Explaining Large Language Model Decisions Using Shapley Values

2024-12-28
Explaining Large Language Model Decisions Using Shapley Values

Large language models (LLMs) offer exciting possibilities for simulating human behavior, but their decision-making processes lack transparency. This paper introduces a novel approach based on Shapley values to interpret LLM behavior and quantify the contribution of each prompt component to the model's output. Through two applications, the study reveals that LLM decisions are susceptible to "token noise," where the model disproportionately reacts to tokens with minimal informative content. This raises concerns about the robustness and generalizability of insights from LLMs in simulating human behavior, highlighting the need for careful prompt engineering and a nuanced understanding of their limitations when used in research.

Read more

Invariants: Advances in Computation and Applications

2024-12-27
Invariants: Advances in Computation and Applications

A tutorial paper published in the proceedings of ISSAC 2023 explores the computation and applications of invariants in mathematics. The paper focuses on the interplay between differential and algebraic invariant theories, presenting an algebraic adaptation of the moving frame method from differential geometry to compute a generating set of rational invariants. It also discusses the role of differential invariant signatures in solving equivalence problems in geometry and algebra, and the challenges in designing algorithms based on this concept.

Read more

Adversarial Policies Defeat Superhuman Go AIs

2024-12-24
Adversarial Policies Defeat Superhuman Go AIs

Researchers achieved a >97% win rate against the state-of-the-art Go AI, KataGo, by training adversarial policies. These adversaries didn't win by playing Go well, but by tricking KataGo into making critical blunders. The attack transferred zero-shot to other superhuman Go AIs and was simple enough for human experts to replicate without algorithmic assistance. The vulnerability persisted even after KataGo was adversarially trained to defend against it, highlighting surprising failure modes in even superhuman AI systems.

Read more

Supernovae Data Suggests Foundational Shift in Cosmological Models

2024-12-23
Supernovae Data Suggests Foundational Shift in Cosmological Models

A new study presents a cosmologically model-independent statistical analysis of the Pantheon+ Type Ia supernovae spectroscopic dataset, improving upon the standard methodology used by Lane et al. By employing the Tripp equation for supernova standardization alone, the study avoids potential correlations in stretch and color distributions. The results strongly favor the 'Timescape' cosmology over the standard ΛCDM model in explaining the data, providing evidence for the need to revisit the foundations of theoretical and observational cosmology. Even when restricting the sample to redshifts beyond conventional scales of statistical homogeneity (z > 0.075), Timescape remains preferred over ΛCDM.

Read more

Offline Reinforcement Learning Boosts Multi-Step Reasoning in LLMs

2024-12-23
Offline Reinforcement Learning Boosts Multi-Step Reasoning in LLMs

Researchers introduce OREO, an offline reinforcement learning method designed to enhance the multi-step reasoning capabilities of large language models (LLMs). Building upon maximum entropy reinforcement learning, OREO jointly learns a policy model and value function by optimizing the soft Bellman equation. This addresses limitations of Direct Preference Optimization (DPO) in multi-step reasoning, specifically the need for extensive paired preference data and the challenge of effective credit assignment. Experiments demonstrate OREO's superiority over existing offline learning methods on benchmarks involving mathematical reasoning and embodied agent control.

Read more

Tokenization Problem Proven NP-Complete, Doubling Data Compression Challenges

2024-12-22
Tokenization Problem Proven NP-Complete, Doubling Data Compression Challenges

A paper published on arXiv proves the NP-completeness of two variants of tokenization, defined as the problem of compressing a dataset to at most δ symbols by either finding a vocabulary directly (direct tokenization) or selecting a sequence of merge operations (bottom-up tokenization). This finding has significant implications for data compression and natural language processing, highlighting the immense challenge of efficiently solving the tokenization problem for large-scale datasets.

Read more

Groundbreaking Advance: Safely Compiling C to Rust

2024-12-21
Groundbreaking Advance: Safely Compiling C to Rust

Researchers have developed a novel method for safely compiling C code into Rust. This technique utilizes static analysis and type-directed translation to avoid reliance on Rust's `unsafe` blocks, thus guaranteeing memory safety. The method has been successfully applied to code from the HACL* cryptographic library and EverParse libraries, resulting in an 80,000-line pure Rust verified modern cryptographic library—a first of its kind.

Read more
Development C compilation

Lightweight Safety Classification Using Pruned Language Models

2024-12-19
Lightweight Safety Classification Using Pruned Language Models

Researchers introduce Layer Enhanced Classification (LEC), a novel lightweight technique for content safety and prompt injection classification in Large Language Models (LLMs). LEC trains a streamlined Penalized Logistic Regression (PLR) classifier on the hidden state of an LLM's optimal intermediate transformer layer. Combining the efficiency of PLR with the sophisticated language understanding of LLMs, LEC outperforms GPT-4o and specialized models. Small general-purpose models like Qwen 2.5 and architectures such as DeBERTa v3 prove robust feature extractors, effectively training with fewer than 100 high-quality examples. Crucially, intermediate transformer layers often outperform the final layer. A single general-purpose LLM can classify content safety, detect prompt injections, and generate output, or smaller LLMs can be pruned to their optimal intermediate layer for feature extraction. Consistent results across architectures suggest robust feature extraction is inherent to many LLMs.

