Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–22 of 22 results for author: Lowd, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.11072  [pdf, other

    cs.CR cs.AI

    MaPPing Your Model: Assessing the Impact of Adversarial Attacks on LLM-based Programming Assistants

    Authors: John Heibel, Daniel Lowd

    Abstract: LLM-based programming assistants offer the promise of programming faster but with the risk of introducing more security vulnerabilities. Prior work has studied how LLMs could be maliciously fine-tuned to suggest vulnerabilities more often. With the rise of agentic LLMs, which may use results from an untrusted third party, there is a growing risk of attacks on the model's prompt. We introduce the M… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

    Comments: 6 pages, 5 figures, Proceedings of the ICML 2024 Workshop on Trustworthy Multimodal Foundation Models and AI Agents

    ACM Class: I.2.2

  2. arXiv:2310.18603  [pdf, other

    cs.LG

    Large Language Models Are Better Adversaries: Exploring Generative Clean-Label Backdoor Attacks Against Text Classifiers

    Authors: Wencong You, Zayd Hammoudeh, Daniel Lowd

    Abstract: Backdoor attacks manipulate model predictions by inserting innocuous triggers into training and test data. We focus on more realistic and more challenging clean-label attacks where the adversarial training examples are correctly labeled. Our attack, LLMBkd, leverages language models to automatically insert diverse style-based triggers into texts. We also propose a poison selection technique to imp… ▽ More

    Submitted 28 October, 2023; originally announced October 2023.

    Comments: Accepted at EMNLP 2023 Findings

  3. Provable Robustness Against a Union of $\ell_0$ Adversarial Attacks

    Authors: Zayd Hammoudeh, Daniel Lowd

    Abstract: Sparse or $\ell_0$ adversarial attacks arbitrarily perturb an unknown subset of the features. $\ell_0$ robustness analysis is particularly well-suited for heterogeneous (tabular) data where features have different types or scales. State-of-the-art $\ell_0$ certified defenses are based on randomized smoothing and apply to evasion attacks only. This paper proposes feature partition aggregation (FPA)… ▽ More

    Submitted 6 April, 2024; v1 submitted 22 February, 2023; originally announced February 2023.

    Comments: Accepted at AAAI 2024 -- Extended version including the supplementary material

  4. Training Data Influence Analysis and Estimation: A Survey

    Authors: Zayd Hammoudeh, Daniel Lowd

    Abstract: Good models require good training data. For overparameterized deep models, the causal relationship between training data and model predictions is increasingly opaque and poorly understood. Influence analysis partially demystifies training's underlying interactions by quantifying the amount each training instance alters the final model. Measuring the training data's influence exactly can be provabl… ▽ More

    Submitted 29 March, 2024; v1 submitted 8 December, 2022; originally announced December 2022.

    Comments: Published in Springer journal "Machine Learning"

    Journal ref: Machine Learning (2024)

  5. arXiv:2210.12233  [pdf, other

    cs.LG

    TCAB: A Large-Scale Text Classification Attack Benchmark

    Authors: Kalyani Asthana, Zhouhang Xie, Wencong You, Adam Noack, Jonathan Brophy, Sameer Singh, Daniel Lowd

    Abstract: We introduce the Text Classification Attack Benchmark (TCAB), a dataset for analyzing, understanding, detecting, and labeling adversarial attacks against text classifiers. TCAB includes 1.5 million attack instances, generated by twelve adversarial attacks targeting three classifiers trained on six source datasets for sentiment analysis and abuse detection in English. Unlike standard text classific… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 32 pages, 7 figures, and 14 tables

  6. arXiv:2208.13904  [pdf, other

    cs.LG cs.CR stat.ML

    Reducing Certified Regression to Certified Classification for General Poisoning Attacks

    Authors: Zayd Hammoudeh, Daniel Lowd

    Abstract: Adversarial training instances can severely distort a model's behavior. This work investigates certified regression defenses, which provide guaranteed limits on how much a regressor's prediction may change under a poisoning attack. Our key insight is that certified regression reduces to voting-based certified classification when using median as a model's primary decision function. Coupling our red… ▽ More

    Submitted 28 December, 2022; v1 submitted 29 August, 2022; originally announced August 2022.

