Skip to main content

Showing 1–50 of 171 results for author: Fritz, M

  1. arXiv:2410.15939  [pdf, other

    cs.CL

    CausalGraph2LLM: Evaluating LLMs for Causal Queries

    Authors: Ivaxi Sheth, Bahare Fatemi, Mario Fritz

    Abstract: Causality is essential in scientific research, enabling researchers to interpret true relationships between variables. These causal relationships are often represented by causal graphs, which are directed acyclic graphs. With the recent advancements in Large Language Models (LLMs), there is an increasing interest in exploring their capabilities in causal reasoning and their potential use to hypoth… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

    Comments: Code - https://github.com/ivaxi0s/CausalGraph2LLM

  2. arXiv:2410.15828  [pdf, other

    cs.AI

    LLM4GRN: Discovering Causal Gene Regulatory Networks with LLMs -- Evaluation through Synthetic Data Generation

    Authors: Tejumade Afonja, Ivaxi Sheth, Ruta Binkyte, Waqar Hanif, Thomas Ulas, Matthias Becker, Mario Fritz

    Abstract: Gene regulatory networks (GRNs) represent the causal relationships between transcription factors (TFs) and target genes in single-cell RNA sequencing (scRNA-seq) data. Understanding these networks is crucial for uncovering disease mechanisms and identifying therapeutic targets. In this work, we investigate the potential of large language models (LLMs) for GRN discovery, leveraging their learned bi… ▽ More

    Submitted 21 October, 2024; originally announced October 2024.

  3. arXiv:2410.11387  [pdf, other

    cs.RO

    LLM2Swarm: Robot Swarms that Responsively Reason, Plan, and Collaborate through LLMs

    Authors: Volker Strobel, Marco Dorigo, Mario Fritz

    Abstract: Robot swarms are composed of many simple robots that communicate and collaborate to fulfill complex tasks. Robot controllers usually need to be specified by experts on a case-by-case basis via programming code. This process is time-consuming, prone to errors, and unable to take into account all situations that may be encountered during deployment. On the other hand, recent Large Language Models (L… ▽ More

    Submitted 16 October, 2024; v1 submitted 15 October, 2024; originally announced October 2024.

    Comments: Accepted at NeurIPS 2024 Workshop on Open-World Agents

  4. arXiv:2409.17836  [pdf, other

    cs.LG cs.AI

    Language Models as Zero-shot Lossless Gradient Compressors: Towards General Neural Parameter Prior Models

    Authors: Hui-Po Wang, Mario Fritz

    Abstract: Despite the widespread use of statistical prior models in various fields, such models for neural network gradients have long been overlooked. The inherent challenge stems from their high-dimensional structures and complex interdependencies, which complicate effective modeling. In this work, we demonstrate the potential of large language models (LLMs) to act as gradient priors in a zero-shot settin… ▽ More

    Submitted 26 September, 2024; originally announced September 2024.

    Comments: To appear in NeurIPS 2024

  5. arXiv:2409.11550  [pdf, other

    q-bio.PE physics.bio-ph

    A weather-driven mathematical model of Culex population abundance and the impact of vector control interventions

    Authors: Suman Bhowmick, Patrick Irwin, Kristina Lopez, Megan Lindsay Fritz, Rebecca Lee Smith

    Abstract: Even as the incidence of mosquito-borne diseases like West Nile Virus (WNV) in North America has risen over the past decade, effectively modelling mosquito population density or, the abundance has proven to be a persistent challenge. It is critical to capture the fluctuations in mosquito abundance across seasons in order to forecast the varying risk of disease transmission from one year to the nex… ▽ More

    Submitted 17 September, 2024; originally announced September 2024.

  6. arXiv:2409.06446  [pdf, other

    cs.CR cs.AI cs.CL cs.LG cs.SE

    HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data

    Authors: Hossein Hajipour, Lea Schönherr, Thorsten Holz, Mario Fritz

    Abstract: Large language models (LLMs) have shown great potential for automatic code generation and form the basis for various tools such as GitHub Copilot. However, recent studies highlight that many LLM-generated code contains serious security vulnerabilities. While previous work tries to address this by training models that generate secure code, these attempts remain constrained by limited access to trai… ▽ More

    Submitted 10 September, 2024; originally announced September 2024.

