Large Language Models (LLMs) have extensive ability to produce promising output. Nowadays, people are increasingly relying on them due to easy accessibility, rapid and outstanding outcomes. However, the use of these r...
详细信息
ISBN:
(数字)9798350376968
ISBN:
(纸本)9798350376975
Large Language Models (LLMs) have extensive ability to produce promising output. Nowadays, people are increasingly relying on them due to easy accessibility, rapid and outstanding outcomes. However, the use of these results without appropriate scrutiny poses serious security risks, particularly when they are integrated with other software, APIs, or plugins. This is because the LLM outputs are highly dependent on the prompts they receive. Therefore, it is essential to carefully clean these outputs before using them in additional software environments. This paper is designed to teach students about the potential dangers of contaminated LLM output within the context of web development through prelab, hands-on, and postlab experiences. Hands-on lab provides practical guidance on how to handle LLM vulnerabilities to make applications safe with some real-world examples in Python. This approach aims to provide students with a deeper understanding of the precautions necessary to ensure software against the vulnerabilities introduced by LLM output.
The conventional hybrid active noise control (ANC, HANC) may significantly degrade if the reference signal for the feedforward ANC (FFANC) subcontroller consists of not only a broadband component but also a low-freque...
The conventional hybrid active noise control (ANC, HANC) may significantly degrade if the reference signal for the feedforward ANC (FFANC) subcontroller consists of not only a broadband component but also a low-frequency sinusoidal component that is uncorrelated or partially correlated with the narrowband noise component that is attenuated by the feedback ANC (FBANC) subcontroller. In this paper, a new robust HANC system is proposed to mitigate the performance degradation resulting from the low-frequency sinusoidal component. A band-pass filter bank (BPFB) is applied to the FFANC reference signal to separate the low-frequency sinusoidal component from the broadband one and each of them is fed to an FFANC subcontroller that solely focuses on a single noise component. A supporting filter takes the extracted broadband component and the residual error as its input and desired signal, respectively. The same BPFB is then applied to the supporting filter error in order to separate the remaining low-frequency sinusoidal component from the narrowband component that persists in the residual error. The use of the two BPFBs and the supporting filter allows the three HANC subcontrollers to operate practically independently, each taking care of one of the pre-processed noise components which are uncorrelated with each other irrespective of the relationship between the two original noise sources. Extensive simulations are provided to demonstrate the improved effectiveness and robust capability of the proposed HANC as compared to its counterpart, even in a case that the low-frequency sinusoidal component in the FFANC reference signal is partially corrected with the primary narrowband noise component that is targeted by the FBANC.
This study investigates public attitudes towards the COVID-19 vaccine through Twitter data analysis. Using the Twitter API, tweets were collected, preprocessed, and labeled. Features were extracted using the Bag of Wo...
This study investigates public attitudes towards the COVID-19 vaccine through Twitter data analysis. Using the Twitter API, tweets were collected, preprocessed, and labeled. Features were extracted using the Bag of Words representation, and sentiment analysis was conducted using Text Blob and Vader. Machine learning and deep learning models were trained and tested, revealing that deep learning models achieved the highest accuracy and F1 score. The research underscores the efficacy of machine learning and deep learning in analyzing COVID-19 vaccine-related tweets, shedding light on factors influencing vaccine resistance. These insights are crucial for pharmaceutical companies and public health officials, enabling them to address barriers to vaccine acceptance and enhance the societal benefits of widespread vaccination, contributing to the pandemic's resolution.
A transaction record in a sharded blockchain can be represented as a two-dimensional array of integers with row-index associated to an account, column-index to a shard and the entry to the transaction amount. In a blo...
详细信息
ISBN:
(数字)9781665421591
ISBN:
(纸本)9781665421607
A transaction record in a sharded blockchain can be represented as a two-dimensional array of integers with row-index associated to an account, column-index to a shard and the entry to the transaction amount. In a blockchain-based cryptocurrency system with coded sharding, a transaction record of a given epoch of time is encoded using a maximum-distance-separable code considering the entries as finite-field symbols. Each column of the resultant coded array is then stored in a server. In this paper, we propose a privacy-preserving multi-round protocol that allows a remote client to retrieve from a coded blockchain system the sum of transaction amounts belonging to two different epochs of time, but to the same ac-count. At the core of the protocol lies an algorithm for a remote client to privately compute a non-linear function referred to as integer addition of two finite-field symbols representing integer numbers, in the presence of curious-but-honest adversaries. Applying it to balance-checking in a cryptocurrency system, the protocol guarantees information-theoretic privacy on account number and shard number thereby ensuring perfect user anonymity, and also maintains confidentiality of half of the input bits on average. The protocol turns out to be a useful primitive for balance-checking in lightweight clients of a PolyShard-ed blockchain.
In an era of heightened digital interconnectedness, businesses increasingly rely on third-party vendors to enhance their operational capabilities. However, this growing dependency introduces significant security risks...