    Comments: Accepted at the 1st IEEE conference on Secure and Trustworthy Machine Learning (SaTML'23)

  7. arXiv:2205.11412  [pdf, other

    cs.LG

    Instance-Based Uncertainty Estimation for Gradient-Boosted Regression Trees

    Authors: Jonathan Brophy, Daniel Lowd

    Abstract: Gradient-boosted regression trees (GBRTs) are hugely popular for solving tabular regression problems, but provide no estimate of uncertainty. We propose Instance-Based Uncertainty estimation for Gradient-boosted regression trees (IBUG), a simple method for extending any GBRT point predictor to produce probabilistic predictions. IBUG computes a non-parametric distribution around a prediction using… ▽ More

    Submitted 10 October, 2022; v1 submitted 23 May, 2022; originally announced May 2022.

    Comments: 26 pages, 7 figures, 3 tables, and 3 algorithms. Accepted at NeurIPS 2022

  8. arXiv:2205.00359  [pdf, other

    cs.LG

    Adapting and Evaluating Influence-Estimation Methods for Gradient-Boosted Decision Trees

    Authors: Jonathan Brophy, Zayd Hammoudeh, Daniel Lowd

    Abstract: Influence estimation analyzes how changes to the training data can lead to different model predictions; this analysis can help us better understand these predictions, the models making those predictions, and the data sets they're trained on. However, most influence-estimation techniques are designed for deep learning models with continuous parameters. Gradient-boosted decision trees (GBDTs) are a… ▽ More

    Submitted 31 May, 2023; v1 submitted 30 April, 2022; originally announced May 2022.

    Comments: 47 pages, 15 figures, and 5 tables. Accepted to JMLR

  9. Identifying a Training-Set Attack's Target Using Renormalized Influence Estimation

    Authors: Zayd Hammoudeh, Daniel Lowd

    Abstract: Targeted training-set attacks inject malicious instances into the training set to cause a trained model to mislabel one or more specific test instances. This work proposes the task of target identification, which determines whether a specific test instance is the target of a training-set attack. Target identification can be combined with adversarial-instance identification to find (and remove) the… ▽ More

    Submitted 5 September, 2022; v1 submitted 24 January, 2022; originally announced January 2022.

    Comments: Accepted at CCS'2022 -- Extended version including the supplementary material

  10. arXiv:2201.08555  [pdf, other

    cs.CL cs.CR cs.LG

    Identifying Adversarial Attacks on Text Classifiers

    Authors: Zhouhang Xie, Jonathan Brophy, Adam Noack, Wencong You, Kalyani Asthana, Carter Perkins, Sabrina Reis, Sameer Singh, Daniel Lowd

    Abstract: The landscape of adversarial attacks against text classifiers continues to grow, with new attacks developed every year and many of them available in standard toolkits, such as TextAttack and OpenAttack. In response, there is a growing body of work on robust learning, which reduces vulnerability to these attacks, though sometimes at a high cost in compute time or accuracy. In this paper, we take an… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  11. arXiv:2009.05567  [pdf, other

    cs.LG stat.ML

    Machine Unlearning for Random Forests

    Authors: Jonathan Brophy, Daniel Lowd

    Abstract: Responding to user data deletion requests, removing noisy examples, or deleting corrupted training data are just a few reasons for wanting to delete instances from a machine learning (ML) model. However, efficiently removing this data from an ML model is generally difficult. In this paper, we introduce data removal-enabled (DaRE) forests, a variant of random forests that enables the removal of tra… ▽ More

    Submitted 11 June, 2021; v1 submitted 11 September, 2020; originally announced September 2020.

