Evaluating Quantized Llama 2 Models for IoT Privacy Policy Language Generation

被引:1
作者
Malisetty, Bhavani [1 ]
Perez, Alfredo J. [1 ]
机构
[1] Univ Nebraska Omaha, Dept Comp Sci, Omaha, NE 68182 USA
关键词
large language models; Internet of Things; privacy policies; language modeling; quantized models; usable privacy; SECURITY; INTERNET;
D O I
10.3390/fi16070224
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Quantized large language models are large language models (LLMs) optimized for model size while preserving their efficacy. They can be executed on consumer-grade computers without the powerful features of dedicated servers needed to execute regular (non-quantized) LLMs. Because of their ability to summarize, answer questions, and provide insights, LLMs are being used to analyze large texts/documents. One of these types of large texts/documents are Internet of Things (IoT) privacy policies, which are documents specifying how smart home gadgets, health-monitoring wearables, and personal voice assistants (among others) collect and manage consumer/user data on behalf of Internet companies providing services. Even though privacy policies are important, they are difficult to comprehend due to their length and how they are written, which makes them attractive for analysis using LLMs. This study evaluates how quantized LLMs are modeling the language of privacy policies to be potentially used to transform IoT privacy policies into simpler, more usable formats, thus aiding comprehension. While the long-term goal is to achieve this usable transformation, our work focuses on evaluating quantized LLM models used for IoT privacy policy language. Particularly, we study 4-bit, 5-bit, and 8-bit quantized versions of the large language model Meta AI version 2 (Llama 2) and the base Llama 2 model (zero-shot, without fine-tuning) under different metrics and prompts to determine how well these quantized versions model the language of IoT privacy policy documents by completing and generating privacy policy text.
引用
收藏
页数:17
相关论文
共 92 条
[41]   Future of IoT Networks: A Survey [J].
Lee, Suk Kyu ;
Bae, Mungyu ;
Kim, Hwangnam .
APPLIED SCIENCES-BASEL, 2017, 7 (10)
[42]  
Lin CY, 2004, P ACL WORKSH
[43]  
Liu YH, 2019, Arxiv, DOI [arXiv:1907.11692, 10.48550/arXiv.1907.11692, DOI 10.48550/ARXIV.1907.11692]
[44]  
Liu Zhenhua, 2021, Advances in Neural Information Processing Systems, V34
[45]   IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices [J].
Meneghello, Francesca ;
Calore, Matteo ;
Zucchetto, Daniel ;
Polese, Michele ;
Zanella, Andrea .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05) :8182-8201
[46]  
Mhaidli Abraham, 2023, P PRIV ENH TECHN, V4, P287
[47]   Loss aware post-training quantization [J].
Nahshan, Yury ;
Chmiel, Brian ;
Baskin, Chaim ;
Zheltonozhskii, Evgenii ;
Banner, Ron ;
Bronstein, Alex M. ;
Mendelson, Avi .
MACHINE LEARNING, 2021, 110 (11-12) :3245-3262
[48]   Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations [J].
Neshenko, Nataliia ;
Bou-Harb, Elias ;
Crichigno, Jorge ;
Kaddoum, Georges ;
Ghani, Nasir .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03) :2702-2733
[49]   A comprehensive overview of smart wearables: The state of the art literature, recent advances, and future challenges [J].
Niknejad, Naghmeh ;
Ismail, Waidah Binti ;
Mardani, Abbas ;
Liao, Huchang ;
Ghani, Imran .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2020, 90
[50]   PrivOnto: A semantic framework for the analysis of privacy policies [J].
Oltramari, Alessandro ;
Piraviperumal, Dhivya ;
Schaub, Florian ;
Wilson, Shomir ;
Cherivirala, Sushain ;
Norton, Thomas B. ;
Russell, N. Cameron ;
Story, Peter ;
Reidenberg, Joel ;
Sadeh, Norman .
SEMANTIC WEB, 2018, 9 (02) :185-203