Search Results for author: Ashish Kundu

Found 20 papers, 1 papers with code

A Generative Caching System for Large Language Models

no code implementations22 Mar 2025 Arun Iyengar, Ashish Kundu, Ramana Kompella, Sai Nandan Mamidi

Caching has the potential to be of significant benefit for accessing large language models (LLMs) due to their high latencies which typically range from a small number of seconds to well over a minute.

Malware Detection at the Edge with Lightweight LLMs: A Performance Evaluation

no code implementations6 Mar 2025 Christian Rondanini, Barbara Carminati, Elena Ferrari, Antonio Gaudiano, Ashish Kundu

The rapid evolution of malware attacks calls for the development of innovative detection methods, especially in resource-constrained edge computing.

Edge-computing Malware Detection

LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs

no code implementations18 Feb 2025 Pratik Sonune, Ritwik Rai, Shamik Sural, Vijayalakshmi Atluri, Ashish Kundu

Organizations often lay down rules or guidelines called Natural Language Access Control Policies (NLACPs) for specifying who gets access to which information and when.

Attribute Machine Translation

Automated Consistency Analysis of LLMs

no code implementations10 Feb 2025 Aditya Patwardhan, Vivek Vaidya, Ashish Kundu

In this paper, we have analyzed and developed a formal definition of consistency of responses of LLMs.

On the Vulnerability of Applying Retrieval-Augmented Generation within Knowledge-Intensive Application Domains

no code implementations12 Sep 2024 Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Charles Fleming, Mingyi Hong, Jie Ding

To understand this vulnerability, we discovered that the deviation from the query's embedding to that of the poisoned document tends to follow a pattern in which the high similarity between the poisoned document and the query is retained, thereby enabling precise retrieval.

Adversarial Robustness RAG +1

Using Retriever Augmented Large Language Models for Attack Graph Generation

no code implementations11 Aug 2024 Renascence Tarafder Prapty, Ashish Kundu, Arun Iyengar

As the complexity of modern systems increases, so does the importance of assessing their security posture through effective vulnerability management and threat modeling techniques.

Graph Generation Management

Code Hallucination

no code implementations5 Jul 2024 Mirza Masfiqur Rahman, Ashish Kundu

Generative models such as large language models are extensively used as code copilots and for whole program generation.

Hallucination

LMO-DP: Optimizing the Randomization Mechanism for Differentially Private Fine-Tuning (Large) Language Models

no code implementations29 May 2024 Qin Yang, Meisam Mohammad, Han Wang, Ali Payani, Ashish Kundu, Kai Shu, Yan Yan, Yuan Hong

To address such limitations, we propose a novel Language Model-based Optimal Differential Privacy (LMO-DP) mechanism, which takes the first step to enable the tight composition of accurately fine-tuning (large) language models with a sub-optimal DP mechanism, even in strong privacy regimes (e. g., $0. 1\leq \epsilon<3$).

Language Modelling SST-2 +1

RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images with Provable Guarantees

no code implementations23 Jan 2024 Xun Xian, Ganghua Wang, Xuan Bi, Jayanth Srinivasa, Ashish Kundu, Mingyi Hong, Jie Ding

Subsequently, we employ a classifier that is jointly trained with the watermark to detect the presence of the watermark.

Decoder

Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs

no code implementations20 Dec 2023 Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu

In this paper, we propose Graphene, an advanced system designed to provide a detailed analysis of the security posture of computing infrastructures.

Demystifying Poisoning Backdoor Attacks from a Statistical Perspective

no code implementations16 Oct 2023 Ganghua Wang, Xun Xian, Jayanth Srinivasa, Ashish Kundu, Xuan Bi, Mingyi Hong, Jie Ding

The growing dependence on machine learning in real-world applications emphasizes the importance of understanding and ensuring its safety.

Backdoor Attack

Evaluating Chatbots to Promote Users' Trust -- Practices and Open Problems

no code implementations9 Sep 2023 Biplav Srivastava, Kausik Lakkaraju, Tarmo Koppel, Vignesh Narayanan, Ashish Kundu, Sachindra Joshi

Chatbots, the common moniker for collaborative assistants, are Artificial Intelligence (AI) software that enables people to naturally interact with them to get tasks done.

Chatbot Language Modeling +2

Edge Security: Challenges and Issues

no code implementations14 Jun 2022 Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Ashish Kundu, Ramana Kompella

Edge computing is a paradigm that shifts data processing services to the network edge, where data are generated.

Edge-computing

BeautifAI -- A Personalised Occasion-oriented Makeup Recommendation System

no code implementations13 Sep 2021 Kshitij Gulati, Gaurav Verma, Mukesh Mohania, Ashish Kundu

The proposed work's novel contributions, including the incorporation of occasion context, region-wise makeup recommendation, real-time makeup previews and continuous makeup feedback, set our system apart from the current work in makeup recommendation.

Towards Deep Federated Defenses Against Malware in Cloud Ecosystems

no code implementations27 Dec 2019 Josh Payne, Ashish Kundu

In cloud computing environments with many virtual machines, containers, and other systems, an epidemic of malware can be highly threatening to business processes.

BIG-bench Machine Learning Cloud Computing +3

Uncheatable Machine Learning Inference

no code implementations8 Aug 2019 Mustafa Canim, Ashish Kundu, Josh Payne

Given a classification service supplier $S$, intermediary CaaS provider $P$ claiming to use $S$ as a classification backend, and customer $C$, our work addresses the following questions: (i) how can $P$'s claim to be using $S$ be verified by $C$?

BIG-bench Machine Learning Fraud Detection +2

Cannot find the paper you are looking for? You can Submit a new open access paper.