Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Ngweta, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.04224  [pdf, other

    cs.CL cs.AI cs.LG

    Aligners: Decoupling LLMs and Alignment

    Authors: Lilian Ngweta, Mayank Agarwal, Subha Maity, Alex Gittens, Yuekai Sun, Mikhail Yurochkin

    Abstract: Large Language Models (LLMs) need to be aligned with human expectations to ensure their safety and utility in most applications. Alignment is challenging, costly, and needs to be repeated for every LLM and alignment criterion. We propose to decouple LLMs and alignment by training aligner models that can be used to align any LLM for a given criteria on an as-needed basis, thus also reducing the pot… ▽ More

    Submitted 16 June, 2024; v1 submitted 6 March, 2024; originally announced March 2024.

    Comments: Tiny Papers at the International Conference on Learning Representations (ICLR) 2024

  2. arXiv:2302.09795  [pdf, other

    cs.LG cs.CV stat.ML

    Simple Disentanglement of Style and Content in Visual Representations

    Authors: Lilian Ngweta, Subha Maity, Alex Gittens, Yuekai Sun, Mikhail Yurochkin

    Abstract: Learning visual representations with interpretable features, i.e., disentangled representations, remains a challenging problem. Existing methods demonstrate some success but are hard to apply to large-scale vision datasets like ImageNet. In this work, we propose a simple post-processing framework to disentangle content and style in learned representations from pre-trained vision models. We model t… ▽ More

    Submitted 31 May, 2023; v1 submitted 20 February, 2023; originally announced February 2023.

    Comments: International Conference on Machine Learning (ICML) 2023

  3. arXiv:2206.11171  [pdf, other

    cs.CR cs.AI

    Attack Techniques and Threat Identification for Vulnerabilities

    Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta

    Abstract: Modern organizations struggle with insurmountable number of vulnerabilities that are discovered and reported by their network and application vulnerability scanners. Therefore, prioritization and focus become critical, to spend their limited time on the highest risk vulnerabilities. In doing this, it is important for these organizations not only to understand the technical descriptions of the vuln… ▽ More

    Submitted 22 June, 2022; originally announced June 2022.

    Comments: 9 pages