Skip to main content

Showing 1–50 of 76 results for author: Vechev, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14227  [pdf, other

    cs.PL

    Modular Synthesis of Efficient Quantum Uncomputation

    Authors: Hristo Venev, Timon Gehr, Dimitar Dimitrov, Martin Vechev

    Abstract: A key challenge of quantum programming is uncomputation: the reversible deallocation of qubits. And while there has been much recent progress on automating uncomputation, state-of-the-art methods are insufficient for handling today's expressive quantum programming languages. A core reason is that they operate on primitive quantum circuits, while quantum programs express computations beyond circuit… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

    Comments: 25 pages, 9 figures

    ACM Class: D.3.1

  2. arXiv:2406.12952  [pdf, other

    cs.SE cs.AI cs.LG

    Code Agents are State of the Art Software Testers

    Authors: Niels Mündler, Mark Niklas Müller, **gxuan He, Martin Vechev

    Abstract: Rigorous software testing is crucial for develo** and maintaining high-quality code, making automated test generation a promising avenue for both improving software quality and boosting the effectiveness of code generation methods. However, while code generation with Large Language Models (LLMs) is an extraordinarily active research area, test generation remains relatively unexplored. We address… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 20 pages, 14 figures, 7 tables

  3. arXiv:2406.07217  [pdf, other

    cs.LG cs.AI cs.CL

    A Synthetic Dataset for Personal Attribute Inference

    Authors: Hanna Yukhymenko, Robin Staab, Mark Vero, Martin Vechev

    Abstract: Recently, powerful Large Language Models (LLMs) have become easily accessible to hundreds of millions of users worldwide. However, their strong capabilities and vast world knowledge do not come without associated privacy risks. In this work, we focus on the emerging privacy threat LLMs pose - the ability to accurately infer personal information from online texts. Despite the growing importance of… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

  4. arXiv:2406.04848  [pdf, other

    cs.LG cs.AI

    CTBENCH: A Library and Benchmark for Certified Training

    Authors: Yuhao Mao, Stefan Balauca, Martin Vechev

    Abstract: Training certifiably robust neural networks is an important but challenging task. While many algorithms for (deterministic) certified training have been proposed, they are often evaluated on different training schedules, certification methods, and systematically under-tuned hyperparameters, making it difficult to compare their performance. To address this challenge, we introduce CTBENCH, a unified… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  5. arXiv:2405.18161  [pdf, other

    cs.LG cs.AI

    Back to the Drawing Board for Fair Representation Learning

    Authors: Angéline Pouget, Nikola Jovanović, Mark Vero, Robin Staab, Martin Vechev

    Abstract: The goal of Fair Representation Learning (FRL) is to mitigate biases in machine learning models by learning data representations that enable high accuracy on downstream tasks while minimizing discrimination based on sensitive attributes. The evaluation of FRL methods in many recent works primarily focuses on the tradeoff between downstream fairness and accuracy with respect to a single task that w… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  6. arXiv:2405.18137  [pdf, other

    cs.LG cs.AI cs.CR

    Exploiting LLM Quantization

    Authors: Kazuki Egashira, Mark Vero, Robin Staab, **gxuan He, Martin Vechev

    Abstract: Quantization leverages lower-precision weights to reduce the memory usage of large language models (LLMs) and is a key technique for enabling their deployment on commodity hardware. While LLM quantization's impact on utility has been extensively explored, this work for the first time studies its adverse effects from a security perspective. We reveal that widely used quantization methods can be exp… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  7. arXiv:2405.16281  [pdf, other

    cs.CL

    ConStat: Performance-Based Contamination Detection in Large Language Models

    Authors: Jasper Dekoninck, Mark Niklas Müller, Martin Vechev

    Abstract: Public benchmarks play an essential role in the evaluation of large language models. However, data contamination can lead to inflated performance, rendering them unreliable for model comparison. It is therefore crucial to detect contamination and estimate its impact on measured performance. Unfortunately, existing detection methods can be easily evaded and fail to quantify contamination. To overco… ▽ More

    Submitted 25 May, 2024; originally announced May 2024.

