Search Results for author: Ruoxi Jia

Found 54 papers, 29 papers with code

RigorLLM: Resilient Guardrails for Large Language Models against Undesired Content

no code implementations19 Mar 2024 Zhuowen Yuan, Zidi Xiong, Yi Zeng, Ning Yu, Ruoxi Jia, Dawn Song, Bo Li

The innovative use of constrained optimization and a fusion-based guardrail approach represents a significant step forward in developing more secure and reliable LLMs, setting a new standard for content moderation frameworks in the face of evolving digital threats.

Data Augmentation

Benchmarking Zero-Shot Robustness of Multimodal Foundation Models: A Pilot Study

1 code implementation15 Mar 2024 Chenguang Wang, Ruoxi Jia, Xin Liu, Dawn Song

We show that CLIP leads to a significant robustness drop compared to supervised ImageNet models on our benchmark, especially under synthetic distribution shift and adversarial attacks.

Benchmarking

The Mirrored Influence Hypothesis: Efficient Data Influence Estimation by Harnessing Forward Passes

no code implementations14 Feb 2024 Myeongseob Ko, Feiyang Kang, Weiyan Shi, Ming Jin, Zhou Yu, Ruoxi Jia

Inspired by this, we introduce a new method for estimating the influence of training data, which requires calculating gradients for specific test samples, paired with a forward pass for each training point.

Memorization

Efficient Data Shapley for Weighted Nearest Neighbor Algorithms

no code implementations20 Jan 2024 Jiachen T. Wang, Prateek Mittal, Ruoxi Jia

This work aims to address an open problem in data valuation literature concerning the efficient computation of Data Shapley for weighted $K$ nearest neighbor algorithm (WKNN-Shapley).

Computational Efficiency Data Valuation +1

How Johnny Can Persuade LLMs to Jailbreak Them: Rethinking Persuasion to Challenge AI Safety by Humanizing LLMs

1 code implementation12 Jan 2024 Yi Zeng, Hongpeng Lin, Jingwen Zhang, Diyi Yang, Ruoxi Jia, Weiyan Shi

This paper introduces a new perspective to jailbreak LLMs as human-like communicators, to explore this overlooked intersection between everyday language interaction and AI safety.

Data Acquisition: A New Frontier in Data-centric AI

no code implementations22 Nov 2023 Lingjiao Chen, Bilge Acun, Newsha Ardalani, Yifan Sun, Feiyang Kang, Hanrui Lyu, Yongchan Kwon, Ruoxi Jia, Carole-Jean Wu, Matei Zaharia, James Zou

As Machine Learning (ML) systems continue to grow, the demand for relevant and comprehensive datasets becomes imperative.

Learning to Rank for Active Learning via Multi-Task Bilevel Optimization

no code implementations25 Oct 2023 Zixin Ding, Si Chen, Ruoxi Jia, Yuxin Chen

To address these limitations, we propose a novel approach for active learning, which aims to select batches of unlabeled instances through a learned surrogate model for data acquisition.

Active Learning Bilevel Optimization +1

Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To!

1 code implementation5 Oct 2023 Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson

Optimizing large language models (LLMs) for downstream use cases often involves the customization of pre-trained LLMs through further fine-tuning.

Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study

1 code implementation ICCV 2023 Myeongseob Ko, Ming Jin, Chenguang Wang, Ruoxi Jia

Furthermore, our enhanced attacks outperform the baseline across multiple models and datasets, with the weakly supervised attack demonstrating an average-case performance improvement of $17\%$ and being at least $7$X more effective at low false-positive rates.

Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation

no code implementations30 Aug 2023 Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal

Data valuation aims to quantify the usefulness of individual data sources in training machine learning (ML) models, and is a critical aspect of data-centric ML research.

Data Valuation

Algorithm of Thoughts: Enhancing Exploration of Ideas in Large Language Models

no code implementations20 Aug 2023 Bilgehan Sel, Ahmad Al-Tawaha, Vanshaj Khattar, Ruoxi Jia, Ming Jin

Current literature, aiming to surpass the "Chain-of-Thought" approach, often resorts to an external modus operandi involving halting, modifying, and then resuming the generation process to boost Large Language Models' (LLMs) reasoning capacities.

In-Context Learning

2D-Shapley: A Framework for Fragmented Data Valuation

1 code implementation18 Jun 2023 Zhihong Liu, Hoang Anh Just, Xiangyu Chang, Xi Chen, Ruoxi Jia

Data valuation -- quantifying the contribution of individual data sources to certain predictive behaviors of a model -- is of great importance to enhancing the transparency of machine learning and designing incentive systems for data sharing.

counterfactual Data Valuation +1

Revisiting Data-Free Knowledge Distillation with Poisoned Teachers

1 code implementation4 Jun 2023 Junyuan Hong, Yi Zeng, Shuyang Yu, Lingjuan Lyu, Ruoxi Jia, Jiayu Zhou

Data-free knowledge distillation (KD) helps transfer knowledge from a pre-trained model (known as the teacher model) to a smaller model (known as the student model) without access to the original training data used for training the teacher model.