Read more

Classical Sorting Algorithms Reveal Unexpected Competencies in a Minimal Model of Basal Intelligence

2024-12-19
Classical Sorting Algorithms Reveal Unexpected Competencies in a Minimal Model of Basal Intelligence

A new study uses classical sorting algorithms as a model of morphogenesis, challenging conventional wisdom about these algorithms. By breaking assumptions of top-down control and perfectly reliable hardware, researchers discovered that arrays of autonomous elements sort themselves more reliably and robustly than traditional implementations, even in the presence of errors. Surprisingly, these algorithms exhibit the ability to temporarily reduce progress to navigate around defects and unexpected clustering behavior among elements in chimeric arrays following different algorithms. This discovery provides a novel perspective on diverse intelligence, demonstrating how basal forms of intelligence can emerge in simple systems without explicit encoding in their underlying mechanics.

Read more

Cultural Evolution of Cooperation Among LLM Agents

2024-12-18
Cultural Evolution of Cooperation Among LLM Agents

Researchers investigated whether a 'society' of Large Language Model (LLM) agents can learn mutually beneficial social norms despite incentives to defect. Experiments revealed significant differences in the evolution of cooperation across base models, with Claude 3.5 Sonnet significantly outperforming Gemini 1.5 Flash and GPT-4o. Furthermore, Claude 3.5 Sonnet leveraged a costly punishment mechanism to achieve even higher scores, a feat not replicated by the other models. This study proposes a new benchmark for LLMs focused on the societal implications of LLM agent deployment, offering insights into building more robust and cooperative AI agents.

Read more

No More Adam: Learning Rate Scaling at Initialization is All You Need

2024-12-18
No More Adam: Learning Rate Scaling at Initialization is All You Need

Researchers introduce SGD-SaI, a novel optimizer improving stochastic gradient descent. SGD-SaI addresses training imbalances by scaling learning rates at initialization for different parameter groups based on their gradient signal-to-noise ratios. Significantly more memory-efficient than AdamW, SGD-SaI matches or surpasses AdamW's performance across various Transformer-based tasks, including ImageNet classification and LLM pretraining. Its robustness and practicality are demonstrated across diverse applications, making it a compelling alternative.

Read more
AI

Best-of-N Jailbreaking: A Novel Attack on AI Systems

2024-12-15
Best-of-N Jailbreaking: A Novel Attack on AI Systems

Researchers have developed a new AI attack algorithm called Best-of-N (BoN) Jailbreaking. This black-box algorithm repeatedly modifies prompts—randomly shuffling or capitalizing text, for example—until it elicits a harmful response from the AI system. BoN achieved impressively high attack success rates (ASRs) on closed-source language models like GPT-4o (89%) and Claude 3.5 Sonnet (78%), effectively circumventing existing defenses. Furthermore, BoN seamlessly extends to vision and audio language models, highlighting the vulnerability of even advanced AI systems to seemingly innocuous input variations. This research underscores significant security concerns in the field of AI.

Read more

Automated Assembly System Creates Cyborg Insects

2024-12-15
Automated Assembly System Creates Cyborg Insects

Scientists have developed an automated system for assembling insect-computer hybrid robots. The system uses a vision-guided robotic arm to precisely implant custom-designed bipolar electrodes onto the backs of Madagascar hissing cockroaches. The entire process takes only 68 seconds, and the assembled robots achieve steering and deceleration control comparable to manually assembled systems. A multi-agent system of 4 robots successfully navigated an obstacle course, demonstrating the feasibility of mass production and real-world applications. This research paves the way for scalable production and deployment of insect robots.

Read more

CCxTrust: A Confidential Computing Platform Leveraging Collaborative Trust from TEE and TPM

2024-12-12
CCxTrust: A Confidential Computing Platform Leveraging Collaborative Trust from TEE and TPM

CCxTrust is a novel confidential computing platform that cleverly combines the strengths of Trusted Execution Environments (TEEs) and Trusted Platform Modules (TPMs) to establish a collaborative trust framework. By leveraging the black-box Root of Trust (RoT) embedded in CPU-TEEs and the flexible white-box RoT of TPMs, CCxTrust achieves end-to-end protection of sensitive data and models, overcoming the limitations of relying on a single hardware RoT. The platform implements independent Roots of Trust for Measurement (RTM) and a collaborative Root of Trust for Report (RTR), further enhanced by a composite attestation protocol for improved security and efficiency. Experimental results demonstrate significant performance advantages.

Read more

Breakthrough in Reachability Analysis of the Domain Name System

2024-12-12
Breakthrough in Reachability Analysis of the Domain Name System

Researchers have presented the first decision procedure for verifying the Domain Name System (DNS), establishing its complexity as 2ExpTime. The study formalizes DNS semantics and uses a novel abstraction based on positive prefix-testable languages, reducing the DNS verification problem to the verification problem for pushdown systems. This approach effectively models attack vectors in DNS, such as amplification attacks and rewrite blackholing, providing a new theoretical foundation for ensuring DNS security and reliability.

Read more
1 2 3 4 5 6 7 8 10 Next →