    Comments: 24 pages, 16 tables, 8 figures

  7. arXiv:2409.02604  [pdf, other

    cs.LG stat.ME

    Hypothesizing Missing Causal Variables with LLMs

    Authors: Ivaxi Sheth, Sahar Abdelnabi, Mario Fritz

    Abstract: Scientific discovery is a catalyst for human intellectual advances, driven by the cycle of hypothesis generation, experimental design, data evaluation, and iterative assumption refinement. This process, while crucial, is expensive and heavily dependent on the domain knowledge of scientists to generate hypotheses and navigate the scientific cycle. Central to this is causality, the ability to establ… ▽ More

    Submitted 4 September, 2024; originally announced September 2024.

    Comments: Code - https://github.com/ivaxi0s/hypothesizing-causal-variable-llm

  8. arXiv:2409.01067  [pdf, other

    math.AP math.NA

    Well-posedness, long-time behavior, and discretization of some models of nonlinear acoustics in velocity-enthalpy formulation

    Authors: Herbert Egger, Marvin Fritz

    Abstract: We study a class of models for nonlinear acoustics, including the well-known Westervelt and Kuznetsov equations, as well as a model of Rasmussen that can be seen as a thermodynamically consistent modification of the latter. Using linearization, energy estimates, and fixed-point arguments, we establish the existence and uniqueness of solutions that, for sufficiently small data, are global in time a… ▽ More

    Submitted 2 September, 2024; originally announced September 2024.

  9. arXiv:2408.13586  [pdf, other

    cs.CL cs.AI

    Balancing Diversity and Risk in LLM Sampling: How to Select Your Method and Parameter for Open-Ended Text Generation

    Authors: Yuxuan Zhou, Margret Keuper, Mario Fritz

    Abstract: Sampling-based decoding strategies have been widely adopted for Large Language Models (LLMs) in numerous applications, which target a balance between diversity and quality via temperature tuning and tail truncation (e.g., top-k and top-p sampling). Considering the high dynamic range of the candidate next-token given different prefixes, recent studies propose to adaptively truncate the tail of LLM'… ▽ More

    Submitted 24 August, 2024; originally announced August 2024.

  10. arXiv:2408.11046  [pdf, other

    cs.CL

    Inside the Black Box: Detecting Data Leakage in Pre-trained Language Encoders

    Authors: Yuan Xin, Zheng Li, Ning Yu, Dingfan Chen, Mario Fritz, Michael Backes, Yang Zhang

    Abstract: Despite being prevalent in the general field of Natural Language Processing (NLP), pre-trained language models inherently carry privacy and copyright concerns due to their nature of training on large-scale web-scraped data. In this paper, we pioneer a systematic exploration of such risks associated with pre-trained language encoders, specifically focusing on the membership leakage of pre-training… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

    Comments: ECAI24

  11. arXiv:2407.12349  [pdf, other

    math.NA math.AP

    Structure-preserving approximation of the Cahn-Hilliard-Biot system

    Authors: Aaron Brunk, Marvin Fritz

    Abstract: In this work, we propose a structure-preserving discretisation for the recently studied Cahn-Hilliard-Biot system using conforming finite elements in space and problem-adapted explicit-implicit Euler time integration. We prove that the scheme preserves the thermodynamic structure, that is, the balance of mass and volumetric fluid content and the energy dissipation balance. The existence of discret… ▽ More

    Submitted 17 July, 2024; originally announced July 2024.

    Comments: 25 pages; 5 figures

  12. arXiv:2406.11522  [pdf, other

    cs.LG cs.AI cs.CR

    FullCert: Deterministic End-to-End Certification for Training and Inference of Neural Networks

    Authors: Tobias Lorenz, Marta Kwiatkowska, Mario Fritz

    Abstract: Modern machine learning models are sensitive to the manipulation of both the training data (poisoning attacks) and inference data (adversarial examples). Recognizing this issue, the community has developed many empirical defenses against both attacks and, more recently, certification methods with provable guarantees against inference-time attacks. However, such guarantees are still largely lacking… ▽ More

    Submitted 11 September, 2024; v1 submitted 17 June, 2024; originally announced June 2024.