详细信息
ISBN:
(数字)9798350362480
ISBN:
(纸本)9798350362497
In an era of heightened digital interconnectedness, businesses increasingly rely on third-party vendors to enhance their operational capabilities. However, this growing dependency introduces significant security risks, making it crucial to develop a robust framework to mitigate potential vulnerabilities. This paper proposes a comprehensive secure framework for managing third-party vendor risk, integrating blockchain technology to ensure transparency, traceability, and immutability in vendor assessments and interactions. By leveraging blockchain, the framework enhances the integrity of vendor security audits, ensuring that vendor assessments remain up-to-date and tamperproof. This proposed framework leverages smart contracts to reduce human error while ensuring real-time monitoring of compliance and security controls. By evaluating critical security controls—such as data encryption, access control mechanisms, multi-factor authentication, and zero-trust architecture—this approach strengthens an organization’s defense against emerging cyber threats. Additionally, continuous monitoring enabled by blockchain ensures the immutability and transparency of vendor compliance processes. In this paper, a case study on iHealth’s transition to AWS Cloud demonstrates the practical implementation of the framework, showing a significant reduction in vulnerabilities and marked improvement in incident response times. Through the adoption of this blockchain-enabled approach, organizations can mitigate vendor risks, streamline compliance, and enhance their overall security posture. Our findings highlight the importance of employing blockchain to enforce security controls and maintain compliance with healthcare regulations such as HIPAA. In this paper, we present a comprehensive set of security controls and demonstrate how blockchain technology enhances their effectiveness, ensuring greater transparency, accountability, and automation in vendor assessments. By reducing human error, enabl
The advent of mobile health (mHealth) technologies has ushered in a new era in healthcare delivery, transforming the way cardiac patients receive medical care and support. This research paper explores the role of a mo...
The advent of mobile health (mHealth) technologies has ushered in a new era in healthcare delivery, transforming the way cardiac patients receive medical care and support. This research paper explores the role of a mobile health intervention system in optimizing healthcare delivery for cardiac patients. The prevalence of heart attacks has necessitated innovative solutions to enhance patient outcomes and reduce the burden on healthcare systems. The proposed mHealth intervention system leverages the ubiquity of mobile devices to provide real-time monitoring, personalized interventions with environment prediction, and seamless communication between patients and healthcare providers. Through a comprehensive review of existing literature and empirical studies, this paper examines the impact of the mHealth intervention system on patient engagement, adherence to treatment plans, early detection of cardiac events, and overall quality of care. The integration of wearable device, CardioCare mobile application, and telemedicine platforms creates a holistic approach to cardiac care, empowering patients to actively participate in their health management and enabling healthcare professionals to make informed decisions. The potential benefits, challenges, and ethical considerations surrounding the implementation of this system are discussed.
We have developed a Brain-computer Interface (BCI) experience combining electroencephalogram (EEG) signals with Virtual Reality (VR). In our proposal, the users can attend a VR live concert system while participating ...
详细信息
DRAM vendors utilize On-Die Error Correction Codes (OD-ECC) to correct random bit errors internally. Meanwhile, system companies utilize Rank-Level ECC (RL-ECC) to protect data against chip errors. Separate protection...
DRAM vendors utilize On-Die Error Correction Codes (OD-ECC) to correct random bit errors internally. Meanwhile, system companies utilize Rank-Level ECC (RL-ECC) to protect data against chip errors. Separate protection increases the redundancy ratio to 32.8% in DDR5 and incurs significant performance penalties. This paper proposes a novel RL-ECC, Unity ECC, that can correct both single-chip and double-bit error patterns. Unity ECC corrects double-bit errors using unused syndromes of single-chip correction. Our evaluation shows that Unity ECC without OD-ECC can provide the same reliability level as Chipkill RL-ECC with OD-ECC. Moreover, it can significantly improve system performance and reduce DRAM energy and area by eliminating OD-ECC.
Road accidents are a major concern worldwide. Research of technological solutions to improve road safety is an open topic, considering this issue from various perspectives. As widely reported in the literature, driver...
Road accidents are a major concern worldwide. Research of technological solutions to improve road safety is an open topic, considering this issue from various perspectives. As widely reported in the literature, driver distraction is one of the most common causes of collisions. Even if vehicles are becoming safer and safer over the years, pedestrians and cyclists are still exposed to severe accidents. Major concerns about driver distraction is mobile phone use and drowsy driving. This paper proposes a virtual buddy designed to help drivers, thanks to warning sound messages, improve their attention level. The main idea is to recognize, thanks to different sources (video camera, physiological data, and interior environmental conditions) interpreted by a data-fusion algorithm, whenever there is a distracted or drowsy behavior, recalling the driver to the road. The effectiveness of the data-fusion algorithm in detecting dangerous conditions has been verified thanks to a driving simulator experimentally, obtaining no false negatives from distraction from drowsiness, a sensitivity of about 85% for the distraction caused by mobile phone usage or other activities different from focusing on driving.
暂无评论