1,022 research outputs found

    The nature of design and style in music

    Full text link
    Thesis (M.A.)--Boston University, 1939. This item was digitized by the Internet Archive

    Characterization of Partnership Property Upon the Death of One of the Partners

    Get PDF

    Domestic Relations -- Florida Jurisdictional Requirements for Divorce

    Get PDF

    Criminal Law -- Conspiracy Between Husband and Wife

    Get PDF

    Domestic Relations -- Florida Jurisdictional Requirements for Divorce

    Get PDF

    Criminal Law -- Conspiracy Between Husband and Wife

    Get PDF

    A Cost-Effective Method to Prevent Data Exfiltration from LLM Prompt Responses

    Get PDF
    Large language models (LLMs) are susceptible to security risks wherein malicious attackers can manipulate LLMs by poisoning their training data or using malicious text prompts or queries designed to cause the LLM to return output that includes sensitive or confidential information, e.g., that is part of the LLM training dataset. This disclosure describes the use of a data loss prevention (DLP) system to protect LLMs against data exfiltration. The DLP system can be configured to detect specific data types that are to be prevented from being leaked. The LLM output, generated in response to a query from an application or user, is passed through the DLP system which generates a risk score for the LLM output. If the risk score is above a predefined threshold, the LLM output is provided to an additional pre-trained model that has been trained to detect sensitive or confidential data. The output is modified to block, mask, redact, or otherwise remove the sensitive data. The modified output is provided to the application or user. In certain cases, the output may indicate that no response can be provided due to a policy violation

    An Investigation of Learning in a T-Maze with Relevant Drives Satisfied

    Get PDF
    Psychologists agree, in general, that the role of motivation in determining the behavior of organisms is an important one. However, different interpretations arise when one attempts to specify precisely what this role may be. Some psychologists believe that motivation serves only as a forcer or activator of behavior. Others hold that in addition to being an activator of behavior motivation must be reduced for learning to occur. Thus, field theorists such as Tolman and Leeper state that the acquisition of learning is not a function of the number of reinforcements, or drive state reductions. Rather, acquisition is dependent upon the temporal contiguity of the organism\u27s perceptions of successive stimuli, or signs and their significates. Once acquired, however, utilization of learning in the performance of a task is activated by an organism\u27s drive state

    Automatically Detecting Expensive Prompts and Configuring Firewall Rules to Mitigate Denial of Service Attacks on Large Language Models

    Get PDF
    Denial of service attacks on generative artificial intelligence systems, e.g., large language models (LLMs), can include sending LLMs requests that include expensive prompts designed to consume computing resources and degrade model performance. This disclosure describes techniques to automatically detect such prompts and then configure firewall rules that prevent such prompts in subsequent requests from reaching the LLM. Per the techniques, prompts provided to an LLM are matched against input and output token size as well as resource utilization to identify prompts that deviate significantly from a baseline. Expensive prompts are identified, and semantically similar prompts are automatically generated using the same LLM or another model. A subset of the generated prompts that are semantics similar to expensive prompts are identified by comparing respective vector embeddings. The subset of prompts and the received expensive prompts are provided to a pre-trained LLM that generates firewall rules, e.g., web application firewall (WAF) rules. Incoming requests from applications are evaluated based on the rules, and expensive prompts are blocked from reaching the LLM or are rate-limited
    corecore