    Comments: 29 pages, 5 figures, 9 tables, and 3 algorithms. Accepted at ICML 2021

  12. arXiv:2009.05530  [pdf, other

    cs.LG stat.ML

    TREX: Tree-Ensemble Representer-Point Explanations

    Authors: Jonathan Brophy, Daniel Lowd

    Abstract: How can we identify the training examples that contribute most to the prediction of a tree ensemble? In this paper, we introduce TREX, an explanation system that provides instance-attribution explanations for tree ensembles, such as random forests and gradient boosted trees. TREX builds on the representer point framework previously developed for explaining deep neural networks. Since tree ensemble… ▽ More

    Submitted 16 December, 2021; v1 submitted 11 September, 2020; originally announced September 2020.

    Comments: 11 pages, 7 figures, and 4 tables. XXAI 2020 (co-located with ICML)

  13. arXiv:2002.10261  [pdf, other

    cs.LG stat.ML

    Learning from Positive and Unlabeled Data with Arbitrary Positive Shift

    Authors: Zayd Hammoudeh, Daniel Lowd

    Abstract: Positive-unlabeled (PU) learning trains a binary classifier using only positive and unlabeled data. A common simplifying assumption is that the positive data is representative of the target positive class. This assumption rarely holds in practice due to temporal drift, domain shift, and/or adversarial manipulation. This paper shows that PU learning is possible even with arbitrarily non-representat… ▽ More

    Submitted 9 November, 2020; v1 submitted 24 February, 2020; originally announced February 2020.

    Comments: Accepted at NeurIPS'20

  14. arXiv:2001.04909  [pdf, other

    cs.SI cs.IR cs.LG

    EGGS: A Flexible Approach to Relational Modeling of Social Network Spam

    Authors: Jonathan Brophy, Daniel Lowd

    Abstract: Social networking websites face a constant barrage of spam, unwanted messages that distract, annoy, and even defraud honest users. These messages tend to be very short, making them difficult to identify in isolation. Furthermore, spammers disguise their messages to look legitimate, tricking users into clicking on links and tricking spam filters into tolerating their malicious behavior. Thus, some… ▽ More

    Submitted 28 January, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: 10 pages, 6 figures, 5 tables. STARAI 2020

  15. arXiv:1806.09030  [pdf, ps, other

    cs.CL cs.AI

    On Adversarial Examples for Character-Level Neural Machine Translation

    Authors: Javid Ebrahimi, Daniel Lowd, Dejing Dou

    Abstract: Evaluating on adversarial examples has become a standard procedure to measure robustness of deep learning models. Due to the difficulty of creating white-box adversarial examples for discrete text input, most analyses of the robustness of NLP models have been done through black-box adversarial examples. We investigate adversarial examples for character-level neural machine translation (NMT), and c… ▽ More

    Submitted 23 June, 2018; originally announced June 2018.

    Journal ref: COLING 2018

  16. arXiv:1712.06751  [pdf, ps, other

    cs.CL cs.LG

    HotFlip: White-Box Adversarial Examples for Text Classification

    Authors: Javid Ebrahimi, Anyi Rao, Daniel Lowd, Dejing Dou

    Abstract: We propose an efficient method to generate white-box adversarial examples to trick a character-level neural classifier. We find that only a few manipulations are needed to greatly decrease the accuracy. Our method relies on an atomic flip operation, which swaps one token for another, based on the gradients of the one-hot input vectors. Due to efficiency of our method, we can perform adversarial tr… ▽ More

    Submitted 24 May, 2018; v1 submitted 18 December, 2017; originally announced December 2017.

