Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Jayaraman, B

Searching in archive cs. Search in all archives.
.
  1. Runtime Verification on Abstract Finite State Models

    Authors: KP Jevitha, Bharat Jayaraman, M Sethumadhavan

    Abstract: Finite-state models are ubiquitous in the study of concurrent systems, especially controllers and servers that operate in a repetitive cycle. In this paper, we show how to extract finite state models from a run of a multi-threaded Java program and carry out runtime verification of correctness properties. These properties include data-oriented and control-oriented properties; the former express cor… ▽ More

    Submitted 18 June, 2024; originally announced June 2024.

    Comments: 44 pages

  2. arXiv:2405.17247  [pdf, other

    cs.LG

    An Introduction to Vision-Language Modeling

    Authors: Florian Bordes, Richard Yuanzhe Pang, Anurag Ajay, Alexander C. Li, Adrien Bardes, Suzanne Petryk, Oscar Mañas, Zhiqiu Lin, Anas Mahmoud, Bargav Jayaraman, Mark Ibrahim, Melissa Hall, Yunyang Xiong, Jonathan Lebensold, Candace Ross, Srihari Jayakumar, Chuan Guo, Diane Bouchacourt, Haider Al-Tahan, Karthik Padthe, Vasu Sharma, Hu Xu, Xiaoqing Ellen Tan, Megan Richards, Samuel Lavoie , et al. (16 additional authors not shown)

    Abstract: Following the recent popularity of Large Language Models (LLMs), several attempts have been made to extend them to the visual domain. From having a visual assistant that could guide us through unfamiliar environments to generative models that produce images using only a high-level text description, the vision-language model (VLM) applications will significantly impact our relationship with technol… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  3. arXiv:2402.02103  [pdf, other

    cs.CV cs.LG

    Déjà Vu Memorization in Vision-Language Models

    Authors: Bargav Jayaraman, Chuan Guo, Kamalika Chaudhuri

    Abstract: Vision-Language Models (VLMs) have emerged as the state-of-the-art representation learning solution, with myriads of downstream applications such as image classification, retrieval and generation. A natural question is whether these models memorize their training data, which also has implications for generalization. We propose a new method for measuring memorization in VLMs, which we call déjà vu… ▽ More

    Submitted 3 February, 2024; originally announced February 2024.

  4. arXiv:2209.01292  [pdf, other

    cs.CR cs.LG

    Are Attribute Inference Attacks Just Imputation?

    Authors: Bargav Jayaraman, David Evans

    Abstract: Models can expose sensitive information about their training data. In an attribute inference attack, an adversary has partial knowledge of some training records and access to a model trained on those records, and infers the unknown values of a sensitive feature of those records. We study a fine-grained variant of attribute inference we call \emph{sensitive value inference}, where the adversary's g… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

    Comments: 13 (main body) + 4 (references and appendix) pages. To appear in CCS'22

  5. arXiv:2207.10802  [pdf, other

    cs.CR cs.CL cs.LG

    Combing for Credentials: Active Pattern Extraction from Smart Reply

    Authors: Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai, David Evans

    Abstract: Pre-trained large language models, such as GPT\nobreakdash-2 and BERT, are often fine-tuned to achieve state-of-the-art performance on a downstream task. One natural example is the ``Smart Reply'' application where a pre-trained model is tuned to provide suggested responses for a given query message. Since the tuning data is often sensitive data such as emails or chat transcripts, it is important… ▽ More

    Submitted 2 September, 2023; v1 submitted 14 July, 2022; originally announced July 2022.

  6. arXiv:2005.10881  [pdf, other

    cs.CR cs.LG stat.ML

    Revisiting Membership Inference Under Realistic Assumptions

    Authors: Bargav Jayaraman, Lingxiao Wang, Katherine Knipmeyer, Quanquan Gu, David Evans

    Abstract: We study membership inference in settings where some of the assumptions typically used in previous research are relaxed. First, we consider skewed priors, to cover cases such as when only a small fraction of the candidate pool targeted by the adversary are actually members and develop a PPV-based metric suitable for this setting. This setting is more realistic than the balanced prior setting typic… ▽ More

    Submitted 13 January, 2021; v1 submitted 21 May, 2020; originally announced May 2020.

