Git Product home page Git Product logo

moebuta's Introduction


I'm MoeBuTa (nickname) / Wenxiao (legal name).

A PhD student at UWA interested in topics related to AI agents and their security in cyber-physical environments.

Also, a weeb, a fingerstyle guitar enthusiast, and a big fan of video games.

...

Projects

๐Ÿ”— Doc2KG - Unified Knowledge Graph Construction from Heterogeneous Documents Assisted by Large Language Models.

๐Ÿ‘ฉโ€๐Ÿ‘งโ€๐Ÿ‘ฆ Starick - A desktop and mobile website aiming to raise funds and awareness for Starick.

๐Ÿ” MTDSimTime - A research project on the simulation and evaluation of multiple moving target defence in the time domain.

๐Ÿฅ PubMedConnections - A tool for exploring the relationships between authors in the PubMed database.

๐Ÿ›ค๏ธ SlimeMould - A Python-based model simulating the slime mould's behaviour using the Nanjing subway system's geometric data.

โ™Ÿ๏ธ ChineseChessTutorial - CITS3403 Agile Web Development project using Flask, Jinja, and Sqlite.

๐Ÿ”ข ComputationalAnalysis - CITS4009 Computational Analysis data visualisation project written in R.

๐Ÿ–ฅ๏ธ MachineLearning - CITS5508 Machine Learning lab assignments.

โ˜๏ธ CloudComputing - AWS certification exam notes and CITS5503 Cloud Computing lab assignments.

Top Langs

MoeBuTa's GitHub stats

GitHub Streak

moebuta's People

Contributors

moebuta avatar

Watchers

 avatar

moebuta's Issues

0 shot vs few shot

construct a database to store the collected data with the good reasoning of [Lidar & Cam & Pos -> Planning / Actions].
use the data for few-shot inference when calling API.

Experiments Design

Motivation: Evaluate the effectiveness of the proposed framework

  • prompt:
    • system instruction + real-time state info / changes + few-shot
  • multi-modal:
    • cam + lidar + pos + historical state
  • security:
    • w/ w/o threats
    • defence / error handling mechanism

Ablation study:

  • lidar only / cam only -> plan/action
  • target seen / unseen
  • general prompt vs with restriction on prompt
  • 0-shot vs few-shot

Metric:

  • success rate of task completion
  • cost of actions/tasks
  • inference time of actions/tasks
  • distance
  • frequency of target lost after executing actions

Literature Review on Security with Embodied AI

Possible ways:

  • Focus on the embodied agents:
    • w/o LLMs (rule-based, algorithms, learning-based), w/ LLMs with robotics:
      • Perception, Planning, Control
      • Problems: works for w/ LLMs still in the early stage, feels hard to categorise.
  • Focus on the LLM:
    • works on LLMs: prompting, RAG, fine-tuning, RLHF.....
    • How have recent works applied these techniques when combining LLMs with robotics / embodied agents?
    • Problems: need to make associations with the embodied agent, feels hard to categorise.

survey paper

security on LLM robotics

PRDC2024 - Evaluation Section

Focus on evaluating the effectiveness of the whole framework against prompt injection attacks

in terms of ai agent:
we have user, cam, lidar, pos as perception, pretrained LLM as brain, command signals that execute mobile robot as action,

control vs planning

We generate perception interpretation, planning, and control together, but the performance seems not so good.

Alternative solutions:

  • generate a general plan: e.g.: explore the area around (x, y), (x2, y2)
  • then use a hard-coded algorithm / train a model to convert the plan into actions.

Research Proposal Brain Storming

Security of AI agents in a broad aspect

CoreLocker and MInference are quite interesting. But how can I think of a topic with three objectives that can cover all of this stuff?

  • obj1: explore threats and limitations of AI agent architectures (refer to PRDC)
  • obj2: implement a novel secure method for AI agents in autonomous systems
  • obj3: apply the concept into robotics realm for embodied AI agent
    • security stuff? should be focused on AI models
      • against attacks?
      • reliability?
      • performance?

Currently doing embodied AI agents found limitations:

  • general pre-trained LLMs have limitations in handling specific tasks, even when few-shot prompting provided
  • The zero-shot prompting-styled LLM module is vulnerable to prompt injection.

Options:

  • fine-tune a small model for assistant purposes, input high-level instructions from LLM and output low-level control scripts
  • RAG model for better few-shot prompting with GPT (prompt intensive)
  • how can these be associated with security stuff?
    • prompt injection -> detection/prevention -> model
    • data poisoning

if focus on the security of embodied AI:
- prefer humanoid robots (trend)

  • security topics?
    • prompt injections
    • data poisoning
    • network jamming
    • reverse engineering on the model (model inversion)
    • physical damage (embodied AI )

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.