    Comments: This preprint has not undergone peer review or any post-submission improvements or corrections. The Version of Record of this contribution is published in DAGM GCPR 2024

  13. arXiv:2406.07954  [pdf, other

    cs.CR cs.AI

    Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition

    Authors: Edoardo Debenedetti, Javier Rando, Daniel Paleka, Silaghi Fineas Florin, Dragos Albastroiu, Niv Cohen, Yuval Lemberg, Reshmi Ghosh, Rui Wen, Ahmed Salem, Giovanni Cherubin, Santiago Zanella-Beguelin, Robin Schmid, Victor Klemm, Takahiro Miki, Chenhao Li, Stefan Kraft, Mario Fritz, Florian Tramèr, Sahar Abdelnabi, Lea Schönherr

    Abstract: Large language model systems face important security risks from maliciously crafted messages that aim to overwrite the system's original instructions or leak private data. To study this problem, we organized a capture-the-flag competition at IEEE SaTML 2024, where the flag is a secret string in the LLM system prompt. The competition was organized in two phases. In the first phase, teams developed… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  14. arXiv:2406.01189  [pdf, other

    cs.LG cs.AI

    MultiMax: Sparse and Multi-Modal Attention Learning

    Authors: Yuxuan Zhou, Mario Fritz, Margret Keuper

    Abstract: SoftMax is a ubiquitous ingredient of modern machine learning algorithms. It maps an input vector onto a probability simplex and reweights the input by concentrating the probability mass at large entries. Yet, as a smooth approximation to the Argmax function, a significant amount of probability mass is distributed to other, residual entries, leading to poor interpretability and noise. Although spa… ▽ More

    Submitted 4 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

    Comments: Accepted at ICML 2024

  15. arXiv:2406.00799  [pdf, other

    cs.CR cs.CL cs.CY

    Are you still on track!? Catching LLM Task Drift with Activations

    Authors: Sahar Abdelnabi, Aideen Fay, Giovanni Cherubin, Ahmed Salem, Mario Fritz, Andrew Paverd

    Abstract: Large Language Models (LLMs) are routinely used in retrieval-augmented applications to orchestrate tasks and process inputs from users and other sources. These inputs, even in a single LLM interaction, can come from a variety of sources, of varying trustworthiness and provenance. This opens the door to prompt injection attacks, where the LLM receives and acts upon instructions from supposedly data… ▽ More

    Submitted 19 July, 2024; v1 submitted 2 June, 2024; originally announced June 2024.

  16. arXiv:2405.07004  [pdf, other

    cs.CR cs.LG

    Stealthy Imitation: Reward-guided Environment-free Policy Stealing

    Authors: Zhixiong Zhuang, Maria-Irina Nicolae, Mario Fritz

    Abstract: Deep reinforcement learning policies, which are integral to modern control systems, represent valuable intellectual property. The development of these policies demands considerable resources, such as domain expertise, simulation fidelity, and real-world validation. These policies are potentially vulnerable to model stealing attacks, which aim to replicate their functionality using only black-box a… ▽ More

    Submitted 11 May, 2024; originally announced May 2024.

    Comments: Accepted at ICML 2024. Project page: https://zhixiongzh.github.io/stealthy-imitation

  17. arXiv:2404.04722  [pdf, other

    cs.CL cs.CR cs.SE

    PoLLMgraph: Unraveling Hallucinations in Large Language Models via State Transition Dynamics

    Authors: Derui Zhu, Dingfan Chen, Qing Li, Zongxiong Chen, Lei Ma, Jens Grossklags, Mario Fritz

    Abstract: Despite tremendous advancements in large language models (LLMs) over recent years, a notably urgent challenge for their practical deployment is the phenomenon of hallucination, where the model fabricates facts and produces non-factual statements. In response, we propose PoLLMgraph, a Polygraph for LLMs, as an effective model-based white-box detection and forecasting approach. PoLLMgraph distinctly… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

    Comments: 15 pages

  18. arXiv:2403.06833  [pdf, other

    cs.LG cs.CL

    Can LLMs Separate Instructions From Data? And What Do We Even Mean By That?

    Authors: Egor Zverev, Sahar Abdelnabi, Soroush Tabesh, Mario Fritz, Christoph H. Lampert

    Abstract: Instruction-tuned Large Language Models (LLMs) show impressive results in numerous practical applications, but they lack essential safety features that are common in other areas of computer science, particularly an explicit separation of instructions and data. This makes them vulnerable to manipulations such as indirect prompt injections and generally unsuitable for safety-critical tasks. Surprisi… ▽ More

    Submitted 3 June, 2024; v1 submitted 11 March, 2024; originally announced March 2024.