Backdoor Defense for Data-Free Distillation with Poisoned Teachers Data-free Knowledge Distillation

LAVA: Data Valuation without Pre-Specified Learning Algorithms

1 code implementation28 Apr 2023 Hoang Anh Just, Feiyang Kang, Jiachen T. Wang, Yi Zeng, Myeongseob Ko, Ming Jin, Ruoxi Jia

(1) We develop a proxy for the validation performance associated with a training set based on a non-conventional class-wise Wasserstein distance between training and validation sets.

Data Valuation

A Randomized Approach for Tight Privacy Accounting

no code implementations17 Apr 2023 Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal

In this paper, we propose a new differential privacy paradigm called estimate-verify-release (EVR), which addresses the challenges of providing a strict upper bound for privacy parameter in DP compositions by converting an estimate of privacy parameter into a formal guarantee.

Privacy Preserving

A Note on "Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms"

1 code implementation9 Apr 2023 Jiachen T. Wang, Ruoxi Jia

In this note, we revisit the work of Jia et al. (2019) and propose a more natural and interpretable utility function that better reflects the performance of KNN models.

Data Valuation

ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning Paradigms

1 code implementation22 Feb 2023 Minzhou Pan, Yi Zeng, Lingjuan Lyu, Xue Lin, Ruoxi Jia

However, we lack a thorough understanding of the applicability of existing detection methods across a variety of learning settings.

backdoor defense Self-Supervised Learning +1

A Note on "Towards Efficient Data Valuation Based on the Shapley Value''

no code implementations22 Feb 2023 Jiachen T. Wang, Ruoxi Jia

Our analysis and insights contribute to a better understanding of the challenges in developing efficient SV estimation algorithms for data valuation.

Data Valuation

On Solution Functions of Optimization: Universal Approximation and Covering Number Bounds

no code implementations2 Dec 2022 Ming Jin, Vanshaj Khattar, Harshal Kaushik, Bilgehan Sel, Ruoxi Jia

We study the expressibility and learnability of convex optimization solution functions and their multi-layer architectural extension.

Variance reduced Shapley value estimation for trustworthy data valuation

no code implementations30 Oct 2022 Mengmeng Wu, Ruoxi Jia, Changle lin, Wei Huang, Xiangyu Chang

Data valuation, especially quantifying data value in algorithmic prediction and decision-making, is a fundamental problem in data trading scenarios.

Data Valuation Decision Making

Renyi Differential Privacy of Propose-Test-Release and Applications to Private and Robust Machine Learning

no code implementations16 Sep 2022 Jiachen T. Wang, Saeed Mahloujifar, Shouda Wang, Ruoxi Jia, Prateek Mittal

As an application of our analysis, we show that PTR and our theoretical results can be used to design differentially private variants for byzantine robust training algorithms that use robust statistics for gradients aggregation.

Turning a Curse into a Blessing: Enabling In-Distribution-Data-Free Backdoor Removal via Stabilized Model Inversion

no code implementations14 Jun 2022 Si Chen, Yi Zeng, Jiachen T. Wang, Won Park, Xun Chen, Lingjuan Lyu, Zhuoqing Mao, Ruoxi Jia

Our work is the first to provide a thorough understanding of leveraging model inversion for effective backdoor removal by addressing key questions about reconstructed samples' properties, perceptual similarity, and the potential presence of backdoor triggers.

Data Banzhaf: A Robust Data Valuation Framework for Machine Learning

2 code implementations30 May 2022 Jiachen T. Wang, Ruoxi Jia

To address this challenge, we introduce the concept of safety margin, which measures the robustness of a data value notion.

Data Valuation

Just Fine-tune Twice: Selective Differential Privacy for Large Language Models

1 code implementation15 Apr 2022 Weiyan Shi, Ryan Shea, Si Chen, Chiyuan Zhang, Ruoxi Jia, Zhou Yu

Utilizing the fact that sensitive information in language data tends to be sparse, Shi et al. (2021) formalized a DP notion extension called Selective Differential Privacy (SDP) to protect only the sensitive tokens defined by a policy function.

Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information

2 code implementations11 Apr 2022 Yi Zeng, Minzhou Pan, Hoang Anh Just, Lingjuan Lyu, Meikang Qiu, Ruoxi Jia

With poisoning equal to or less than 0. 5% of the target-class data and 0. 05% of the training set, we can train a model to classify test examples from arbitrary classes into the target class when the examples are patched with a backdoor trigger.

