Skip to main content

Showing 1–8 of 8 results for author: Gubri, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.05973  [pdf, other

    cs.CL cs.AI cs.LG

    Calibrating Large Language Models Using Their Generations Only

    Authors: Dennis Ulmer, Martin Gubri, Hwaran Lee, Sangdoo Yun, Seong Joon Oh

    Abstract: As large language models (LLMs) are increasingly deployed in user-facing applications, building trust and maintaining safety by accurately quantifying a model's confidence in its prediction becomes even more important. However, finding effective ways to calibrate LLMs - especially when the only interface to the models is their generated text - remains a challenge. We propose APRICOT (auxiliary pre… ▽ More

    Submitted 9 March, 2024; originally announced March 2024.

  2. arXiv:2402.12991  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    TRAP: Targeted Random Adversarial Prompt Honeypot for Black-Box Identification

    Authors: Martin Gubri, Dennis Ulmer, Hwaran Lee, Sangdoo Yun, Seong Joon Oh

    Abstract: Large Language Model (LLM) services and models often come with legal rules on who can use them and how they must use them. Assessing the compliance of the released LLMs is crucial, as these rules protect the interests of the LLM contributor and prevent misuse. In this context, we describe the novel fingerprinting problem of Black-box Identity Verification (BBIV). The goal is to determine whether a… ▽ More

    Submitted 6 June, 2024; v1 submitted 20 February, 2024; originally announced February 2024.

    Comments: Accepted at ACL 2024 (findings)

  3. arXiv:2307.01881  [pdf, other

    cs.CR cs.CL

    ProPILE: Probing Privacy Leakage in Large Language Models

    Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh

    Abstract: The rapid advancement and widespread use of large language models (LLMs) have raised significant concerns regarding the potential leakage of personally identifiable information (PII). These models are often trained on vast quantities of web-collected data, which may inadvertently include sensitive personal data. This paper presents ProPILE, a novel probing tool designed to empower data subjects, o… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

  4. arXiv:2304.02688  [pdf, other

    cs.LG cs.CV stat.ML

    Going Further: Flatness at the Rescue of Early Stop** for Adversarial Example Transferability

    Authors: Martin Gubri, Maxime Cordy, Yves Le Traon

    Abstract: Transferability is the property of adversarial examples to be misclassified by other models than the surrogate model for which they were crafted. Previous research has shown that early stop** the training of the surrogate model substantially increases transferability. A common hypothesis to explain this is that deep neural networks (DNNs) first learn robust features, which are more generic, thus… ▽ More

    Submitted 20 February, 2024; v1 submitted 5 April, 2023; originally announced April 2023.

    Comments: Version 2: originally submitted in April 2023 and revised in February 2024

  5. arXiv:2207.13129  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity

    Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen

    Abstract: We propose transferability from Large Geometric Vicinity (LGV), a new technique to increase the transferability of black-box adversarial attacks. LGV starts from a pretrained surrogate model and collects multiple weight sets from a few additional training epochs with a constant and high learning rate. LGV exploits two geometric properties that we relate to transferability. First, models that belon… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

    Comments: Accepted at ECCV 2022

  6. Influence-Driven Data Poisoning in Graph-Based Semi-Supervised Classifiers

    Authors: Adriano Franci, Maxime Cordy, Martin Gubri, Mike Papadakis, Yves Le Traon

    Abstract: Graph-based Semi-Supervised Learning (GSSL) is a practical solution to learn from a limited amount of labelled data together with a vast amount of unlabelled data. However, due to their reliance on the known labels to infer the unknown labels, these algorithms are sensitive to data quality. It is therefore essential to study the potential threats related to the labelled data, more specifically, la… ▽ More

    Submitted 11 May, 2022; v1 submitted 14 December, 2020; originally announced December 2020.

  7. arXiv:2011.05074  [pdf, other

    cs.LG stat.ML

    Efficient and Transferable Adversarial Examples from Bayesian Neural Networks

    Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen

    Abstract: An established way to improve the transferability of black-box evasion attacks is to craft the adversarial examples on an ensemble-based surrogate to increase diversity. We argue that transferability is fundamentally related to uncertainty. Based on a state-of-the-art Bayesian Deep Learning technique, we propose a new method to efficiently build a surrogate by sampling approximately from the poste… ▽ More

    Submitted 18 June, 2022; v1 submitted 10 November, 2020; originally announced November 2020.

    Comments: Accepted at UAI 2022

  8. arXiv:1801.01953  [pdf, other

    stat.ML cs.LG

    Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression

    Authors: Martin Gubri

    Abstract: Machine Learning models have been shown to be vulnerable to adversarial examples, ie. the manipulation of data by a attacker to defeat a defender's classifier at test time. We present a novel probabilistic definition of adversarial examples in perfect or limited knowledge setting using prior probability distributions on the defender's classifier. Using the asymptotic properties of the logistic reg… ▽ More

    Submitted 5 January, 2018; originally announced January 2018.