    Comments: GitHub: https://github.com/egozverev/Shold-It-Be-Executed-Or-Processed. 10 pages main text, 30 pages in total

  19. arXiv:2402.18216  [pdf, other

    cs.CL

    LLM Task Interference: An Initial Study on the Impact of Task-Switch in Conversational History

    Authors: Akash Gupta, Ivaxi Sheth, Vyas Raina, Mark Gales, Mario Fritz

    Abstract: With the recent emergence of powerful instruction-tuned large language models (LLMs), various helpful conversational Artificial Intelligence (AI) systems have been deployed across many applications. When prompted by users, these AI systems successfully perform a wide range of tasks as part of a conversation. To provide some sort of memory and context, such approaches typically condition their outp… ▽ More

    Submitted 11 October, 2024; v1 submitted 28 February, 2024; originally announced February 2024.

    Comments: 20 pages, 13 figures, 20 tables, EMNLP Main Conference 2024

  20. arXiv:2402.11005  [pdf, other

    cs.CL cs.AI

    Exploring Value Biases: How LLMs Deviate Towards the Ideal

    Authors: Sarath Sivaprasad, Pramod Kaushik, Sahar Abdelnabi, Mario Fritz

    Abstract: Large-Language-Models (LLMs) are deployed in a wide range of applications, and their response has an increasing social impact. Understanding the non-deliberate(ive) mechanism of LLMs in giving responses is essential in explaining their performance and discerning their biases in real-world applications. This is analogous to human studies, where such inadvertent responses are referred to as sampling… ▽ More

    Submitted 21 February, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

  21. arXiv:2402.08400  [pdf, other

    cs.LG cs.CV

    Adaptive Hierarchical Certification for Segmentation using Randomized Smoothing

    Authors: Alaa Anani, Tobias Lorenz, Bernt Schiele, Mario Fritz

    Abstract: Certification for machine learning is proving that no adversarial sample can evade a model within a range under certain conditions, a necessity for safety-critical domains. Common certification methods for segmentation use a flat set of fine-grained classes, leading to high abstain rates due to model uncertainty across many classes. We propose a novel, more practical setting, which certifies pixel… ▽ More

    Submitted 3 June, 2024; v1 submitted 13 February, 2024; originally announced February 2024.

    Journal ref: International Conference on Machine Learning (ICML), 2024

  22. arXiv:2402.04912  [pdf, other

    cs.CR cs.LG

    Towards Biologically Plausible and Private Gene Expression Data Generation

    Authors: Dingfan Chen, Marie Oestreich, Tejumade Afonja, Raouf Kerkouche, Matthias Becker, Mario Fritz

    Abstract: Generative models trained with Differential Privacy (DP) are becoming increasingly prominent in the creation of synthetic data for downstream applications. Existing literature, however, primarily focuses on basic benchmarking datasets and tends to report promising results only for elementary metrics and relatively simple data distributions. In this paper, we initiate a systematic analysis of how D… ▽ More

    Submitted 7 February, 2024; originally announced February 2024.

    Journal ref: Proceedings on Privacy Enhancing Technologies (PoPETs 2024)

  23. arXiv:2312.10108  [pdf, other

    cs.CV cs.AI cs.LG

    Privacy-Aware Document Visual Question Answering

    Authors: Rubèn Tito, Khanh Nguyen, Marlon Tobaben, Raouf Kerkouche, Mohamed Ali Souibgui, Kangsoo Jung, Joonas Jälkö, Vincent Poulain D'Andecy, Aurelie Joseph, Lei Kang, Ernest Valveny, Antti Honkela, Mario Fritz, Dimosthenis Karatzas

    Abstract: Document Visual Question Answering (DocVQA) has quickly grown into a central task of document understanding. But despite the fact that documents contain sensitive or copyrighted information, none of the current DocVQA methods offers strong privacy guarantees. In this work, we explore privacy in the domain of DocVQA for the first time, highlighting privacy issues in state of the art multi-modal LLM… ▽ More

    Submitted 2 September, 2024; v1 submitted 15 December, 2023; originally announced December 2023.

    Comments: 35 pages, 12 figures, accepted for publication at the 18th International Conference on Document Analysis and Recognition, ICDAR 2024

  24. arXiv:2312.06288  [pdf, other

    math.AP math.PR q-bio.QM

    Analysis and computations of a stochastic Cahn-Hilliard model for tumor growth with chemotaxis and variable mobility

    Authors: Marvin Fritz, Luca Scarpa

    Abstract: In this work, we present and analyze a system of PDEs, which models tumor growth by considering chemotaxis, active transport, and random effects. The stochasticity of the system is modelled by random initial data and Wiener noises that appear in the tumor and nutrient equations. The volume fraction of the tumor is governed by a stochastic phase-field equation of Cahn-Hilliard type, and the mass de… ▽ More

    Submitted 11 December, 2023; originally announced December 2023.