Backdoor Attack Clean-label Backdoor Attack (0.024%) +1

Label-Only Model Inversion Attacks via Boundary Repulsion

1 code implementation CVPR 2022 Mostafa Kahla, Si Chen, Hoang Anh Just, Ruoxi Jia

In this paper, we introduce an algorithm, Boundary-Repelling Model Inversion (BREP-MI), to invert private training data using only the target model's predicted labels.

Face Recognition

ModelPred: A Framework for Predicting Trained Model from Training Data

1 code implementation24 Nov 2021 Yingyan Zeng, Jiachen T. Wang, Si Chen, Hoang Anh Just, Ran Jin, Ruoxi Jia

In this work, we propose ModelPred, a framework that helps to understand the impact of changes in training data on a trained model.

Data Valuation Memorization

Adversarial Unlearning of Backdoors via Implicit Hypergradient

3 code implementations ICLR 2022 Yi Zeng, Si Chen, Won Park, Z. Morley Mao, Ming Jin, Ruoxi Jia

Particularly, its performance is more robust to the variation on triggers, attack settings, poison ratio, and clean data size.

Towards General Robustness to Bad Training Data

no code implementations29 Sep 2021 Tianhao Wang, Yi Zeng, Ming Jin, Ruoxi Jia

In this paper, we focus on the problem of identifying bad training data when the underlying cause is unknown in advance.

Data Summarization

Selective Differential Privacy for Language Modeling

1 code implementation NAACL 2022 Weiyan Shi, Aiqi Cui, Evan Li, Ruoxi Jia, Zhou Yu

Given that the private information in natural language is sparse (for example, the bulk of an email might not carry personally identifiable information), we propose a new privacy notion, selective differential privacy, to provide rigorous privacy guarantees on the sensitive portion of the data to improve model utility.

Language Modelling Privacy Preserving

Zero-Round Active Learning

no code implementations14 Jul 2021 Si Chen, Tianhao Wang, Ruoxi Jia

Our algorithm does not rely on any feedback from annotators in the target domain and hence, can be used to perform zero-round active learning or warm-start existing multi-round active learning strategies.

Active Learning Domain Adaptation

Improving Cooperative Game Theory-based Data Valuation via Data Utility Learning

1 code implementation13 Jul 2021 Tianhao Wang, Yu Yang, Ruoxi Jia

The Shapley value (SV) and Least core (LC) are classic methods in cooperative game theory for cost/profit sharing problems.

Active Learning Data Valuation

A Unified Framework for Task-Driven Data Quality Management

no code implementations10 Jun 2021 Tianhao Wang, Yi Zeng, Ming Jin, Ruoxi Jia

High-quality data is critical to train performant Machine Learning (ML) models, highlighting the importance of Data Quality Management (DQM).

Data Summarization Data Valuation +1

One-Round Active Learning

no code implementations23 Apr 2021 Tianhao Wang, Si Chen, Ruoxi Jia

In this work, we initiate the study of one-round active learning, which aims to select a subset of unlabeled data points that achieve the highest model performance after being labeled with only the information from initially labeled data points.

Active Learning

Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective

1 code implementation ICCV 2021 Yi Zeng, Won Park, Z. Morley Mao, Ruoxi Jia

Acknowledging previous attacks' weaknesses, we propose a practical way to create smooth backdoor triggers without high-frequency artifacts and study their detectability.

D2p-fed:Differentially Private Federated Learning with Efficient Communication

no code implementations1 Jan 2021 Lun Wang, Ruoxi Jia, Dawn Song

We provide complete analysis of the privacy guarantee, communication cost and convergence rate of D2p-fed.

Federated Learning

Knowledge-Enriched Distributional Model Inversion Attacks

2 code implementations ICCV 2021 Si Chen, Mostafa Kahla, Ruoxi Jia, Guo-Jun Qi

We present a novel inversion-specific GAN that can better distill knowledge useful for performing attacks on private models from public data.

A Principled Approach to Data Valuation for Federated Learning

no code implementations14 Sep 2020 Tianhao Wang, Johannes Rausch, Ce Zhang, Ruoxi Jia, Dawn Song

The federated SV preserves the desirable properties of the canonical SV while it can be calculated without incurring extra communication cost and is also able to capture the effect of participation order on data value.

Data Summarization Data Valuation +1

Improving Robustness to Model Inversion Attacks via Mutual Information Regularization

2 code implementations11 Sep 2020 Tianhao Wang, Yuheng Zhang, Ruoxi Jia

This paper studies defense mechanisms against model inversion (MI) attacks -- a type of privacy attacks aimed at inferring information about the training data distribution given the access to a target machine learning model.