  8. arXiv:2405.15586  [pdf, other

    cs.LG cs.DC

    DAGER: Exact Gradient Inversion for Large Language Models

    Authors: Ivo Petrov, Dimitar I. Dimitrov, Maximilian Baader, Mark Niklas Müller, Martin Vechev

    Abstract: Federated learning works by aggregating locally computed gradients from multiple clients, thus enabling collaborative training without sharing private client data. However, prior work has shown that the data can actually be recovered by the server using so-called gradient inversion attacks. While these attacks perform well when applied on images, they are limited in the text domain and only permit… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    ACM Class: I.2.7; I.2.11

  9. arXiv:2404.10618  [pdf, other

    cs.AI cs.CV cs.LG

    Private Attribute Inference from Images with Vision-Language Models

    Authors: Batuhan Tömekçe, Mark Vero, Robin Staab, Martin Vechev

    Abstract: As large language models (LLMs) become ubiquitous in our daily tasks and digital interactions, associated privacy risks are increasingly in focus. While LLM privacy research has primarily focused on the leakage of model training data, it has recently been shown that the increase in models' capabilities has enabled LLMs to make accurate privacy-infringing inferences from previously unseen texts. Wi… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  10. arXiv:2403.07095  [pdf, other

    cs.LG

    Overcoming the Paradox of Certified Training with Gaussian Smoothing

    Authors: Stefan Balauca, Mark Niklas Müller, Yuhao Mao, Maximilian Baader, Marc Fischer, Martin Vechev

    Abstract: Training neural networks with high certified accuracy against adversarial examples remains an open problem despite significant efforts. While certification methods can effectively leverage tight convex relaxations for bound computation, in training, these methods perform worse than looser relaxations. Prior work hypothesized that this is caused by the discontinuity and perturbation sensitivity of… ▽ More

    Submitted 25 June, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

  11. arXiv:2403.06988  [pdf, other

    cs.LG cs.CL

    Guiding LLMs The Right Way: Fast, Non-Invasive Constrained Generation

    Authors: Luca Beurer-Kellner, Marc Fischer, Martin Vechev

    Abstract: To ensure that text generated by large language models (LLMs) is in an expected format, constrained decoding proposes to enforce strict formal language constraints during generation. However, as we show in this work, not only do such methods incur performance overhead during generation, but many of them also significantly impair task accuracy, if they do not correctly align the underlying LLM sub-… ▽ More

    Submitted 7 February, 2024; originally announced March 2024.

  12. arXiv:2403.03945  [pdf, other

    cs.LG cs.CR cs.DC

    SPEAR:Exact Gradient Inversion of Batches in Federated Learning

    Authors: Dimitar I. Dimitrov, Maximilian Baader, Mark Niklas Müller, Martin Vechev

    Abstract: Federated learning is a framework for collaborative machine learning where clients only share gradient updates and not their private data with a server. However, it was recently shown that gradient inversion attacks can reconstruct this data from the shared gradients. In the important honest-but-curious setting, existing attacks enable exact reconstruction only for a batch size of $b=1$, with larg… ▽ More

    Submitted 3 June, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    ACM Class: I.2.11

  13. arXiv:2402.19361  [pdf, other

    cs.LG cs.AI cs.CR

    Watermark Stealing in Large Language Models

    Authors: Nikola Jovanović, Robin Staab, Martin Vechev

    Abstract: LLM watermarking has attracted attention as a promising way to detect AI-generated content, with some works suggesting that current schemes may already be fit for deployment. In this work we dispute this claim, identifying watermark stealing (WS) as a fundamental vulnerability of these schemes. We show that querying the API of the watermarked LLM to approximately reverse-engineer a watermark enabl… ▽ More

    Submitted 24 June, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

    Comments: ICML 2024

  14. arXiv:2402.13846  [pdf, other

    cs.AI cs.CL cs.CR

    Large Language Models are Advanced Anonymizers

    Authors: Robin Staab, Mark Vero, Mislav Balunović, Martin Vechev

    Abstract: Recent work in privacy research on large language models has shown that they achieve near human-level performance at inferring personal data from real-world online texts. With consistently increasing model capabilities, existing text anonymization methods are currently lacking behind regulatory requirements and adversarial threats. This raises the question of how individuals can effectively protec… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    ACM Class: I.2.7

