Skip to main content

Showing 1–6 of 6 results for author: Piet, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.18822  [pdf, other

    cs.CL

    Toxicity Detection for Free

    Authors: Zhanhao Hu, Julien Piet, Geng Zhao, Jiantao Jiao, David Wagner

    Abstract: Current LLMs are generally aligned to follow safety requirements and tend to refuse toxic prompts. However, LLMs can fail to refuse toxic prompts or be overcautious and refuse benign examples. In addition, state-of-the-art toxicity detectors have low TPRs at low FPR, incurring high costs in real-world applications where toxic examples are rare. In this paper, we explore Moderation Using LLM Intros… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

  2. arXiv:2402.06363  [pdf, other

    cs.CR

    StruQ: Defending Against Prompt Injection with Structured Queries

    Authors: Sizhe Chen, Julien Piet, Chawin Sitawarin, David Wagner

    Abstract: Recent advances in Large Language Models (LLMs) enable exciting LLM-integrated applications, which perform text-based tasks by utilizing their advanced language understanding capabilities. However, as LLMs have improved, so have the attacks against them. Prompt injection attacks are an important threat: they trick the model to deviate from the original application's instructions and instead follow… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

    Comments: prompt injections, LLM security

  3. arXiv:2312.17673  [pdf, other

    cs.CR cs.AI cs.CL

    Jatmo: Prompt Injection Defense by Task-Specific Finetuning

    Authors: Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David Wagner

    Abstract: Large Language Models (LLMs) are attracting significant research attention due to their instruction-following abilities, allowing users and developers to leverage LLMs for a variety of tasks. However, LLMs are vulnerable to prompt-injection attacks: a class of attacks that hijack the model's instruction-following abilities, changing responses to prompts to undesired, possibly malicious ones. In th… ▽ More

    Submitted 8 January, 2024; v1 submitted 29 December, 2023; originally announced December 2023.

    Comments: 24 pages, 6 figures

  4. arXiv:2312.00273  [pdf, other

    cs.CR cs.AI cs.CL

    Mark My Words: Analyzing and Evaluating Language Model Watermarks

    Authors: Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David Wagner

    Abstract: The capabilities of large language models have grown significantly in recent years and so too have concerns about their misuse. In this context, the ability to distinguish machine-generated text from human-authored content becomes important. Prior works have proposed numerous schemes to watermark text, which would benefit from a systematic evaluation framework. This work focuses on text watermarki… ▽ More

    Submitted 6 December, 2023; v1 submitted 30 November, 2023; originally announced December 2023.

    Comments: 18 pages, 11 figures

  5. arXiv:2302.01961  [pdf, other

    cs.LG

    Asymmetric Certified Robustness via Feature-Convex Neural Networks

    Authors: Samuel Pfrommer, Brendon G. Anderson, Julien Piet, Somayeh Sojoudi

    Abstract: Recent works have introduced input-convex neural networks (ICNNs) as learning models with advantageous training, inference, and generalization properties linked to their convex structure. In this paper, we propose a novel feature-convex neural network architecture as the composition of an ICNN with a Lipschitz feature map in order to achieve adversarial robustness. We consider the asymmetric binar… ▽ More

    Submitted 10 October, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: 37th Conference on Neural Information Processing Systems (NeurIPS 2023)

  6. arXiv:2203.15930  [pdf, other

    cs.CR

    Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value

    Authors: Julien Piet, Jaiden Fairoze, Nicholas Weaver

    Abstract: Cryptocurrency miners have great latitude in deciding which transactions they accept, including their own, and the order in which they accept them. Ethereum miners in particular use this flexibility to collect MEV-Miner Extractable Value-by structuring transactions to extract additional revenue. Ethereum also contains numerous bots that attempt to obtain MEV based on public-but-not-yet-confirmed t… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.