  7. arXiv:1910.13659  [pdf, other

    cs.LG cs.CR math.OC stat.ML

    Efficient Privacy-Preserving Stochastic Nonconvex Optimization

    Authors: Lingxiao Wang, Bargav Jayaraman, David Evans, Quanquan Gu

    Abstract: While many solutions for privacy-preserving convex empirical risk minimization (ERM) have been developed, privacy-preserving nonconvex ERM remains a challenge. We study nonconvex ERM, which takes the form of minimizing a finite-sum of nonconvex loss functions over a training set. We propose a new differentially private stochastic gradient descent algorithm for nonconvex ERM that achieves strong pr… ▽ More

    Submitted 1 February, 2023; v1 submitted 30 October, 2019; originally announced October 2019.

    Comments: 29 pages, 5 figures, 3 tables. This version corrects a miscalculation in the previous proof, resulting in an improved utility bound for the algorithm

  8. arXiv:1907.05720  [pdf, other

    eess.SP cs.LG cs.RO

    Wind Estimation Using Quadcopter Motion: A Machine Learning Approach

    Authors: Sam Allison, He Bai, Balaji Jayaraman

    Abstract: In this article, we study the well known problem of wind estimation in atmospheric turbulence using small unmanned aerial systems (sUAS). We present a machine learning approach to wind velocity estimation based on quadcopter state measurements without a wind sensor. We accomplish this by training a long short-term memory (LSTM) neural network (NN) on roll and pitch angles and quadcopter position i… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

  9. arXiv:1902.08874  [pdf, other

    cs.LG cs.CR stat.ML

    Evaluating Differentially Private Machine Learning in Practice

    Authors: Bargav Jayaraman, David Evans

    Abstract: Differential privacy is a strong notion for privacy that can be used to prove formal guarantees, in terms of a privacy budget, $ε$, about how much information is leaked by a mechanism. However, implementations of privacy-preserving machine learning often select large values of $ε$ in order to get acceptable utility of the model, with little understanding of the impact of such choices on meaningful… ▽ More

    Submitted 12 August, 2019; v1 submitted 23 February, 2019; originally announced February 2019.

    Comments: Revised version of a paper in USENIX Security 2019

  10. arXiv:1706.03370  [pdf, other

    cs.CR

    Decentralized Certificate Authorities

    Authors: Bargav Jayaraman, Hannah Li, David Evans

    Abstract: The security of TLS depends on trust in certificate authorities, and that trust stems from their ability to protect and control the use of a private signing key. The signing key is the key asset of a certificate authority (CA), and its value is based on trust in the corresponding public key which is primarily distributed by browser vendors. Compromise of a CA private key represents a single point-… ▽ More

    Submitted 10 October, 2017; v1 submitted 11 June, 2017; originally announced June 2017.

  11. arXiv:cs/0701107  [pdf, ps, other

    cs.PL

    JavaTA: A Logic-based Debugger for Java

    Authors: Hani Girgis, Bharat Jayaraman

    Abstract: This paper presents a logic based approach to debugging Java programs. In contrast with traditional debugging we propose a debugging methodology for Java programs using logical queries on individual execution states and also over the history of execution. These queries were arrived at by a systematic study of errors in object-oriented programs in our earlier research. We represent the salient ev… ▽ More

    Submitted 17 January, 2007; originally announced January 2007.

    Comments: Paper presented at the 16th Workshop on Logic-based Methods in Programming Environments (WLPE2006)

  12. arXiv:cs/9809016  [pdf, ps, other

    cs.PL

    Scoping Constructs in Logic Programming: Implementation Problems and their Solution

    Authors: Gopalan Nadathur, Bharat Jayaraman, Keehang Kwon

    Abstract: The inclusion of universal quantification and a form of implication in goals in logic programming is considered. These additions provide a logical basis for scoping but they also raise new implementation problems. When universal and existential quantifiers are permitted to appear in mixed order in goals, the devices of logic variables and unification that are employed in solving existential goal… ▽ More

    Submitted 10 September, 1998; originally announced September 1998.

    Comments: 46 pages

    ACM Class: D.3.2

    Journal ref: Journal of Logic Programming, 25(2)-119:161, 1995