no code implementations • 7 Dec 2023 • Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Ling Cai, Nathalie Baracaldo
Growing applications of large language models (LLMs) trained by a third party raise serious concerns on the security vulnerability of LLMs. It has been demonstrated that malicious actors can covertly exploit these vulnerabilities in LLMs through poisoning attacks aimed at generating undesirable outputs.
1 code implementation • 15 Oct 2022 • Shuli Jiang, Robson Leonardo Ferreira Cordeiro, Leman Akoglu
How can we perform both tasks in-house, i. e., without any post-hoc processing, so that both detection and assignment can benefit simultaneously from each other?
no code implementations • 1 Jan 2021 • Shuli Jiang, Dongyu Li, Irene Mengze Li, Arvind V. Mahankali, David Woodruff
We give a distributed protocol with nearly-optimal communication and number of rounds for Column Subset Selection with respect to the entrywise {$\ell_1$} norm ($k$-CSS$_1$), and more generally, for the $\ell_p$-norm with $1 \leq p < 2$.
1 code implementation • 24 Apr 2018 • Theresa Gebert, Shuli Jiang, Jiaxian Sheng
The United States has an opioid epidemic, and Pennsylvania's Allegheny County is among the worst.
Applications Populations and Evolution