  15. arXiv:2402.13291  [pdf, other

    cs.CR cs.LG cs.PL cs.SE

    DeepCode AI Fix: Fixing Security Vulnerabilities with Large Language Models

    Authors: Berkay Berabi, Alexey Gronskiy, Veselin Raychev, Gishor Sivanrupan, Victor Chibotaru, Martin Vechev

    Abstract: The automated program repair field has attracted substantial interest over the years, but despite significant research efforts, creating a system that works well for complex semantic bugs such as security vulnerabilities has proven difficult. A promising direction to solve this challenge is by leveraging large language models (LLMs), which are increasingly used to solve various programming tasks.… ▽ More

    Submitted 23 February, 2024; v1 submitted 19 February, 2024; originally announced February 2024.

    Comments: 26 pages, 13 figures (v2, small fix in author affiliations)

  16. arXiv:2402.09497  [pdf, other

    cs.CR cs.AI cs.LG cs.SE

    Instruction Tuning for Secure Code Generation

    Authors: **gxuan He, Mark Vero, Gabriela Krasnopolska, Martin Vechev

    Abstract: Modern language models (LMs) have gained widespread acceptance in everyday and professional contexts, particularly in programming. An essential procedure enabling this adoption is instruction tuning, which substantially enhances LMs' practical utility by training them to follow user instructions and human preferences. However, existing instruction tuning schemes overlook a crucial aspect: the secu… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

  17. arXiv:2402.02823  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    Evading Data Contamination Detection for Language Models is (too) Easy

    Authors: Jasper Dekoninck, Mark Niklas Müller, Maximilian Baader, Marc Fischer, Martin Vechev

    Abstract: Large language models are widespread, with their performance on benchmarks frequently guiding user preferences for one model over another. However, the vast amount of data these models are trained on can inadvertently lead to contamination with public benchmarks, thus compromising performance measurements. While recently developed contamination detection methods try to address this issue, they ove… ▽ More

    Submitted 12 February, 2024; v1 submitted 5 February, 2024; originally announced February 2024.

  18. arXiv:2401.02430  [pdf, other

    cs.CV cs.AI cs.LG

    Automated Classification of Model Errors on ImageNet

    Authors: Momchil Peychev, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: While the ImageNet dataset has been driving computer vision research over the past decade, significant label noise and ambiguity have made top-1 accuracy an insufficient measure of further progress. To address this, new label-sets and evaluation protocols have been proposed for ImageNet showing that state-of-the-art models already achieve over 95% accuracy and shifting the focus on investigating w… ▽ More

    Submitted 13 November, 2023; originally announced January 2024.

    Comments: NeurIPS 2023

  19. arXiv:2311.14479  [pdf, other

    cs.CL

    Controlled Text Generation via Language Model Arithmetic

    Authors: Jasper Dekoninck, Marc Fischer, Luca Beurer-Kellner, Martin Vechev

    Abstract: As Large Language Models (LLMs) are deployed more widely, customization with respect to vocabulary, style, and character becomes more important. In this work, we introduce model arithmetic, a novel inference framework for composing and biasing LLMs without the need for model (re)training or highly specific datasets. In addition, the framework allows for more precise control of generated text than… ▽ More

    Submitted 6 March, 2024; v1 submitted 24 November, 2023; originally announced November 2023.

  20. arXiv:2311.10500  [pdf, other

    cs.LG cs.AI cs.CR

    From Principle to Practice: Vertical Data Minimization for Machine Learning

    Authors: Robin Staab, Nikola Jovanović, Mislav Balunović, Martin Vechev

    Abstract: Aiming to train and deploy predictive models, organizations collect large amounts of detailed client data, risking the exposure of private information in the event of a breach. To mitigate this, policymakers increasingly demand compliance with the data minimization (DM) principle, restricting data collection to only that data which is relevant and necessary for the task. Despite regulatory pressur… ▽ More

    Submitted 22 November, 2023; v1 submitted 17 November, 2023; originally announced November 2023.

