152 research outputs found
Prompt Stealing Attacks Against Large Language Models
The increasing reliance on large language models (LLMs) such as ChatGPT in
various fields emphasizes the importance of ``prompt engineering,'' a
technology to improve the quality of model outputs. With companies investing
significantly in expert prompt engineers and educational resources rising to
meet market demand, designing high-quality prompts has become an intriguing
challenge. In this paper, we propose a novel attack against LLMs, named prompt
stealing attacks. Our proposed prompt stealing attack aims to steal these
well-designed prompts based on the generated answers. The prompt stealing
attack contains two primary modules: the parameter extractor and the prompt
reconstruction. The goal of the parameter extractor is to figure out the
properties of the original prompts. We first observe that most prompts fall
into one of three categories: direct prompt, role-based prompt, and in-context
prompt. Our parameter extractor first tries to distinguish the type of prompts
based on the generated answers. Then, it can further predict which role or how
many contexts are used based on the types of prompts. Following the parameter
extractor, the prompt reconstructor can be used to reconstruct the original
prompts based on the generated answers and the extracted features. The final
goal of the prompt reconstructor is to generate the reversed prompts, which are
similar to the original prompts. Our experimental results show the remarkable
performance of our proposed attacks. Our proposed attacks add a new dimension
to the study of prompt engineering and call for more attention to the security
issues on LLMs
“A cancer in the minds of youth”? : A qualitative study of problematic smartphone use among undergraduate students
Aim : There is empirical evidence to suggest that problematic smartphone use (PSU) is associated with mental health problems including anxiety in educational settings. This qualitative study explored attitudes towards – and self-reported impacts of – smartphone use among British young adult students, as well as perceived causes of PSU. Methods : Free-response written accounts were gathered from 265 British undergraduates at an English university. Open-ended questions were asked about their attitudes towards smartphone use, their reasons for using their smartphones, and what they perceived as the consequences of their smartphone use. Narratives were analyzed using Framework Analysis and a thematic framework was identified. Results : The three main consequences of PSU described by participants were (i) uncontrolled frequent checking of smartphones, (ii) using smartphones late at night, and irrelevant use of smartphones in class. The main reported explanations for PSU were fear of missing messages, boredom in class, poor self-regulation, and external reasons (e.g., boring lectures). Smartphone use was reported to have both positive and negative impacts on young adults’ life satisfaction, social relationships, physical health and study. Many participants reported that they need to develop better self-regulation to address their PSU. Conclusions : Findings suggest that smartphone use can have benefits as well as potentially causing harm among university students. PSU can – in some cases – be understood as reflecting mental well-being issues, poor self-regulation, and social problems
Multiuser Resource Allocation for Semantic-Relay-Aided Text Transmissions
Semantic communication (SemCom) is an emerging technology that extracts
useful meaning from data and sends only relevant semantic information. Thus, it
has the great potential to improve the spectrum efficiency of conventional
wireless systems with bit transmissions, especially in low signal-to-noise
ratio (SNR) and small bandwidth regions. However, the existing works have
mostly overlooked the constraints of mobile devices, which may not have
sufficient capabilities to implement resource-demanding semantic
encoder/decoder based on deep learning. To address this issue, we propose in
this paper a new semantic relay (SemRelay), which is equipped with a semantic
receiver to assist multiuser text transmissions. Specifically, the SemRelay
decodes semantic information from a base station and forwards it to the users
using conventional bit transmission, hence effectively improving text
transmission efficiency. To study the multiuser resource allocation, we
formulate an optimization problem to maximize the multiuser weighted sum-rate
by jointly designing the SemRelay transmit power allocation and system
bandwidth allocation. Although this problem is non-convex and hence challenging
to solve, we propose an efficient algorithm to obtain its high-quality
suboptimal solution by using the block coordinate descent method. Last,
numerical results show the effectiveness of the proposed algorithm as well as
superior performance of the proposed SemRelay over the conventional
decode-and-forward (DF) relay, especially in small bandwidth region.Comment: 6 pages, 3 figures, accepted for IEEE Global Communication Conference
(GLOBECOM) 2023 Workshop on Semantic Communication for 6
Safe Reinforcement Learning with Dual Robustness
Reinforcement learning (RL) agents are vulnerable to adversarial
disturbances, which can deteriorate task performance or compromise safety
specifications. Existing methods either address safety requirements under the
assumption of no adversary (e.g., safe RL) or only focus on robustness against
performance adversaries (e.g., robust RL). Learning one policy that is both
safe and robust remains a challenging open problem. The difficulty is how to
tackle two intertwined aspects in the worst cases: feasibility and optimality.
