and backdoor attacks because individual users have direct control over the training data and model updates. At the same time, the attack power of an individual user is limited because their updates are quickly drowned out by those of many other users. Existing attacks do not account for future behaviors of other users, and thus requ… ▽ More

    Submitted 17 October, 2022; originally announced October 2022.

    Comments: Code is available at \url{https://github.com/YuxinWenRick/thinking-two-moves-ahead}

  38. arXiv:2210.06441  [pdf, other

    cs.LG cs.CV

    How Much Data Are Augmentations Worth? An Investigation into Scaling Laws, Invariance, and Implicit Regularization

    Authors: Jonas Gei**, Micah Goldblum, Gowthami Somepalli, Ravid Shwartz-Ziv, Tom Goldstein, Andrew Gordon Wilson

    Abstract: Despite the clear performance benefits of data augmentations, little is known about why they are so effective. In this paper, we disentangle several key mechanisms through which data augmentations operate. Establishing an exchange rate between augmented and additional real data, we find that in out-of-distribution testing scenarios, augmentations which yield samples that are diverse, but inconsist… ▽ More

    Submitted 30 March, 2023; v1 submitted 12 October, 2022; originally announced October 2022.

    Comments: 31 pages, 29 figures. To be presented at ICLR 2023. Code at https://github.com/JonasGei**/dataaugs

  39. arXiv:2209.11916  [pdf, other

    cs.CV

    A Simple Strategy to Provable Invariance via Orbit Map**

    Authors: Kanchana Vaishnavi Gandikota, Jonas Gei**, Zorah Lähner, Adam Czapliński, Michael Moeller

    Abstract: Many applications require robustness, or ideally invariance, of neural networks to certain transformations of input data. Most commonly, this requirement is addressed by training data augmentation, using adversarial training, or defining network architectures that include the desired invariance by design. In this work, we propose a method to make network architectures provably invariant with respe… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

    Comments: ACCV 2022, older version is titled "Training or Architecture? How to Incorporate Invariance in Neural Networks",(arXiv:2106.10044)

  40. arXiv:2208.09392  [pdf, other

    cs.CV cs.LG

    Cold Diffusion: Inverting Arbitrary Image Transforms Without Noise

    Authors: Arpit Bansal, Eitan Borgnia, Hong-Min Chu, Jie S. Li, Hamid Kazemi, Furong Huang, Micah Goldblum, Jonas Gei**, Tom Goldstein

    Abstract: Standard diffusion models involve an image transform -- adding Gaussian noise -- and an image restoration operator that inverts this degradation. We observe that the generative behavior of diffusion models is not strongly dependent on the choice of image degradation, and in fact an entire family of generative models can be constructed by varying this choice. Even when using completely deterministi… ▽ More

    Submitted 19 August, 2022; originally announced August 2022.

  41. arXiv:2207.05152  [pdf, other

    eess.IV cs.CV cs.LG

    Accelerated Deep Lossless Image Coding with Unified Paralleleized GPU Coding Architecture

    Authors: Benjamin Lukas Cajus Barzen, Fedor Glazov, Jonas Geistert, Thomas Sikora

    Abstract: We propose Deep Lossless Image Coding (DLIC), a full resolution learned lossless image compression algorithm. Our algorithm is based on a neural network combined with an entropy encoder. The neural network performs a density estimation on each pixel of the source image. The density estimation is then used to code the target pixel, beating FLIF in terms of compression rate. Similar approaches have… ▽ More

    Submitted 11 July, 2022; originally announced July 2022.

  42. arXiv:2206.04615  [pdf, other

    cs.CL cs.AI cs.CY cs.LG stat.ML

    Beyond the Imitation Game: Quantifying and extrapolating the capabilities of language models

    Authors: Aarohi Srivastava, Abhinav Rastogi, Abhishek Rao, Abu Awal Md Shoeb, Abubakar Abid, Adam Fisch, Adam R. Brown, Adam Santoro, Aditya Gupta, Adrià Garriga-Alonso, Agnieszka Kluska, Aitor Lewkowycz, Akshat Agarwal, Alethea Power, Alex Ray, Alex Warstadt, Alexander W. Kocurek, Ali Safaya, Ali Tazarv, Alice Xiang, Alicia Parrish, Allen Nie, Aman Hussain, Amanda Askell, Amanda Dsouza , et al. (426 additional authors not shown)

    Abstract: Language models demonstrate both quantitative improvement and new qualitative capabilities with increasing scale. Despite their potentially transformative impact, these new capabilities are as yet poorly characterized. In order to inform future research, prepare for disruptive new model capabilities, and ameliorate socially harmful effects, it is vital that we understand the present and near-futur… ▽ More

    Submitted 12 June, 2023; v1 submitted 9 June, 2022; originally announced June 2022.

    Comments: 27 pages, 17 figures + references and appendices, repo: https://github.com/google/BIG-bench

    Journal ref: Transactions on Machine Learning Research, May/2022, https://openreview.net/forum?id=uyTL5Bvosj

  43. arXiv:2206.03693  [pdf, other

    cs.LG cs.CR

    Autoregressive Perturbations for Data Poisoning

    Authors: Pedro Sandoval-Segura, Vasu Singla, Jonas Gei**, Micah Goldblum, Tom Goldstein, David W. Jacobs

    Abstract: The prevalence of data scra** from social media as a means to obtain datasets has led to growing concerns regarding unauthorized use of data. Data poisoning attacks have been proposed as a bulwark against scra**, as they make data "unlearnable" by adding small, imperceptible perturbations. Unfortunately, existing methods require knowledge of both the target architecture and the complete datase… ▽ More

    Submitted 13 October, 2022; v1 submitted 8 June, 2022; originally announced June 2022.