    Comments: Accepted at IEEE S&P 2024

  21. arXiv:2311.04954  [pdf, other

    cs.CL cs.AI

    Prompt Sketching for Large Language Models

    Authors: Luca Beurer-Kellner, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: Many recent prompting strategies for large language models (LLMs) query the model multiple times sequentially -- first to produce intermediate results and then the final answer. However, using these methods, both decoder and model are unaware of potential follow-up prompts, leading to disconnected and undesirably wordy intermediate responses. In this work, we address this issue by proposing prompt… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  22. arXiv:2311.04015  [pdf, ps, other

    cs.LG cs.AI

    Expressivity of ReLU-Networks under Convex Relaxations

    Authors: Maximilian Baader, Mark Niklas Müller, Yuhao Mao, Martin Vechev

    Abstract: Convex relaxations are a key component of training and certifying provably safe neural networks. However, despite substantial progress, a wide and poorly understood accuracy gap to standard networks remains, raising the question of whether this is due to fundamental limitations of convex relaxations. Initial work investigating this question focused on the simple and widely used IBP relaxation. It… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  23. arXiv:2310.07298  [pdf, other

    cs.AI cs.LG

    Beyond Memorization: Violating Privacy Via Inference with Large Language Models

    Authors: Robin Staab, Mark Vero, Mislav Balunović, Martin Vechev

    Abstract: Current privacy research on large language models (LLMs) primarily focuses on the issue of extracting memorized training data. At the same time, models' inference capabilities have increased drastically. This raises the key question of whether current LLMs could violate individuals' privacy by inferring personal attributes from text given at inference time. In this work, we present the first compr… ▽ More

    Submitted 6 May, 2024; v1 submitted 11 October, 2023; originally announced October 2023.

    ACM Class: I.2.7

  24. arXiv:2307.03577  [pdf, other

    cs.LG cs.DB cs.PL

    CuTS: Customizable Tabular Synthetic Data Generation

    Authors: Mark Vero, Mislav Balunović, Martin Vechev

    Abstract: Privacy, data quality, and data sharing concerns pose a key limitation for tabular data applications. While generating synthetic data resembling the original distribution addresses some of these issues, most applications would benefit from additional customization on the generated data. However, existing synthetic data approaches are limited to particular constraints, e.g., differential privacy (D… ▽ More

    Submitted 2 June, 2024; v1 submitted 7 July, 2023; originally announced July 2023.

  25. arXiv:2306.10426  [pdf, other

    cs.LG cs.AI

    Understanding Certified Training with Interval Bound Propagation

    Authors: Yuhao Mao, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: As robustness verification methods are becoming more precise, training certifiably robust neural networks is becoming ever more relevant. To this end, certified training methods compute and then optimize an upper bound on the worst-case loss over a robustness specification. Curiously, training methods based on the imprecise interval bound propagation (IBP) consistently outperform those leveraging… ▽ More

    Submitted 27 February, 2024; v1 submitted 17 June, 2023; originally announced June 2023.

    Comments: ICLR'24

  26. arXiv:2306.03013  [pdf, other

    cs.CR cs.LG

    Hiding in Plain Sight: Disguising Data Stealing Attacks in Federated Learning

    Authors: Kostadin Garov, Dimitar I. Dimitrov, Nikola Jovanović, Martin Vechev

    Abstract: Malicious server (MS) attacks have enabled the scaling of data stealing in federated learning to large batch sizes and secure aggregation, settings previously considered private. However, many concerns regarding the client-side detectability of MS attacks were raised, questioning their practicality. In this work, for the first time, we thoroughly study client-side detectability. We first demonstra… ▽ More

    Submitted 15 April, 2024; v1 submitted 5 June, 2023; originally announced June 2023.