Optimality is only valid inside a feasible region, while identification of
maximal feasible region must rely on learning the optimal policy. To address
this issue, we propose a systematic framework to unify safe RL and robust RL,
including problem formulation, iteration scheme, convergence analysis and
practical algorithm design. This unification is built upon constrained
two-player zero-sum Markov games. A dual policy iteration scheme is proposed,
which simultaneously optimizes a task policy and a safety policy. The
convergence of this iteration scheme is proved. Furthermore, we design a deep
RL algorithm for practical implementation, called dually robust actor-critic
(DRAC). The evaluations with safety-critical benchmarks demonstrate that DRAC
achieves high performance and persistent safety under all scenarios (no
adversary, safety adversary, performance adversary), outperforming all
baselines significantly
sVAD: A Robust, Low-Power, and Light-Weight Voice Activity Detection with Spiking Neural Networks
Speech applications are expected to be low-power and robust under noisy
conditions. An effective Voice Activity Detection (VAD) front-end lowers the
computational need. Spiking Neural Networks (SNNs) are known to be biologically
plausible and power-efficient. However, SNN-based VADs have yet to achieve
noise robustness and often require large models for high performance. This
paper introduces a novel SNN-based VAD model, referred to as sVAD, which
features an auditory encoder with an SNN-based attention mechanism.
Particularly, it provides effective auditory feature representation through
SincNet and 1D convolution, and improves noise robustness with attention
mechanisms. The classifier utilizes Spiking Recurrent Neural Networks (sRNN) to
exploit temporal speech information. Experimental results demonstrate that our
sVAD achieves remarkable noise robustness and meanwhile maintains low power
consumption and a small footprint, making it a promising solution for
real-world VAD applications.Comment: Accepted by ICASSP 202
Imagine, Initialize, and Explore: An Effective Exploration Method in Multi-Agent Reinforcement Learning
Effective exploration is crucial to discovering optimal strategies for
multi-agent reinforcement learning (MARL) in complex coordination tasks.
Existing methods mainly utilize intrinsic rewards to enable committed
exploration or use role-based learning for decomposing joint action spaces
instead of directly conducting a collective search in the entire
action-observation space. However, they often face challenges obtaining
specific joint action sequences to reach successful states in long-horizon
tasks. To address this limitation, we propose Imagine, Initialize, and Explore
(IIE), a novel method that offers a promising solution for efficient
multi-agent exploration in complex scenarios. IIE employs a transformer model
to imagine how the agents reach a critical state that can influence each
other's transition functions. Then, we initialize the environment at this state
using a simulator before the exploration phase. We formulate the imagination as
a sequence modeling problem, where the states, observations, prompts, actions,
and rewards are predicted autoregressively. The prompt consists of
timestep-to-go, return-to-go, influence value, and one-shot demonstration,
specifying the desired state and trajectory as well as guiding the action
generation. By initializing agents at the critical states, IIE significantly
increases the likelihood of discovering potentially important under-explored
regions. Despite its simplicity, empirical results demonstrate that our method
outperforms multi-agent exploration baselines on the StarCraft Multi-Agent
Challenge (SMAC) and SMACv2 environments. Particularly, IIE shows improved
performance in the sparse-reward SMAC tasks and produces more effective
curricula over the initialized states than other generative methods, such as
CVAE-GAN and diffusion models.Comment: The 38th Annual AAAI Conference on Artificial Intelligenc
- …