    MSC Class: 35K25; 35R60; 60H15; 92C17; 92C37

  25. arXiv:2310.12665  [pdf, other

    cs.CR cs.LG

    SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

    Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang

    Abstract: While advanced machine learning (ML) models are deployed in numerous real-world applications, previous works demonstrate these models have security and privacy vulnerabilities. Various empirical research has been done in this field. However, most of the experiments are performed on target ML models trained by the security researchers themselves. Due to the high computational resource requirement f… ▽ More

    Submitted 19 October, 2023; originally announced October 2023.

    Comments: To appear in the 33rd USENIX Security Symposium, August 2024, Philadelphia, PA, USA

  26. arXiv:2310.07050  [pdf, other

    math.AP

    On the well-posedness of the Cahn-Hilliard-Biot model and its applications to tumor growth

    Authors: Marvin Fritz

    Abstract: We study the Cahn-Hilliard-Biot model with respect to its mathematical well-posedness. The system models flow through deformable porous media in which the solid material has two phases with distinct material properties. The two phases of the porous material evolve according to a generalized Ginzburg-Landau energy functional, with additional influence from both viscoelastic and fluid effects. The f… ▽ More

    Submitted 3 October, 2024; v1 submitted 10 October, 2023; originally announced October 2023.

    MSC Class: 35A01; 35A02; 35D30; 35Q92; 65M60

  27. arXiv:2310.05875  [pdf, other

    q-bio.PE physics.bio-ph physics.pop-ph

    Host-feeding preferences and temperature shape the dynamics of West Nile virus: a mathematical model of assessing the abatement planning

    Authors: Suman Bhowmick, Megan Fritz, Rebecca Lee Smith

    Abstract: West Nile virus (WNV) is prevalent in the United States but it shows considerable divergence in transmission patterns and spatio-temporal intensity.It is to be noted that the mechanism that drives the transmission potential of WNV is described by the abilities of host species to maintain and disseminate the pathogens pertinent with different eco-epidemiological factors that have an influence on th… ▽ More

    Submitted 9 October, 2023; originally announced October 2023.

  28. arXiv:2310.00797  [pdf, other

    cs.LG

    Don't Miss Out on Novelty: Importance of Novel Features for Deep Anomaly Detection

    Authors: Sarath Sivaprasad, Mario Fritz

    Abstract: Anomaly Detection (AD) is a critical task that involves identifying observations that do not conform to a learned model of normality. Prior work in deep AD is predominantly based on a familiarity hypothesis, where familiar features serve as the reference in a pre-trained embedding space. While this strategy has proven highly successful, it turns out that it causes consistent false negatives when a… ▽ More

    Submitted 26 February, 2024; v1 submitted 1 October, 2023; originally announced October 2023.

  29. arXiv:2309.17234  [pdf, other

    cs.CL cs.CY cs.LG

    Cooperation, Competition, and Maliciousness: LLM-Stakeholders Interactive Negotiation

    Authors: Sahar Abdelnabi, Amr Gomaa, Sarath Sivaprasad, Lea Schönherr, Mario Fritz

    Abstract: There is an growing interest in using Large Language Models (LLMs) in multi-agent systems to tackle interactive real-world tasks that require effective collaboration and assessing complex situations. Yet, we still have a limited understanding of LLMs' communication and decision-making abilities in multi-agent setups. The fundamental task of negotiation spans many key features of communication, suc… ▽ More

    Submitted 10 June, 2024; v1 submitted 29 September, 2023; originally announced September 2023.

    Comments: Updated version with major additions (new experiments, evaluation, and attacks)

  30. arXiv:2309.15696  [pdf, other

    cs.LG cs.CV

    A Unified View of Differentially Private Deep Generative Modeling

    Authors: Dingfan Chen, Raouf Kerkouche, Mario Fritz

    Abstract: The availability of rich and vast data sources has greatly advanced machine learning applications in various domains. However, data with privacy concerns comes with stringent regulations that frequently prohibited data access and data sharing. Overcoming these obstacles in compliance with privacy considerations is key for technological progress in many real-world application scenarios that involve… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  31. arXiv:2309.06166  [pdf, other

    cs.LG cs.CV stat.ML

    Certified Robust Models with Slack Control and Large Lipschitz Constants

    Authors: Max Losch, David Stutz, Bernt Schiele, Mario Fritz

    Abstract: Despite recent success, state-of-the-art learning-based models remain highly vulnerable to input changes such as adversarial examples. In order to obtain certifiable robustness against such perturbations, recent work considers Lipschitz-based regularizers or constraints while at the same time increasing prediction margin. Unfortunately, this comes at the cost of significantly decreased accuracy. I… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: To be published at GCPR 2023