    ACM Class: I.2.11

  27. arXiv:2305.16272  [pdf, other

    cs.LG cs.GT stat.ML

    Incentivizing Honesty among Competitors in Collaborative Learning and Optimization

    Authors: Florian E. Dorner, Nikola Konstantinov, Georgi Pashaliev, Martin Vechev

    Abstract: Collaborative learning techniques have the potential to enable training machine learning models that are superior to models trained on a single entity's data. However, in many cases, potential participants in such collaborative schemes are competitors on a downstream task, such as firms that each aim to attract customers by providing the best recommendations. This can incentivize dishonest updates… ▽ More

    Submitted 30 October, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: NeurIPS 2023 Camera Ready; 37 pages, 5 figures

  28. arXiv:2305.15852  [pdf, other

    cs.CL cs.AI cs.LG

    Self-contradictory Hallucinations of Large Language Models: Evaluation, Detection and Mitigation

    Authors: Niels Mündler, **gxuan He, Slobodan Jenko, Martin Vechev

    Abstract: Large language models (large LMs) are susceptible to producing text that contains hallucinated content. An important instance of this problem is self-contradiction, where the LM generates two contradictory sentences within the same context. In this work, we present a comprehensive investigation into self-contradiction for various instruction-tuned LMs, covering evaluation, detection, and mitigatio… ▽ More

    Submitted 15 March, 2024; v1 submitted 25 May, 2023; originally announced May 2023.

  29. arXiv:2305.04574  [pdf, other

    cs.LG

    TAPS: Connecting Certified and Adversarial Training

    Authors: Yuhao Mao, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: Training certifiably robust neural networks remains a notoriously hard problem. On one side, adversarial training optimizes under-approximations of the worst-case loss, which leads to insufficient regularization for certification, while on the other, sound certified training methods optimize loose over-approximations, leading to over-regularization and poor (standard) accuracy. In this work we pro… ▽ More

    Submitted 25 October, 2023; v1 submitted 8 May, 2023; originally announced May 2023.

    Comments: NeuIPS'23

  30. Abstraqt: Analysis of Quantum Circuits via Abstract Stabilizer Simulation

    Authors: Benjamin Bichsel, Anouk Paradis, Maximilian Baader, Martin Vechev

    Abstract: Stabilizer simulation can efficiently simulate an important class of quantum circuits consisting exclusively of Clifford gates. However, all existing extensions of this simulation to arbitrary quantum circuits including non-Clifford gates suffer from an exponential runtime. To address this challenge, we present a novel approach for efficient stabilizer simulation on arbitrary quantum circuits, a… ▽ More

    Submitted 14 November, 2023; v1 submitted 3 April, 2023; originally announced April 2023.

    Comments: 22 pages

    Journal ref: Quantum 7, 1185 (2023)

  31. arXiv:2303.05246  [pdf, other

    cs.LG cs.AI

    Efficient Certified Training and Robustness Verification of Neural ODEs

    Authors: Mustafa Zeqiri, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: Neural Ordinary Differential Equations (NODEs) are a novel neural architecture, built around initial value problems with learned dynamics which are solved during inference. Thought to be inherently more robust against adversarial perturbations, they were recently shown to be vulnerable to strong adversarial attacks, highlighting the need for formal guarantees. However, despite significant progress… ▽ More

    Submitted 9 March, 2023; originally announced March 2023.

    Comments: Accepted at ICLR23

  32. arXiv:2302.05319  [pdf, other

    cs.CR cs.LG cs.PL cs.SE

    Large Language Models for Code: Security Hardening and Adversarial Testing

    Authors: **gxuan He, Martin Vechev

    Abstract: Large language models (large LMs) are increasingly trained on massive codebases and used to generate code. However, LMs lack awareness of security and are found to frequently produce unsafe code. This work studies the security of LMs along two important axes: (i) security hardening, which aims to enhance LMs' reliability in generating secure code, and (ii) adversarial testing, which seeks to evalu… ▽ More

    Submitted 29 September, 2023; v1 submitted 10 February, 2023; originally announced February 2023.

    Comments: Accepted to ACM CCS 2023

  33. arXiv:2212.10154  [pdf, other

    cs.CL cs.AI cs.CY cs.LG

    Human-Guided Fair Classification for Natural Language Processing

    Authors: Florian E. Dorner, Momchil Peychev, Nikola Konstantinov, Naman Goel, Elliott Ash, Martin Vechev

    Abstract: Text classifiers have promising applications in high-stake tasks such as resume screening and content moderation. These classifiers must be fair and avoid discriminatory decisions by being invariant to perturbations of sensitive attributes such as gender or ethnicity. However, there is a gap between human intuition about these perturbations and the formal similarity specifications capturing them.… ▽ More

    Submitted 16 March, 2023; v1 submitted 20 December, 2022; originally announced December 2022.

