Alert button
Picture for Suman Jana

Suman Jana

Alert button

TrustLLM: Trustworthiness in Large Language Models

Add code
Bookmark button
Alert button
Jan 25, 2024
Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, John Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yong Chen, Yue Zhao

Figure 1 for TrustLLM: Trustworthiness in Large Language Models
Figure 2 for TrustLLM: Trustworthiness in Large Language Models
Figure 3 for TrustLLM: Trustworthiness in Large Language Models
Figure 4 for TrustLLM: Trustworthiness in Large Language Models
Viaarxiv icon

Beyond Accuracy: Evaluating Self-Consistency of Code Large Language Models with IdentityChain

Add code
Bookmark button
Alert button
Oct 21, 2023
Marcus J. Min, Yangruibo Ding, Luca Buratti, Saurabh Pujar, Gail Kaiser, Suman Jana, Baishakhi Ray

Viaarxiv icon

PatchCURE: Improving Certifiable Robustness, Model Utility, and Computation Efficiency of Adversarial Patch Defenses

Add code
Bookmark button
Alert button
Oct 19, 2023
Chong Xiang, Tong Wu, Sihui Dai, Jonathan Petit, Suman Jana, Prateek Mittal

Viaarxiv icon

Symmetry-Preserving Program Representations for Learning Code Semantics

Add code
Bookmark button
Alert button
Aug 07, 2023
Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana

Figure 1 for Symmetry-Preserving Program Representations for Learning Code Semantics
Figure 2 for Symmetry-Preserving Program Representations for Learning Code Semantics
Figure 3 for Symmetry-Preserving Program Representations for Learning Code Semantics
Figure 4 for Symmetry-Preserving Program Representations for Learning Code Semantics
Viaarxiv icon

NeuDep: Neural Binary Memory Dependence Analysis

Add code
Bookmark button
Alert button
Oct 04, 2022
Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray

Figure 1 for NeuDep: Neural Binary Memory Dependence Analysis
Figure 2 for NeuDep: Neural Binary Memory Dependence Analysis
Figure 3 for NeuDep: Neural Binary Memory Dependence Analysis
Figure 4 for NeuDep: Neural Binary Memory Dependence Analysis
Viaarxiv icon

General Cutting Planes for Bound-Propagation-Based Neural Network Verification

Add code
Bookmark button
Alert button
Aug 11, 2022
Huan Zhang, Shiqi Wang, Kaidi Xu, Linyi Li, Bo Li, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter

Figure 1 for General Cutting Planes for Bound-Propagation-Based Neural Network Verification
Figure 2 for General Cutting Planes for Bound-Propagation-Based Neural Network Verification
Figure 3 for General Cutting Planes for Bound-Propagation-Based Neural Network Verification
Figure 4 for General Cutting Planes for Bound-Propagation-Based Neural Network Verification
Viaarxiv icon

Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks

Add code
Bookmark button
Alert button
Jun 18, 2021
Suyoung Lee, Wonho Song, Suman Jana, Meeyoung Cha, Sooel Son

Figure 1 for Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
Figure 2 for Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
Figure 3 for Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
Figure 4 for Evaluating the Robustness of Trigger Set-Based Watermarks Embedded in Deep Neural Networks
Viaarxiv icon

Learning Security Classifiers with Verified Global Robustness Properties

Add code
Bookmark button
Alert button
May 24, 2021
Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David Wagner

Figure 1 for Learning Security Classifiers with Verified Global Robustness Properties
Figure 2 for Learning Security Classifiers with Verified Global Robustness Properties
Figure 3 for Learning Security Classifiers with Verified Global Robustness Properties
Figure 4 for Learning Security Classifiers with Verified Global Robustness Properties
Viaarxiv icon

Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification

Add code
Bookmark button
Alert button
Mar 11, 2021
Shiqi Wang, Huan Zhang, Kaidi Xu, Xue Lin, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter

Figure 1 for Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification
Figure 2 for Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification
Figure 3 for Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification
Figure 4 for Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification
Viaarxiv icon