  32. From Attachments to SEO: Click Here to Learn More about Clickbait PDFs!

    Authors: Giada Stivala, Sahar Abdelnabi, Andrea Mengascini, Mariano Graziano, Mario Fritz, Giancarlo Pellegrino

    Abstract: Clickbait PDFs are PDF documents that do not embed malware but trick victims into visiting malicious web pages leading to attacks like password theft or drive-by download. While recent reports indicate a surge of clickbait PDFs, prior works have largely neglected this new threat, considering PDFs only as accessories of email phishing campaigns. This paper investigates the landscape of clickbait… ▽ More

    Submitted 22 December, 2023; v1 submitted 2 August, 2023; originally announced August 2023.

    Comments: Corrected symbols in Table 1

  33. arXiv:2307.16615  [pdf, other

    math.AP

    Well-posedness and simulation of weak solutions to the time-fractional Fokker-Planck equation with general forcing

    Authors: Marvin Fritz

    Abstract: In this paper, we investigate the well-posedness of weak solutions to the time-fractional Fokker-Planck equation. Its dynamics is governed by anomalous diffusion, and we consider the most general case of space-time dependent forces. Consequently, the fractional derivatives appear on the right-hand side of the equation, and they cannot be brought to the left-hand side, which would have been prefera… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    MSC Class: 35R11; 35D30; 35A01; 65M60

  34. arXiv:2307.16606  [pdf, other

    math.AP

    Analysis of a dilute polymer model with a time-fractional derivative

    Authors: Marvin Fritz, Endre Süli, Barbara Wohlmuth

    Abstract: We investigate the well-posedness of a coupled Navier-Stokes-Fokker-Planck system with a time-fractional derivative. Such systems arise in the kinetic theory of dilute solutions of polymeric liquids, where the motion of noninteracting polymer chains in a Newtonian solvent is modelled by a stochastic process exhibiting power-law waiting time, in order to capture subdiffusive processes associated wi… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    MSC Class: 35Q30; 35Q84; 35R11; 60G22; 82C31; 82D60

  35. arXiv:2307.07997  [pdf, other

    cs.LG cs.AI

    MargCTGAN: A "Marginally'' Better CTGAN for the Low Sample Regime

    Authors: Tejumade Afonja, Dingfan Chen, Mario Fritz

    Abstract: The potential of realistic and useful synthetic data is significant. However, current evaluation methods for synthetic tabular data generation predominantly focus on downstream task usefulness, often neglecting the importance of statistical properties. This oversight becomes particularly prominent in low sample scenarios, accompanied by a swift deterioration of these statistical measures. In this… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

    Comments: ICML 2023 Workshop on Deployable Generative AI

  36. arXiv:2306.10898  [pdf, other

    cs.CV

    B-cos Alignment for Inherently Interpretable CNNs and Vision Transformers

    Authors: Moritz Böhle, Navdeeppal Singh, Mario Fritz, Bernt Schiele

    Abstract: We present a new direction for increasing the interpretability of deep neural networks (DNNs) by promoting weight-input alignment during training. For this, we propose to replace the linear transformations in DNNs by our novel B-cos transformation. As we show, a sequence (network) of such transformations induces a single linear transformation that faithfully summarises the full model computations.… ▽ More

    Submitted 15 January, 2024; v1 submitted 19 June, 2023; originally announced June 2023.

    Comments: Extension of B-cos Networks: Alignment is All We Need for Interpretability (Böhle et al., CVPR 2022). Accepted for publication in IEEE Transactions on Pattern Analysis and Machine Intelligence. arXiv admin note: substantial text overlap with arXiv:2205.10268

  37. arXiv:2306.04883  [pdf

    cs.CR

    From Bad to Worse: Using Private Data to Propagate Disinformation on Online Platforms with a Greater Efficiency

    Authors: Protik Bose Pranto, Waqar Hassan Khan, Sahar Abdelnabi, Rebecca Weil, Mario Fritz, Rakibul Hasan

    Abstract: We outline a planned experiment to investigate if personal data (e.g., demographics and behavioral patterns) can be used to selectively expose individuals to disinformation such that an adversary can spread disinformation more efficiently compared to broadcasting the same information to everyone. This mechanism, if effective, will have devastating consequences as modern technologies collect and in… ▽ More

    Submitted 7 June, 2023; originally announced June 2023.