    Comments: Published at ICLR 2023 (notable top 25%). 30 pages, 1 figure

  34. arXiv:2212.06094  [pdf, other

    cs.CL cs.AI

    Prompting Is Programming: A Query Language for Large Language Models

    Authors: Luca Beurer-Kellner, Marc Fischer, Martin Vechev

    Abstract: Large language models have demonstrated outstanding performance on a wide range of tasks such as question answering and code generation. On a high level, given an input, a language model can be used to automatically complete the sequence in a statistically-likely way. Based on this, users prompt these models with language instructions or examples, to implement a variety of downstream tasks. Advanc… ▽ More

    Submitted 30 May, 2023; v1 submitted 12 December, 2022; originally announced December 2022.

    Comments: To be published at PLDI'23: 44th ACM SIGPLAN International Conference on Programming Language Design and Implementation

  35. arXiv:2211.01980  [pdf, other

    cs.NI cs.LG

    Learning to Configure Computer Networks with Neural Algorithmic Reasoning

    Authors: Luca Beurer-Kellner, Martin Vechev, Laurent Vanbever, Petar Veličković

    Abstract: We present a new method for scaling automatic configuration of computer networks. The key idea is to relax the computationally hard search problem of finding a configuration that satisfies a given specification into an approximate objective amenable to learning-based techniques. Based on this idea, we train a neural algorithmic model which learns to generate configurations likely to (fully or part… ▽ More

    Submitted 26 October, 2022; originally announced November 2022.

  36. arXiv:2210.15614  [pdf, other

    cs.LG cs.AI cs.CR

    Private and Reliable Neural Network Inference

    Authors: Nikola Jovanović, Marc Fischer, Samuel Steffen, Martin Vechev

    Abstract: Reliable neural networks (NNs) provide important inference-time reliability guarantees such as fairness and robustness. Complementarily, privacy-preserving NN inference protects the privacy of client data. So far these two emerging areas have been largely disconnected, yet their combination will be increasingly important. In this work, we present the first system which enables privacy-preserving i… ▽ More

    Submitted 27 October, 2022; originally announced October 2022.

    Comments: In ACM Conference on Computer and Communications Security (CCS 2022)

  37. arXiv:2210.07213  [pdf, other

    cs.LG cs.AI cs.CY

    FARE: Provably Fair Representation Learning with Practical Certificates

    Authors: Nikola Jovanović, Mislav Balunović, Dimitar I. Dimitrov, Martin Vechev

    Abstract: Fair representation learning (FRL) is a popular class of methods aiming to produce fair classifiers via data preprocessing. Recent regulatory directives stress the need for FRL methods that provide practical certificates, i.e., provable upper bounds on the unfairness of any downstream classifier trained on preprocessed data, which directly provides assurance in a practical scenario. Creating such… ▽ More

    Submitted 8 June, 2023; v1 submitted 13 October, 2022; originally announced October 2022.

    Comments: ICML 2023

  38. arXiv:2210.04871  [pdf, other

    cs.LG cs.CR

    Certified Training: Small Boxes are All You Need

    Authors: Mark Niklas Müller, Franziska Eckert, Marc Fischer, Martin Vechev

    Abstract: To obtain, deterministic guarantees of adversarial robustness, specialized training methods are used. We propose, SABR, a novel such certified training method, based on the key insight that propagating interval bounds for a small but carefully selected subset of the adversarial input region is sufficient to approximate the worst-case loss over the whole region while significantly reducing approxim… ▽ More

    Submitted 9 March, 2023; v1 submitted 10 October, 2022; originally announced October 2022.

