Large language Models (LLMs) are gaining popularity among software engineers. A crucial aspect of developing effective code generation LLMs is to evaluate these models using a robust benchmark. Evaluation benchmarks w...
详细信息
This paper presents the results of finetuning large language models (LLMs) for the task of detecting vulnerabilities in java source code. We leverage Wizard- Coder, a recent improvement of the state-of-the-art LLM Sta...
详细信息
A song’s backbone is its chord progressions, a series of chords that improve the harmony and add to the overall composition. For individuals ranging from beginners to creative artists, comprehending and implementing ...
详细信息
Modern day studies show a high degree of correlation between high yielding crop varieties and plants with upright leaf angles. It is observed that plants with upright leaf angles intercept more light than those withou...
详细信息
Code language Models (CLMs), particularly those leveraging deep learning, have achieved significant success in code intelligence domain. However, the issue of security, particularly backdoor attacks, is often overlook...
详细信息
Code language Models (CLMs), particularly those leveraging deep learning, have achieved significant success in code intelligence domain. However, the issue of security, particularly backdoor attacks, is often overlooked in this process. The previous research has focused on designing backdoor attacks for CLMs, but effective defenses have not been adequately addressed. In particular, existing defense methods from natural language processing, when directly applied to CLMs, are not effective enough and lack generality, working well in some models and scenarios but failing in others, thus fall short in consistently mitigating backdoor attacks. To bridge this gap, we first confirm the phenomenon of "early learning" as a general occurrence during the training of CLMs. This phenomenon refers to that a model initially focuses on the main features of training data but may become more sensitive to backdoor triggers over time, leading to overfitting and susceptibility to backdoor attacks. We then analyze that overfitting to backdoor triggers results from the use of the cross-entropy loss function, where the unboundedness of cross-entropy leads the model to increasingly concentrate on the features of the poisoned data. Based on this insight, we propose a general and effective loss function DeCE (Deceptive Cross-Entropy) by blending deceptive distributions and applying label smoothing to limit the gradient to bounded, which prevents the model from overfitting to backdoor triggers and then enhances the security of CLMs against backdoor attacks. To evaluate the effectiveness of our defense method, we select four code-related tasks as our experiments scenes and conduct experimental analyses on both natural language and two programminglanguages (java and Python). Our experiments across multiple models with different sizes (from 125M to 7B) and poisoning ratios demonstrate the applicability and effectiveness of DeCE in enhancing the security of CLMs. The findings emphasize the potent
Context: Downloading the source code of open-source java projects and building them on a local computer using Maven, Gradle, or Ant is a common activity performed by researchers and practitioners. Multiple studies so ...
详细信息
We offer a preliminary description and evaluation of an Android application that can be used to characterize user exposure to electromagnetic fields emitted by an 802.11ax mobile device. The system used consists of a ...
详细信息
ISBN:
(纸本)9781665403085
We offer a preliminary description and evaluation of an Android application that can be used to characterize user exposure to electromagnetic fields emitted by an 802.11ax mobile device. The system used consists of a DUT (Device Under Test - Huawei P40 Pro) connected to a wireless router. A measurement system composed of a small isotropic antenna connected to a spectrum analyzer and remotely controlled via a custom designed Python application was used to measure the field strength. Higher field levels were observed during file upload as compared to file download. Based on the measurements recorded by the Android application we performed an analysis of the field changes according to the number of transmitted/received bits and RSSI. We observed direct field strength variation with upload/download speed. We have also introduced the dosimetric indicator of power density/unit of information and proved its validity in highlighting different usage profiles. Further investigations have to be carried out in order to provide large scale data on Wi-Fi user exposure in the case of realistic operating scenarios.
The widely used safety analysis techniques usually assume that accidents mainly occur by the failures of system components. That's why the classical techniques focus on either preventing the failures of the critic...
详细信息
ISBN:
(数字)9781624106095
ISBN:
(纸本)9781624106095
The widely used safety analysis techniques usually assume that accidents mainly occur by the failures of system components. That's why the classical techniques focus on either preventing the failures of the critical components or adding redundancy to back them up. Such techniques suffer from various limitations;most importantly is the main focus is in enhancing the defined system - by redundancy for example - without approaching a safer design from the beginning. In the previous years, a new technique is introduced called STPA (System-Theoretic Process Analysis) which is based upon a new accident model called STAMP (Systems-Theoretic Accident Model and Processes)[1]. One of the advantages of this technique is that it focuses in defining earliest design decisions upon safety considerations. The output of such technique consists of the unsafe scenarios and safety constraints to be taken in consideration during early design steps. Recently, various developers tried to adapt the new STPA technique in a software tool. The tools focus in defining a control process of the system and providing a general solution of safety considerations. Our work in the past years has been targeting the improvement of MBSA (Model-Based Safety analysis) tools to provide more accurate, cohesive failure analysis automatically [2]. Our developed methods based upon using component models of failure modes along with a system structure and systematically capturing the critical single components or combinations causing a system failure. In this paper we are trying to utilize the STPA techniques in our methods. The STPA method shall not be only used to define safety constraints of a system but also rectify a system hierarchy by providing design modifications that will handle any captured unsafe scenarios. These unsafe scenarios usually are not captured using the classical safety analysis methods utilized in most of the MBSA tools. Our approach is intended to be used in the early design steps in whic
With the diffusion of technology worldwide, almost every individual is starting to have at least one mobile device, making mobile applications very popular and an important sector. Given the direction in which many se...
详细信息
ISBN:
(纸本)9781665407595
With the diffusion of technology worldwide, almost every individual is starting to have at least one mobile device, making mobile applications very popular and an important sector. Given the direction in which many sectors, including education, are moving, there is a clear and evident need for communication on-line rather than in-person. Concerning universities, the communication gap between teachers and students was particularly compromised in light of the Covid-19 pandemic. This study is aimed to fill in this gap by developing a social platform where students and teachers can share their posts and create their personal profiles. The Firebase database and Android Studio are the chosen technologies for this paper due to their compatibility as well as popularity as a chat application, along with java as the programminglanguage. The developed platform, named "SeniorHouse", is focused on educational content to provide both faculty and students with a two-way, real-time communication to share updates, posts, documents, project ideas, and personal profiles, to name a few. The SeniorHouse application has significant potentials to be expanded into a major hub for future on-line education.
In this article, we present our relocatable distributed collection library. Building on top of the AGPAS for java library, we provide a number of useful intranode parallel patterns as well as the features necessary to...
详细信息
In this article, we present our relocatable distributed collection library. Building on top of the AGPAS for java library, we provide a number of useful intranode parallel patterns as well as the features necessary to support the distributed nature of the computation through clearly identified methods. In particular, the transfer of distributed collections' entries between processes is supported via an integrated relocation system. This enables dynamic load-balancing capabilities, making it possible for programs to adapt to uneven or evolving cluster performance. The system we developed makes it possible to dynamically control the distribution and the data flow of distributed programs through high-level abstractions. Programmers using our library can, therefore, write complex distributed programs combining computation and communication phases through a consistent API. We evaluate the performance of our library against two programs taken from well-known java benchmark suites, demonstrating superior programmability and obtaining better performance on one benchmark and reasonable overhead on the second. Finally, we demonstrate the ease and benefits of load balancing and a more complex application, which uses the various features of our library extensively.
暂无评论