  38. arXiv:2305.15359  [pdf, other

    cs.CR stat.AP

    Private and Collaborative Kaplan-Meier Estimators

    Authors: Shadi Rahimian, Raouf Kerkouche, Ina Kurth, Mario Fritz

    Abstract: Kaplan-Meier estimators are essential tools in survival analysis, capturing the survival behavior of a cohort. Their accuracy improves with large, diverse datasets, encouraging data holders to collaborate for more precise estimations. However, these datasets often contain sensitive individual information, necessitating stringent data protection measures that preclude naive data sharing. In this… ▽ More

    Submitted 29 July, 2024; v1 submitted 24 May, 2023; originally announced May 2023.

  39. arXiv:2303.10968  [pdf, other

    math.DS q-bio.QM

    Tumor evolution models of phase-field type with nonlocal effects and angiogenesis

    Authors: Marvin Fritz

    Abstract: In this survey article, a variety of systems modeling tumor growth are discussed. In accordance with the hallmarks of cancer, the described models incorporate the primary characteristics of cancer evolution. Specifically, we focus on diffusive interface models and follow the phase-field approach that describes the tumor as a collection of cells. Such systems are based on a multiphase approach that… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    MSC Class: 65M80; 92C17; 92C37; 92C42

  40. arXiv:2303.09378  [pdf, other

    math.NA q-bio.TO

    A phase-field model for non-small cell lung cancer under the effects of immunotherapy

    Authors: Andreas Wagner, Pirmin Schlicke, Marvin Fritz, Christina Kuttler, J. Tinsley Oden, Christian Schumann, Barbara Wohlmuth

    Abstract: Formulating tumor models that predict growth under therapy is vital for improving patient-specific treatment plans. In this context, we present our recent work on simulating non-small-scale cell lung cancer (NSCLC) in a simple, deterministic setting for two different patients receiving an immunotherapeutic treatment. At its core, our model consists of a Cahn-Hilliard-based phase-field model desc… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  41. arXiv:2303.03908  [pdf, other

    cs.CR cs.LG

    Client-specific Property Inference against Secure Aggregation in Federated Learning

    Authors: Raouf Kerkouche, Gergely Ács, Mario Fritz

    Abstract: Federated learning has become a widely used paradigm for collaboratively training a common model among different participants with the help of a central server that coordinates the training. Although only the model parameters or other model updates are exchanged during the federated training instead of the participant's data, many attacks have shown that it is still possible to infer sensitive inf… ▽ More

    Submitted 27 October, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: Workshop on Privacy in the Electronic Society (WPES'23), held in conjunction with CCS'23

  42. arXiv:2302.12173  [pdf, other

    cs.CR cs.AI cs.CL cs.CY

    Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection

    Authors: Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz

    Abstract: Large Language Models (LLMs) are increasingly being integrated into various applications. The functionalities of recent LLMs can be flexibly modulated via natural language prompts. This renders them susceptible to targeted adversarial prompting, e.g., Prompt Injection (PI) attacks enable attackers to override original instructions and employed controls. So far, it was assumed that the user is dire… ▽ More

    Submitted 5 May, 2023; v1 submitted 23 February, 2023; originally announced February 2023.

  43. arXiv:2302.07801  [pdf, other

    cs.LG cs.CR

    Data Forensics in Diffusion Models: A Systematic Analysis of Membership Privacy

    Authors: Derui Zhu, Dingfan Chen, Jens Grossklags, Mario Fritz

    Abstract: In recent years, diffusion models have achieved tremendous success in the field of image generation, becoming the stateof-the-art technology for AI-based image processing applications. Despite the numerous benefits brought by recent advances in diffusion models, there are also concerns about their potential misuse, specifically in terms of privacy breaches and intellectual property infringement. I… ▽ More

    Submitted 5 August, 2023; v1 submitted 15 February, 2023; originally announced February 2023.