D2P-Fed: Differentially Private Federated Learning With Efficient Communication

no code implementations22 Jun 2020 Lun Wang, Ruoxi Jia, Dawn Song

In this paper, we propose the discrete Gaussian based differentially private federated learning (D2P-Fed), a unified scheme to achieve both differential privacy (DP) and communication efficiency in federated learning (FL).

Federated Learning

The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks

1 code implementation CVPR 2020 Yuheng Zhang, Ruoxi Jia, Hengzhi Pei, Wenxiao Wang, Bo Li, Dawn Song

This paper studies model-inversion attacks, in which the access to a model is abused to infer information about the training data.

Face Recognition regression

REFIT: A Unified Watermark Removal Framework For Deep Learning Systems With Limited Data

1 code implementation17 Nov 2019 Xinyun Chen, Wenxiao Wang, Chris Bender, Yiming Ding, Ruoxi Jia, Bo Li, Dawn Song

The experimental results demonstrate that our fine-tuning based watermark removal attacks could pose real threats to the copyright of pre-trained models, and thus highlight the importance of further investigating the watermarking problem and proposing more robust watermark embedding schemes against the attacks.

Scalability vs. Utility: Do We Have to Sacrifice One for the Other in Data Importance Quantification?

1 code implementation CVPR 2021 Ruoxi Jia, Fan Wu, Xuehui Sun, Jiacen Xu, David Dao, Bhavya Kailkhura, Ce Zhang, Bo Li, Dawn Song

Quantifying the importance of each training point to a learning task is a fundamental problem in machine learning and the estimated importance scores have been leveraged to guide a range of data workflows such as data summarization and domain adaption.

Data Summarization Domain Adaptation

Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy

no code implementations ICLR 2020 Min Du, Ruoxi Jia, Dawn Song

In this paper, we demonstrate that applying differential privacy can improve the utility of outlier detection and novelty detection, with an extension to detect poisoning samples in backdoor attacks.

Anomaly Detection Backdoor Attack +2

An Empirical and Comparative Analysis of Data Valuation with Scalable Algorithms

no code implementations25 Sep 2019 Ruoxi Jia, Xuehui Sun, Jiacen Xu, Ce Zhang, Bo Li, Dawn Song

Existing approximation algorithms, although achieving great improvement over the exact algorithm, relies on retraining models for multiple times, thus remaining limited when applied to larger-scale learning tasks and real-world datasets.

Data Summarization Data Valuation +1

Efficient Task-Specific Data Valuation for Nearest Neighbor Algorithms

3 code implementations22 Aug 2019 Ruoxi Jia, David Dao, Boxin Wang, Frances Ann Hubis, Nezihe Merve Gurel, Bo Li, Ce Zhang, Costas J. Spanos, Dawn Song

The most surprising result is that for unweighted $K$NN classifiers and regressors, the Shapley value of all $N$ data points can be computed, exactly, in $O(N\log N)$ time -- an exponential improvement on computational complexity!

Data Valuation Fairness

Towards Efficient Data Valuation Based on the Shapley Value

1 code implementation27 Feb 2019 Ruoxi Jia, David Dao, Boxin Wang, Frances Ann Hubis, Nick Hynes, Nezihe Merve Gurel, Bo Li, Ce Zhang, Dawn Song, Costas Spanos

In this paper, we study the problem of data valuation by utilizing the Shapley value, a popular notion of value which originated in cooperative game theory.

Data Valuation

One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy

no code implementations23 Oct 2018 Jingkang Wang, Ruoxi Jia, Gerald Friedland, Bo Li, Costas Spanos

Despite the great success achieved in machine learning (ML), adversarial examples have caused concerns with regards to its trustworthiness: A small perturbation of an input results in an arbitrary failure of an otherwise seemingly well-trained ML model.

Decision Making

The Helmholtz Method: Using Perceptual Compression to Reduce Machine Learning Complexity

1 code implementation10 Jul 2018 Gerald Friedland, Jingkang Wang, Ruoxi Jia, Bo Li

This paper proposes a fundamental answer to a frequently asked question in multimedia computing and machine learning: Do artifacts from perceptual compression contribute to error in the machine learning process and if so, how much?

BIG-bench Machine Learning

Environmental Sensing by Wearable Device for Indoor Activity and Location Estimation

no code implementations22 Jun 2014 Ming Jin, Han Zou, Kevin Weekly, Ruoxi Jia, Alexandre M. Bayen, Costas J. Spanos

We present results from a set of experiments in this pilot study to investigate the causal influence of user activity on various environmental parameters monitored by occupant carried multi-purpose sensors.

energy management Management +1

Cannot find the paper you are looking for? You can Submit a new open access paper.