no code implementations • 29 Sep 2024 • Zhen Wang, Ruiqi Song, Chen Shen, Shiya Yin, Zhao Song, Balaraju Battu, Lei Shi, Danyang Jia, Talal Rahwan, Shuyue Hu
We design three types of LLMs: (i) Cooperative, aiming to assist its human associate; (ii) Selfish, focusing solely on maximizing its self-interest; and (iii) Fair, balancing its own and collective interest, while slightly prioritizing self-interest.
1 code implementation • 27 Jun 2024 • Sidahmed Benabderrahmane, Ngoc Hoang, Petko Valtchev, James Cheney, Talal Rahwan
We evaluated our tool on a suite of provenance trace databases produced by the DARPA Transparent Computing program, where APT-like attacks constitute as little as 0. 004% of the data.
1 code implementation • 14 Jun 2024 • Fengyuan Liu, Nouar AlDahoul, Gregory Eady, Yasir Zaki, Bedoor AlShebli, Talal Rahwan
Some propose that such capabilities can be improved through self-reflection, i. e., letting LLMs reflect on their own output to identify and correct mistakes in the initial responses.
no code implementations • 1 Feb 2024 • Nouar AlDahoul, Talal Rahwan, Yasir Zaki
Text-to-image generative AI models such as Stable Diffusion are used daily by millions worldwide.
2 code implementations • 26 Jul 2023 • Yuni Lai, Marcin Waniek, Liying Li, Jingwen Wu, Yulin Zhu, Tomasz P. Michalak, Talal Rahwan, Kai Zhou
In addition, we conduct transfer attack experiments in a black-box setting, which show that our feature attack significantly decreases the anomaly scores of target nodes.
no code implementations • 26 May 2023 • Christoforos Vasilatos, Manaar Alam, Talal Rahwan, Yasir Zaki, Michail Maniatakos
As the use of Large Language Models (LLMs) in text generation tasks proliferates, concerns arise over their potential to compromise academic integrity.
1 code implementation • 7 May 2023 • Hazem Ibrahim, Fengyuan Liu, Rohail Asim, Balaraju Battu, Sidahmed Benabderrahmane, Bashar Alhafni, Wifag Adnan, Tuka Alhanai, Bedoor AlShebli, Riyadh Baghdadi, Jocelyn J. Bélanger, Elena Beretta, Kemal Celik, Moumena Chaqfeh, Mohammed F. Daqaq, Zaynab El Bernoussi, Daryl Fougnie, Borja Garcia de Soto, Alberto Gandolfi, Andras Gyorgy, Nizar Habash, J. Andrew Harris, Aaron Kaufman, Lefteris Kirousis, Korhan Kocak, Kangsan Lee, Seungah S. Lee, Samreen Malik, Michail Maniatakos, David Melcher, Azzam Mourad, Minsu Park, Mahmoud Rasras, Alicja Reuben, Dania Zantout, Nancy W. Gleason, Kinga Makovi, Talal Rahwan, Yasir Zaki
Moreover, current AI-text classifiers cannot reliably detect ChatGPT's use in school work, due to their propensity to classify human-written answers as AI-generated, as well as the ease with which AI-generated text can be edited to evade detection.
no code implementations • 24 Apr 2023 • Marcin Waniek, Navya Suri, Abdullah Zameek, Bedoor AlShebli, Talal Rahwan
Attribute inference - the process of analyzing publicly available data in order to uncover hidden information - has become a major threat to privacy, given the recent technological leap in machine learning.
1 code implementation • 21 Apr 2023 • Bedoor AlShebli, Shahan Ali Memon, James A. Evans, Talal Rahwan
Given AI's massive potential, as well as the fierce geopolitical tensions between the two nations, a number of policies have been put in place that discourage AI scientists from migrating to, or collaborating with, the other country.
no code implementations • 22 Sep 2018 • Kai Zhou, Tomasz P. Michalak, Talal Rahwan, Marcin Waniek, Yevgeniy Vorobeychik
We offer a comprehensive algorithmic investigation of the problem of attacking similarity-based link prediction through link deletion, focusing on two broad classes of such approaches, one which uses only local information about target links, and another which uses global network information.
Social and Information Networks Cryptography and Security
no code implementations • 1 Sep 2018 • Marcin Waniek, Kai Zhou, Yevgeniy Vorobeychik, Esteban Moro, Tomasz P. Michalak, Talal Rahwan
Link prediction is one of the fundamental research problems in network analysis.
Social and Information Networks Cryptography and Security 91D30 (Primary) 68T20 (Secondary) G.2.2; J.4
no code implementations • 31 Dec 2017 • Mateusz K. Tarkowski, Tomasz P. Michalak, Talal Rahwan, Michael Wooldridge
Game-theoretic centrality is a flexible and sophisticated approach to identify the most important nodes in a network.
no code implementations • 1 Aug 2016 • Marcin Waniek, Tomasz Michalak, Talal Rahwan, Michael Wooldridge
With this in mind, we ask the question: Can individuals or groups actively manage their connections to evade social network analysis tools?
Social and Information Networks Physics and Society 91D30 (Primary) 68T20 (Secondary) G.2.2; J.4
no code implementations • 15 Jan 2014 • Talal Rahwan, Sarvapali Dyanand Ramchurn, Nicholas Robert Jennings, Andrea Giovannucci
The algorithm is anytime, and if interrupted before it would have normally terminated, it can still provide a solution that is guaranteed to be within a bound from the optimal one.
1 code implementation • 18 Jun 2013 • Sasan Maleki, Long Tran-Thanh, Greg Hines, Talal Rahwan, Alex Rogers
While this algorithm provides a bound on the approximation error, this bound is \textit{asymptotic}, meaning that it only holds when the number of samples increases to infinity.
Computer Science and Game Theory