  44. arXiv:2302.04012  [pdf, other

    cs.CR cs.AI cs.CL cs.LG cs.SE

    CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models

    Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz

    Abstract: Large language models (LLMs) for automatic code generation have achieved breakthroughs in several programming tasks. Their advances in competition-level programming problems have made them an essential pillar of AI-assisted pair programming, and tools such as GitHub Copilot have emerged as part of the daily programming workflow used by millions of developers. The training data for these models is… ▽ More

    Submitted 23 October, 2023; v1 submitted 8 February, 2023; originally announced February 2023.

    Comments: 23 pages, 9 figures

  45. arXiv:2302.01068  [pdf, other

    cs.LG

    FedLAP-DP: Federated Learning by Sharing Differentially Private Loss Approximations

    Authors: Hui-Po Wang, Dingfan Chen, Raouf Kerkouche, Mario Fritz

    Abstract: Conventional gradient-sharing approaches for federated learning (FL), such as FedAvg, rely on aggregation of local models and often face performance degradation under differential privacy (DP) mechanisms or data heterogeneity, which can be attributed to the inconsistency between the local and global objectives. To address this issue, we propose FedLAP-DP, a novel privacy-preserving approach for FL… ▽ More

    Submitted 2 May, 2024; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: To appear in PoPETS'24

  46. arXiv:2301.08669  [pdf, other

    cs.CV stat.ML

    Holistically Explainable Vision Transformers

    Authors: Moritz Böhle, Mario Fritz, Bernt Schiele

    Abstract: Transformers increasingly dominate the machine learning landscape across many tasks and domains, which increases the importance for understanding their outputs. While their attention modules provide partial insight into their inner workings, the attention scores have been shown to be insufficient for explaining the models as a whole. To address this, we propose B-cos transformers, which inherently… ▽ More

    Submitted 20 January, 2023; originally announced January 2023.

  47. arXiv:2211.04446  [pdf, other

    cs.CR cs.AI cs.LG

    Private Set Generation with Discriminative Information

    Authors: Dingfan Chen, Raouf Kerkouche, Mario Fritz

    Abstract: Differentially private data generation techniques have become a promising solution to the data privacy challenge -- it enables sharing of data while complying with rigorous privacy guarantees, which is essential for scientific progress in sensitive domains. Unfortunately, restricted by the inherent complexity of modeling high-dimensional distributions, existing private generative models are strugg… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Comments: NeurIPS 2022, 19 pages

    Journal ref: 36th Conference on Neural Information Processing Systems (NeurIPS 2022)

  48. arXiv:2210.04802  [pdf, other

    cs.SE cs.AI cs.CL cs.LG cs.PL

    SimSCOOD: Systematic Analysis of Out-of-Distribution Generalization in Fine-tuned Source Code Models

    Authors: Hossein Hajipour, Ning Yu, Cristian-Alexandru Staicu, Mario Fritz

    Abstract: Large code datasets have become increasingly accessible for pre-training source code models. However, for the fine-tuning phase, obtaining representative training data that fully covers the code distribution for specific downstream tasks remains challenging due to the task-specific nature and limited labeling resources. Moreover, fine-tuning pretrained models can result in forgetting previously ac… ▽ More

    Submitted 30 October, 2023; v1 submitted 10 October, 2022; originally announced October 2022.

    Comments: 19 pages, 6 figures

  49. arXiv:2210.00957  [pdf, other

    cs.CR cs.CV cs.LG

    UnGANable: Defending Against GAN-based Face Manipulation

    Authors: Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang

    Abstract: Deepfakes pose severe threats of visual misinformation to our society. One representative deepfake application is face manipulation that modifies a victim's facial attributes in an image, e.g., changing her age or hair color. The state-of-the-art face manipulation techniques rely on Generative Adversarial Networks (GANs). In this paper, we propose the first defense system, namely UnGANable, agains… ▽ More

    Submitted 3 October, 2022; originally announced October 2022.

    Comments: Accepted by USENIX Security 2023

  50. arXiv:2209.03755  [pdf, other

    cs.CR cs.CL cs.CY cs.LG

    Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against Fact-Verification Systems

    Authors: Sahar Abdelnabi, Mario Fritz

    Abstract: Mis- and disinformation are a substantial global threat to our security and safety. To cope with the scale of online misinformation, researchers have been working on automating fact-checking by retrieving and verifying against relevant evidence. However, despite many advances, a comprehensive evaluation of the possible attack vectors against such systems is still lacking. Particularly, the automat… ▽ More

    Submitted 16 June, 2023; v1 submitted 7 September, 2022; originally announced September 2022.