Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–7 of 7 results for author: Kornaropoulos, E M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.15847  [pdf, other

    cs.CR cs.AI

    LLMmap: Fingerprinting For Large Language Models

    Authors: Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese

    Abstract: We introduce LLMmap, a first-generation fingerprinting attack targeted at LLM-integrated applications. LLMmap employs an active fingerprinting approach, sending carefully crafted queries to the application and analyzing the responses to identify the specific LLM model in use. With as few as 8 interactions, LLMmap can accurately identify LLMs with over 95% accuracy. More importantly, LLMmap is desi… ▽ More

    Submitted 24 July, 2024; v1 submitted 22 July, 2024; originally announced July 2024.

    Comments: version 0.1 (added missing refs)

  2. arXiv:2403.12433  [pdf, other

    cs.DB cs.CR

    Algorithmic Complexity Attacks on Dynamic Learned Indexes

    Authors: Rui Yang, Evgenios M. Kornaropoulos, Yue Cheng

    Abstract: Learned Index Structures (LIS) view a sorted index as a model that learns the data distribution, takes a data element key as input, and outputs the predicted position of the key. The original LIS can only handle lookup operations with no support for updates, rendering it impractical to use for typical workloads. To address this limitation, recent studies have focused on designing efficient dynamic… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: VLDB 2024

  3. arXiv:2011.09719  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    Adversarial Examples for $k$-Nearest Neighbor Classifiers Based on Higher-Order Voronoi Diagrams

    Authors: Chawin Sitawarin, Evgenios M. Kornaropoulos, Dawn Song, David Wagner

    Abstract: Adversarial examples are a widely studied phenomenon in machine learning models. While most of the attention has been focused on neural networks, other practical models also suffer from this issue. In this work, we propose an algorithm for evaluating the adversarial robustness of $k$-nearest neighbor classification, i.e., finding a minimum-norm adversarial example. Diverging from previous proposal… ▽ More

    Submitted 1 November, 2021; v1 submitted 19 November, 2020; originally announced November 2020.

    Comments: Appears at NeurIPS 2021. Code is available at https://github.com/wagner-group/geoadex

  4. arXiv:2008.00297  [pdf

    cs.CR cs.DB cs.DS cs.LG

    The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures

    Authors: Evgenios M. Kornaropoulos, Silei Ren, Roberto Tamassia

    Abstract: The concept of learned index structures relies on the idea that the input-output functionality of a database index can be viewed as a prediction task and, thus, be implemented using a machine learning model instead of traditional algorithmic techniques. This novel angle for a decades-old problem has inspired numerous exciting results in the intersection of machine learning and data structures. How… ▽ More

    Submitted 27 February, 2022; v1 submitted 1 August, 2020; originally announced August 2020.

    Comments: Preliminary version appeared in the Proceedings of the ACM International Conference on Management of Data 2022 (SIGMOD'22)

  5. arXiv:2007.02285  [pdf, other

    cs.CR cs.CY

    BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data Silos

    Authors: Xiaoyuan Liu, Ni Trieu, Evgenios M. Kornaropoulos, Dawn Song

    Abstract: Contact tracing is an important method to control the spread of an infectious disease such as COVID-19. However, existing contact tracing methods alone cannot provide sufficient coverage and do not successfully address privacy concerns of the participating entities. Current solutions do not utilize the huge volume of data stored in business databases and individual digital devices. This informatio… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

  6. arXiv:1509.02487  [pdf, ps, other

    cs.DS cs.LG

    Optimizing Static and Adaptive Probing Schedules for Rapid Event Detection

    Authors: Ahmad Mahmoody, Evgenios M. Kornaropoulos, Eli Upfal

    Abstract: We formulate and study a fundamental search and detection problem, Schedule Optimization, motivated by a variety of real-world applications, ranging from monitoring content changes on the web, social networks, and user activities to detecting failure on large systems with many individual machines. We consider a large system consists of many nodes, where each node has its own rate of generating n… ▽ More

    Submitted 9 September, 2015; v1 submitted 8 September, 2015; originally announced September 2015.

  7. arXiv:1108.1439  [pdf, other

    cs.DS math.CO

    Weak Dominance Drawings and Linear Extension Diameter

    Authors: Evgenios M. Kornaropoulos, Ioannis G. Tollis

    Abstract: We introduce the problem of Weak Dominance Drawing for general directed acyclic graphs and we show the connection with the linear extension diameter of a partial order P. We present complexity results and bounds.

    Submitted 5 August, 2011; originally announced August 2011.

    Comments: 7 pages