    Comments: Accepted to NeurIPS 2022. Code available at https://github.com/psandovalsegura/autoregressive-poisoning

  44. arXiv:2204.08615  [pdf, other

    cs.LG cs.CR

    Poisons that are learned faster are more effective

    Authors: Pedro Sandoval-Segura, Vasu Singla, Liam Fowl, Jonas Gei**, Micah Goldblum, David Jacobs, Tom Goldstein

    Abstract: Imperceptible poisoning attacks on entire datasets have recently been touted as methods for protecting data privacy. However, among a number of defenses preventing the practical use of these techniques, early-stop** stands out as a simple, yet effective defense. To gauge poisons' vulnerability to early-stop**, we benchmark error-minimizing, error-maximizing, and synthetic poisons in terms of p… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

    Comments: 8 pages, 4 figures. Accepted to CVPR 2022 Art of Robustness Workshop

  45. arXiv:2202.00580  [pdf, other

    cs.LG cs.CR cs.CV

    Fishing for User Data in Large-Batch Federated Learning via Gradient Magnification

    Authors: Yuxin Wen, Jonas Gei**, Liam Fowl, Micah Goldblum, Tom Goldstein

    Abstract: Federated learning (FL) has rapidly risen in popularity due to its promise of privacy and efficiency. Previous works have exposed privacy vulnerabilities in the FL pipeline by recovering user data from gradient updates. However, existing attacks fail to address realistic settings because they either 1) require toy settings with very small batch sizes, or 2) require unrealistic and conspicuous arch… ▽ More

    Submitted 19 June, 2022; v1 submitted 1 February, 2022; originally announced February 2022.

    Comments: First three authors contributed equally, order chosen randomly. 21 pages, 9 figures. Published at ICML 2022

  46. arXiv:2201.12675  [pdf, other

    cs.LG cs.CL cs.CR

    Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models

    Authors: Liam Fowl, Jonas Gei**, Steven Reich, Yuxin Wen, Wojtek Czaja, Micah Goldblum, Tom Goldstein

    Abstract: A central tenet of Federated learning (FL), which trains models without centralizing user data, is privacy. However, previous work has shown that the gradient updates used in FL can leak user information. While the most industrial uses of FL are for text applications (e.g. keystroke prediction), nearly all attacks on FL privacy have focused on simple image classifiers. We propose a novel attack th… ▽ More

    Submitted 31 May, 2023; v1 submitted 29 January, 2022; originally announced January 2022.

    Comments: First two authors contributed equally. Order chosen by coin flip. Published at ICLR 2023. Implementation available at github.com/JonasGei**/breaching

  47. arXiv:2110.13057  [pdf, other

    cs.LG cs.CR

    Robbing the Fed: Directly Obtaining Private Data in Federated Learning with Modified Models

    Authors: Liam Fowl, Jonas Gei**, Wojtek Czaja, Micah Goldblum, Tom Goldstein

    Abstract: Federated learning has quickly gained popularity with its promises of increased user privacy and efficiency. Previous works have shown that federated gradient updates contain information that can be used to approximately recover user data in some situations. These previous attacks on user privacy have been limited in scope and do not scale to gradient updates aggregated over even a handful of data… ▽ More

    Submitted 18 March, 2022; v1 submitted 25 October, 2021; originally announced October 2021.

    Comments: First two authors contributed equally

  48. arXiv:2110.04254  [pdf, other

    cs.LG physics.ao-ph

    Assessment of Neural Networks for Stream-Water-Temperature Prediction

    Authors: Stefanie Mohr, Konstantina Drainas, Juergen Geist

    Abstract: Climate change results in altered air and water temperatures. Increases affect physicochemical properties, such as oxygen concentration, and can shift species distribution and survival, with consequences for ecosystem functioning and services. These ecosystem services have integral value for humankind and are forecasted to alter under climate warming. A mechanistic understanding of the drivers and… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: ICMLA2021

  49. arXiv:2109.14119  [pdf, other

    cs.LG math.OC

    Stochastic Training is Not Necessary for Generalization

    Authors: Jonas Gei**, Micah Goldblum, Phillip E. Pope, Michael Moeller, Tom Goldstein

    Abstract: It is widely believed that the implicit regularization of SGD is fundamental to the impressive generalization behavior we observe in neural networks. In this work, we demonstrate that non-stochastic full-batch training can achieve comparably strong performance to SGD on CIFAR-10 using modern architectures. To this end, we show that the implicit regularization of SGD can be completely replaced with… ▽ More

    Submitted 19 April, 2022; v1 submitted 28 September, 2021; originally announced September 2021.

    Comments: 25 pages, 6 figures. Code published at github.com/JonasGei**/fullbatchtraining. Decompressed version of paper published at ICLR 2022

  50. arXiv:2108.05647  [pdf, other

    cs.LG cs.CV

    Is Differentiable Architecture Search truly a One-Shot Method?

    Authors: Jonas Gei**, Jovita Lukasik, Margret Keuper, Michael Moeller

    Abstract: Differentiable architecture search (DAS) is a widely researched tool for the discovery of novel architectures, due to its promising results for image classification. The main benefit of DAS is the effectiveness achieved through the weight-sharing one-shot paradigm, which allows efficient architecture search. In this work, we investigate DAS in a systematic case study of inverse problems, which all… ▽ More

    Submitted 20 February, 2023; v1 submitted 12 August, 2021; originally announced August 2021.

    Comments: 13 pages, 8 figures. First two and last two authors contributed each equally