    Comments: Accepted at ICLR23 as Spotlight

  39. arXiv:2210.01785  [pdf, other

    cs.LG cs.CR cs.DC

    TabLeak: Tabular Data Leakage in Federated Learning

    Authors: Mark Vero, Mislav Balunović, Dimitar I. Dimitrov, Martin Vechev

    Abstract: While federated learning (FL) promises to preserve privacy, recent works in the image and text domains have shown that training updates leak private client data. However, most high-stakes applications of FL (e.g., in healthcare and finance) use tabular data, where the risk of data leakage has not yet been explored. A successful attack for tabular data must address two key challenges unique to the… ▽ More

    Submitted 7 July, 2023; v1 submitted 4 October, 2022; originally announced October 2022.

    ACM Class: I.2.11

  40. arXiv:2206.12395  [pdf, other

    cs.LG cs.CR cs.DC

    Data Leakage in Federated Averaging

    Authors: Dimitar I. Dimitrov, Mislav Balunović, Nikola Konstantinov, Martin Vechev

    Abstract: Recent attacks have shown that user data can be recovered from FedSGD updates, thus breaking privacy. However, these attacks are of limited practical relevance as federated learning typically uses the FedAvg algorithm. Compared to FedSGD, recovering data from FedAvg updates is much harder as: (i) the updates are computed at unobserved intermediate network weights, (ii) a large number of batches ar… ▽ More

    Submitted 1 November, 2022; v1 submitted 24 June, 2022; originally announced June 2022.

    ACM Class: I.2.11

  41. arXiv:2205.13909  [pdf, other

    cs.LG cs.AI cs.CR

    (De-)Randomized Smoothing for Decision Stump Ensembles

    Authors: Miklós Z. Horváth, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: Tree-based models are used in many high-stakes application domains such as finance and medicine, where robustness and interpretability are of utmost importance. Yet, methods for improving and certifying their robustness are severely under-explored, in contrast to those focusing on neural networks. Targeting this important challenge, we propose deterministic smoothing for decision stump ensembles.… ▽ More

    Submitted 14 November, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: NeurIPS 2022 Paper

  42. arXiv:2205.00263  [pdf, other

    cs.LG cs.SE

    Complete Verification via Multi-Neuron Relaxation Guided Branch-and-Bound

    Authors: Claudio Ferrari, Mark Niklas Muller, Nikola Jovanovic, Martin Vechev

    Abstract: State-of-the-art neural network verifiers are fundamentally based on one of two paradigms: either encoding the whole verification problem via tight multi-neuron convex relaxations or applying a Branch-and-Bound (BaB) procedure leveraging imprecise but fast bounding methods on a large number of easier subproblems. The former can capture complex multi-neuron dependencies but sacrifices completeness… ▽ More

    Submitted 30 April, 2022; originally announced May 2022.

  43. arXiv:2204.10049  [pdf, other

    cs.LG cs.PL cs.SE

    On Distribution Shift in Learning-based Bug Detectors

    Authors: **gxuan He, Luca Beurer-Kellner, Martin Vechev

    Abstract: Deep learning has recently achieved initial success in program analysis tasks such as bug detection. Lacking real bugs, most existing works construct training and test data by injecting synthetic bugs into correct programs. Despite achieving high test accuracy (e.g., 90%), the resulting bug detectors are found to be surprisingly unusable in practice, i.e., <10% precision when used to scan real sof… ▽ More

    Submitted 19 June, 2022; v1 submitted 21 April, 2022; originally announced April 2022.

  44. arXiv:2204.00487  [pdf, other

    cs.LG cs.AI cs.CR

    Robust and Accurate -- Compositional Architectures for Randomized Smoothing

    Authors: Miklós Z. Horváth, Mark Niklas Müller, Marc Fischer, Martin Vechev

    Abstract: Randomized Smoothing (RS) is considered the state-of-the-art approach to obtain certifiably robust models for challenging tasks. However, current RS approaches drastically decrease standard accuracy on unperturbed data, severely limiting their real-world utility. To address this limitation, we propose a compositional architecture, ACES, which certifiably decides on a per-sample basis whether to us… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: Presented at the ICLR 2022 Workshop on Socially Responsible Machine Learning

  45. arXiv:2202.08827  [pdf, other

    cs.LG cs.DC

    LAMP: Extracting Text from Gradients with Language Model Priors

    Authors: Mislav Balunović, Dimitar I. Dimitrov, Nikola Jovanović, Martin Vechev

    Abstract: Recent work shows that sensitive user data can be reconstructed from gradient updates, breaking the key privacy promise of federated learning. While success was demonstrated primarily on image data, these methods do not directly transfer to other domains such as text. In this work, we propose LAMP, a novel attack tailored to textual data, that successfully reconstructs original text from gradients… ▽ More

    Submitted 19 October, 2022; v1 submitted 17 February, 2022; originally announced February 2022.

