Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: Vijay, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.16163  [pdf, ps, other

    cs.CL cs.AI

    FRACTURED-SORRY-Bench: Framework for Revealing Attacks in Conversational Turns Undermining Refusal Efficacy and Defenses over SORRY-Bench

    Authors: Aman Priyanshu, Supriti Vijay

    Abstract: This paper introduces FRACTURED-SORRY-Bench, a framework for evaluating the safety of Large Language Models (LLMs) against multi-turn conversational attacks. Building upon the SORRY-Bench dataset, we propose a simple yet effective method for generating adversarial prompts by breaking down harmful queries into seemingly innocuous sub-questions. Our approach achieves a maximum increase of +46.22\% i… ▽ More

    Submitted 28 August, 2024; originally announced August 2024.

    Comments: 4 pages, 2 tables

  2. arXiv:2407.10371  [pdf, other

    cs.CY cs.AI cs.CL

    The Silent Curriculum: How Does LLM Monoculture Shape Educational Content and Its Accessibility?

    Authors: Aman Priyanshu, Supriti Vijay

    Abstract: As Large Language Models (LLMs) ascend in popularity, offering information with unprecedented convenience compared to traditional search engines, we delve into the intriguing possibility that a new, singular perspective is being propagated. We call this the "Silent Curriculum," where our focus shifts towards a particularly impressionable demographic: children, who are drawn to the ease and immedia… ▽ More

    Submitted 11 May, 2024; originally announced July 2024.

    Comments: 5 pages and 4 figures. Accepted at The Workshop on Global AI Cultures at the International Conference on Learning Representations, 2024 (ICLR'24)

  3. arXiv:2310.13259  [pdf

    eess.IV cs.CV

    Domain-specific optimization and diverse evaluation of self-supervised models for histopathology

    Authors: Jeremy Lai, Faruk Ahmed, Supriya Vijay, Tiam Jaroensri, Jessica Loo, Saurabh Vyawahare, Saloni Agarwal, Fayaz Jamil, Yossi Matias, Greg S. Corrado, Dale R. Webster, Jonathan Krause, Yun Liu, Po-Hsuan Cameron Chen, Ellery Wulczyn, David F. Steiner

    Abstract: Task-specific deep learning models in histopathology offer promising opportunities for improving diagnosis, clinical research, and precision medicine. However, development of such models is often limited by availability of high-quality data. Foundation models in histopathology that learn general representations across a wide range of tissue types, diagnoses, and magnifications offer the potential… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: 4 main tables, 3 main figures, additional supplemental tables and figures

  4. arXiv:2307.13192  [pdf, other

    cs.AI cs.LG

    Counterfactual Explanation Policies in RL

    Authors: Shripad V. Deshmukh, Srivatsan R, Supriti Vijay, Jayakumar Subramanian, Chirag Agarwal

    Abstract: As Reinforcement Learning (RL) agents are increasingly employed in diverse decision-making problems using reward preferences, it becomes important to ensure that policies learned by these frameworks in mapping observations to a probability distribution of the possible actions are explainable. However, there is little to no work in the systematic understanding of these complex policies in a contras… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: ICML Workshop on Counterfactuals in Minds and Machines, 2023

  5. arXiv:2305.15008  [pdf, other

    cs.CL cs.AI cs.CY

    Are Chatbots Ready for Privacy-Sensitive Applications? An Investigation into Input Regurgitation and Prompt-Induced Sanitization

    Authors: Aman Priyanshu, Supriti Vijay, Ayush Kumar, Rakshit Naidu, Fatemehsadat Mireshghallah

    Abstract: LLM-powered chatbots are becoming widely adopted in applications such as healthcare, personal assistants, industry hiring decisions, etc. In many of these cases, chatbots are fed sensitive, personal information in their prompts, as samples for in-context learning, retrieved records from a database, or as part of the conversation. The information provided in the prompt could directly appear in the… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

    Comments: 12 pages, 9 figures, and 4 tables

  6. arXiv:2211.08653  [pdf, other

    cs.CL

    #maskUp: Selective Attribute Encryption for Sensitive Vocalization for English language on Social Media Platforms

    Authors: Supriti Vijay, Aman Priyanshu

    Abstract: Social media has become a platform for people to stand up and raise their voices against social and criminal acts. Vocalization of such information has allowed the investigation and identification of criminals. However, revealing such sensitive information may jeopardize the victim's safety. We propose #maskUp, a safe method for information communication in a secure fashion to the relevant authori… ▽ More

    Submitted 15 November, 2022; originally announced November 2022.