    Journal ref: ACL 2018

  17. arXiv:1711.03902  [pdf, other

    cs.AI

    Neural-Symbolic Learning and Reasoning: A Survey and Interpretation

    Authors: Tarek R. Besold, Artur d'Avila Garcez, Sebastian Bader, Howard Bowman, Pedro Domingos, Pascal Hitzler, Kai-Uwe Kuehnberger, Luis C. Lamb, Daniel Lowd, Priscila Machado Vieira Lima, Leo de Penning, Gadi Pinkas, Hoifung Poon, Gerson Zaverucha

    Abstract: The study and understanding of human behaviour is relevant to computer science, artificial intelligence, neural computation, cognitive science, philosophy, psychology, and several other areas. Presupposing cognition as basis of behaviour, among the most prominent tools in the modelling of behaviour are computational-logic systems, connectionist models of cognition, and models of uncertainty. Recen… ▽ More

    Submitted 10 November, 2017; originally announced November 2017.

    Comments: 58 pages, work in progress

  18. arXiv:1507.03181  [pdf, other

    cs.AI

    A Probabilistic Approach to Knowledge Translation

    Authors: Shangpu Jiang, Daniel Lowd, Dejing Dou

    Abstract: In this paper, we focus on a novel knowledge reuse scenario where the knowledge in the source schema needs to be translated to a semantically heterogeneous target schema. We refer to this task as "knowledge translation" (KT). Unlike data translation and transfer learning, KT does not require any data from the source or target schema. We adopt a probabilistic approach to KT by representing the know… ▽ More

    Submitted 11 July, 2015; originally announced July 2015.

  19. arXiv:1507.03097  [pdf, ps, other

    cs.AI

    Ontology Matching with Knowledge Rules

    Authors: Shangpu Jiang, Daniel Lowd, Dejing Dou

    Abstract: Ontology matching is the process of automatically determining the semantic equivalences between the concepts of two ontologies. Most ontology matching algorithms are based on two types of strategies: terminology-based strategies, which align concepts based on their names or descriptions, and structure-based strategies, which exploit concept hierarchies to find the alignment. In many domains, there… ▽ More

    Submitted 11 July, 2015; originally announced July 2015.

  20. arXiv:1504.00110  [pdf, other

    cs.LG cs.AI

    The Libra Toolkit for Probabilistic Models

    Authors: Daniel Lowd, Amirmohammad Rooshenas

    Abstract: The Libra Toolkit is a collection of algorithms for learning and inference with discrete probabilistic models, including Bayesian networks, Markov networks, dependency networks, and sum-product networks. Compared to other toolkits, Libra places a greater emphasis on learning the structure of tractable models in which exact inference is efficient. It also includes a variety of algorithms for learni… ▽ More

    Submitted 1 April, 2015; originally announced April 2015.

  21. arXiv:1210.4896  [pdf

    cs.LG cs.AI stat.ML

    Closed-Form Learning of Markov Networks from Dependency Networks

    Authors: Daniel Lowd

    Abstract: Markov networks (MNs) are a powerful way to compactly represent a joint probability distribution, but most MN structure learning methods are very slow, due to the high cost of evaluating candidates structures. Dependency networks (DNs) represent a probability distribution as a set of conditional probability distributions. DNs are very fast to learn, but the conditional distributions may be inconsi… ▽ More

    Submitted 16 October, 2012; originally announced October 2012.

    Comments: Appears in Proceedings of the Twenty-Eighth Conference on Uncertainty in Artificial Intelligence (UAI2012)

    Report number: UAI-P-2012-PG-533-542

  22. arXiv:1206.3271  [pdf

    cs.AI

    Learning Arithmetic Circuits

    Authors: Daniel Lowd, Pedro Domingos

    Abstract: Graphical models are usually learned without regard to the cost of doing inference with them. As a result, even if a good model is learned, it may perform poorly at prediction, because it requires approximate inference. We propose an alternative: learning models with a score function that directly penalizes the cost of inference. Specifically, we learn arithmetic circuits with a penalty on the num… ▽ More

    Submitted 13 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the Twenty-Fourth Conference on Uncertainty in Artificial Intelligence (UAI2008)

    Report number: UAI-P-2008-PG-383-392