    ACM Class: I.2.7; I.2.11

  46. arXiv:2112.05235  [pdf, other

    cs.LG cs.AI

    The Fundamental Limits of Interval Arithmetic for Neural Networks

    Authors: Matthew Mirman, Maximilian Baader, Martin Vechev

    Abstract: Interval analysis (or interval bound propagation, IBP) is a popular technique for verifying and training provably robust deep neural networks, a fundamental challenge in the area of reliable machine learning. However, despite substantial efforts, progress on addressing this key challenge has stagnated, calling into question whether interval arithmetic is a viable path forward. In this paper we p… ▽ More

    Submitted 9 December, 2021; originally announced December 2021.

    MSC Class: 68T07

  47. arXiv:2111.13650  [pdf, ps, other

    cs.LG cs.AI cs.CV

    Latent Space Smoothing for Individually Fair Representations

    Authors: Momchil Peychev, Anian Ruoss, Mislav Balunović, Maximilian Baader, Martin Vechev

    Abstract: Fair representation learning transforms user data into a representation that ensures fairness and utility regardless of the downstream application. However, learning individually fair representations, i.e., guaranteeing that similar individuals are treated similarly, remains challenging in high-dimensional settings such as computer vision. In this work, we introduce LASSI, the first representation… ▽ More

    Submitted 26 July, 2022; v1 submitted 26 November, 2021; originally announced November 2021.

    Comments: ECCV 2022

  48. arXiv:2111.04706  [pdf, other

    cs.LG cs.CR

    Bayesian Framework for Gradient Leakage

    Authors: Mislav Balunović, Dimitar I. Dimitrov, Robin Staab, Martin Vechev

    Abstract: Federated learning is an established method for training machine learning models without sharing training data. However, recent work has shown that it cannot guarantee data privacy as shared gradients can still leak sensitive information. To formalize the problem of gradient leakage, we propose a theoretical framework that enables, for the first time, analysis of the Bayes optimal adversary phrase… ▽ More

    Submitted 17 March, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

  49. arXiv:2110.08260  [pdf, other

    cs.LG cs.AI

    Abstract Interpretation of Fixpoint Iterators with Applications to Neural Networks

    Authors: Mark Niklas Müller, Marc Fischer, Robin Staab, Martin Vechev

    Abstract: We present a new abstract interpretation framework for the precise over-approximation of numerical fixpoint iterators. Our key observation is that unlike in standard abstract interpretation (AI), typically used to over-approximate all reachable program states, in this setting, one only needs to abstract the concrete fixpoints, i.e., the final program states. Our framework targets numerical fixpoin… ▽ More

    Submitted 26 April, 2023; v1 submitted 14 October, 2021; originally announced October 2021.

    Comments: PLDI'23: 44th ACM SIGPLAN International Conference on Programming Language Design and Implementation

  50. arXiv:2109.00542  [pdf, other

    cs.LG cs.CR

    Shared Certificates for Neural Network Verification

    Authors: Marc Fischer, Christian Sprecher, Dimitar I. Dimitrov, Gagandeep Singh, Martin Vechev

    Abstract: Existing neural network verifiers compute a proof that each input is handled correctly under a given perturbation by propagating a symbolic abstraction of reachable values at each layer. This process is repeated from scratch independently for each input (e.g., image) and perturbation (e.g., rotation), leading to an expensive overall proof effort when handling an entire dataset. In this work, we in… ▽ More

    Submitted 23 November, 2023; v1 submitted 1 September, 2021; originally announced September 2021.

    Comments: Extended version of our CAV'22 paper