    Comments: Awarded Second Runner's up in the Research and Reports track at #ShowYourSkill (Coursera)

  7. arXiv:2211.07499  [pdf, other

    cs.CL cs.LG

    AdaptKeyBERT: An Attention-Based approach towards Few-Shot & Zero-Shot Domain Adaptation of KeyBERT

    Authors: Aman Priyanshu, Supriti Vijay

    Abstract: Keyword extraction has been an important topic for modern natural language processing. With its applications ranging from ontology generation, fact verification in summarized text, and recommendation systems. While it has had significant data-intensive applications, it is often hampered when the data set is small. Downstream training for keyword extractors is a lengthy process and requires a signi… ▽ More

    Submitted 15 November, 2022; v1 submitted 14 November, 2022; originally announced November 2022.

  8. arXiv:2206.14607  [pdf, other

    cs.CL

    NERDA-Con: Extending NER models for Continual Learning -- Integrating Distinct Tasks and Updating Distribution Shifts

    Authors: Supriti Vijay, Aman Priyanshu

    Abstract: With increasing applications in areas such as biomedical information extraction pipelines and social media analytics, Named Entity Recognition (NER) has become an indispensable tool for knowledge extraction. However, with the gradual shift in language structure and vocabulary, NERs are plagued with distribution shifts, making them redundant or not as profitable without re-training. Re-training NER… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

    Comments: 6 pages, 4 figures, Accepted at Workshop on Updatable Machine Learning(UpML), International Conference on Machine Learning (ICML'22)

  9. arXiv:2109.03200  [pdf, other

    cs.AI cs.CL cs.LG

    ExCode-Mixed: Explainable Approaches towards Sentiment Analysis on Code-Mixed Data using BERT models

    Authors: Aman Priyanshu, Aleti Vardhan, Sudarshan Sivakumar, Supriti Vijay, Nipuna Chhabra

    Abstract: The increasing use of social media sites in countries like India has given rise to large volumes of code-mixed data. Sentiment analysis of this data can provide integral insights into people's perspectives and opinions. Developing robust explainability techniques which explain why models make their predictions becomes essential. In this paper, we propose an adequate methodology to integrate explai… ▽ More

    Submitted 25 September, 2021; v1 submitted 7 September, 2021; originally announced September 2021.

    Comments: 3 pages, 1 figure

  10. arXiv:2002.07062  [pdf

    cs.PF cs.LG

    An optimal scheduling architecture for accelerating batch algorithms on Neural Network processor architectures

    Authors: Phani Kumar Nyshadham, Mohit Sinha, Biswajit Mishra, H S Vijay

    Abstract: In neural network topologies, algorithms are running on batches of data tensors. The batches of data are typically scheduled onto the computing cores which execute in parallel. For the algorithms running on batches of data, an optimal batch scheduling architecture is very much needed by suitably utilizing hardware resources - thereby resulting in significant reduction training and inference time.… ▽ More

    Submitted 14 February, 2020; originally announced February 2020.

    Comments: 9 pages, page 7 contains the proposed example

  11. arXiv:1106.0793  [pdf, ps, other

    math.CO cs.DM

    Monochromatic Progressions in Random Colorings

    Authors: Sujith Vijay

    Abstract: Let N^{+}(k)= 2^{k/2} k^{3/2} f(k) and N^{-}(k)= 2^{k/2} k^{1/2} g(k) where 1=o(f(k)) and g(k)=o(1). We show that the probability of a random 2-coloring of {1,2,...,N^{+}(k)} containing a monochromatic k-term arithmetic progression approaches 1, and the probability of a random 2-coloring of {1,2,...,N^{-}(k)} containing a monochromatic k-term arithmetic progression approaches 0, for large k. This… ▽ More

    Submitted 5 June, 2012; v1 submitted 4 June, 2011; originally announced June 2011.

    Comments: 5 pages

    MSC Class: 11B25; 05D10