Projection robust Wasserstein (PRW) distance is recently proposed to efficiently mitigate the curse of dimensionality in the classical Wasserstein distance. In this paper, by equivalently reformulating the computation...
详细信息
Transferable adversarial examples cause practical security risks since they can mislead a target model without knowing its internal knowledge. A conventional recipe for maximizing transferability is to keep only the o...
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language mod...
As the intelligent software, the development and application of large language models are extremely hot topics recently, bringing tremendous changes to general AI and software industry. Nonetheless, large language models, especially open source ones, incontrollably suffer from some potential software quality issues such as instability, inaccuracy, and insecurity, making software testing necessary. In this paper, we propose the first solution for functional testing of open large language models to check full-scene availability and conclude empirical principles for better steering large language models, particularly considering their black box and intelligence properties. Specifically, we focus on the model’s causal reasoning ability, which is the core of artificial intelligence but almost ignored by most previous work. First, for comprehensive evaluation, we deconstruct the causal reasoning capability into five dimensions and summary the forms of causal reasoning task as causality identification and causality matching. Then, rich datasets are introduced and further modified to generate test cases along with different ability dimensions and task forms to improve the testing integrity. Moreover, we explore the ability boundary of open large language models in two usage modes: prompting and lightweight fine-tuning. Our work conducts comprehensive functional testing on the causal reasoning ability of open large language models, establishes benchmarks, and derives empirical insights for practical usage. The proposed testing solution can be transferred to other similar evaluation tasks as a general framework for large language models or their derivations.
This paper is concerned with the numerical solution of Volterra integro-differential equations with noncompact *** focus is on the problems with weakly singular *** handle the initial weak singularity of the solution,...
详细信息
This paper is concerned with the numerical solution of Volterra integro-differential equations with noncompact *** focus is on the problems with weakly singular *** handle the initial weak singularity of the solution,a fractional collocation method is applied.A rigorous hp-version error analysis of the numerical method under a weighted H1-norm is carried *** result shows that the method can achieve high order convergence for such *** experiments are also presented to confirm the effectiveness of the proposed method.
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers (NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can ...
详细信息
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers (NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can be completely characterized. Furthermore, an alternative proof of Kjeldsen's results is presented. Compared with the original proof based on abstract algebra theory, ours is straightforward and easy to understand.
In CRYPTO 2019, Gohr uses the residual network technology of artificial intelligence to build a differential distinguisher, and attacks the reduced-round Speck32/64. We tried this method to recover the keys for ten-ro...
详细信息
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net...
详细信息
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr...
详细信息
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes...
详细信息
DNA methylation is one important epigenetic type to play a vital role in many diseases including *** the development of the high-throughput sequencing technology,there is much progress to disclose the relations of DNA...
详细信息
DNA methylation is one important epigenetic type to play a vital role in many diseases including *** the development of the high-throughput sequencing technology,there is much progress to disclose the relations of DNA methylation with ***,the analyses of DNA methylation data are challenging due to the missing values caused by the limitations of current *** many methods have been developed to impute the missing values,these methods are mostly based on the correlations between individual samples,and thus are limited for the abnormal samples in *** this study,we present a novel transfer learning based neural network to impute missing DNA methylation data,namely the TDimpute-DNAmeth *** method learns common relations between DNA methylation from pan-cancer samples,and then fine-tunes the learned relations over each specific cancer type for imputing the missing *** on 16 cancer datasets,our method was shown to outperform other commonly-used *** analyses indicated that DNA methylation is related to cancer survival and thus can be used as a biomarker of cancer prognosis.
暂无评论