Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec...
详细信息
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future *** this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.
Online Social Networks(OSNs)are based on the sharing of different types of information and on various interactions(comments,reactions,and sharing).One of these important actions is the emotional reaction to the *** di...
详细信息
Online Social Networks(OSNs)are based on the sharing of different types of information and on various interactions(comments,reactions,and sharing).One of these important actions is the emotional reaction to the *** diversity of reaction types available on Facebook(namely FB)enables users to express their feelings,and its traceability creates and enriches the users’emotional identity in the virtual *** paper is based on the analysis of 119875012 FB reactions(Like,Love,Haha,Wow,Sad,Angry,Thankful,and Pride)made at multiple levels(publications,comments,and sub-comments)to study and classify the users’emotional behavior,visualize the distribution of different types of reactions,and analyze the gender impact on emotion *** of these can be achieved by addressing these research questions:who reacts the most?Which emotion is the most expressed?
We design and analyze an iterative two-grid algorithm for the finite element discretizations of strongly nonlinear elliptic boundary value problems in this *** propose an iterative two-grid algorithm,in which a nonlin...
详细信息
We design and analyze an iterative two-grid algorithm for the finite element discretizations of strongly nonlinear elliptic boundary value problems in this *** propose an iterative two-grid algorithm,in which a nonlinear problem is first solved on the coarse space,and then a symmetric positive definite problem is solved on the fine *** main contribution in this paper is to establish a first convergence analysis,which requires dealing with four coupled error estimates,for the iterative two-grid *** also present some numerical experiments to confirm the efficiency of the proposed algorithm.
This research paper delves into the complex world of deepfakes, investigating recent advances in the creation and identification of synthetic content. It is becoming more important to comprehend the complex threats th...
详细信息
In recent decades, impulse control has been increasingly applied as a discontinuous control method across diverse domains such as satellite orbit transfers, financial market regulation, chaos synchronization, and comm...
详细信息
We study the task of automated house design,which aims to automatically generate 3D houses from user ***,in the automatic system,it is non-trivial due to the intrinsic complexity of house designing:1)the understanding...
详细信息
We study the task of automated house design,which aims to automatically generate 3D houses from user ***,in the automatic system,it is non-trivial due to the intrinsic complexity of house designing:1)the understanding of user requirements,where the users can hardly provide high-quality requirements without any professional knowledge;2)the design of house plan,which mainly focuses on how to capture the effective information from user *** address the above issues,we propose an automatic house design framework,called auto-3D-house design(A3HD).Unlike the previous works that consider the user requirements in an unstructured way(e.g.,natural language),we carefully design a structured list that divides the requirements into three parts(i.e.,layout,outline,and style),which focus on the attributes of rooms,the outline of the building,and the style of decoration,*** the processing of architects,we construct a bubble diagram(i.e.,graph)that covers the rooms′attributes and relations under the constraint of *** addition,we take each outline as a combination of points and orders,ensuring that it can represent the outlines with arbitrary ***,we propose a graph feature generation module(GFGM)to capture layout features from the bubble diagrams and an outline feature generation module(OFGM)for outline ***,we render 3D houses according to the given style requirements in a rule-based *** on two benchmark datasets(i.e.,RPLAN and T3HM)demonstrate the effectiveness of our A3HD in terms of both quantitative and qualitative evaluation metrics.
Pre-trained multilingual language models (PMLMs) such as mBERT and XLM-R have shown good cross-lingual transferability. However, they are not specifically trained to capture cross-lingual signals concerning sentiment ...
详细信息
Pre-trained multilingual language models (PMLMs) such as mBERT and XLM-R have shown good cross-lingual transferability. However, they are not specifically trained to capture cross-lingual signals concerning sentiment words. This poses a disadvantage for low-resource languages (LRLs) that are under-represented in these models. To better fine-tune these models for sentiment classification in LRLs, a novel intermediate task fine-tuning (ITFT) technique based on a sentiment lexicon of a high-resource language (HRL) is introduced. The authors experiment with LRLs Sinhala, Tamil and Bengali for a 3-class sentiment classification task and show that this method outperforms vanilla fine-tuning of the PMLM. It also outperforms or is on-par with basic ITFT that relies on an HRL sentiment classification dataset.
In this paper,we analyze two classes of spectral volume(SV)methods for one-dimensional hyperbolic equations with degenerate variable *** classes of SV methods are constructed by letting a piecewise k-th order(k≥1 is ...
详细信息
In this paper,we analyze two classes of spectral volume(SV)methods for one-dimensional hyperbolic equations with degenerate variable *** classes of SV methods are constructed by letting a piecewise k-th order(k≥1 is an integer)polynomial to satisfy the conservation law in each control volume,which is obtained by refining spectral volumes(SV)of the underlying mesh with k Gauss-Legendre points(LSV)or Radaus points(RSV)in each *** L^(2)-norm stability and optimal order convergence properties for both methods are rigorously proved for general non-uniform ***,we discover some very interesting superconvergence phenomena:At some special points,the SV flux function approximates the exact flux with(k+2)-th order and the SV solution itself approximates the exact solution with(k+3/2)-th order,some superconvergence behaviors for element averages errors have been also ***,these superconvergence phenomena are rigorously proved by using the so-called correction function *** theoretical findings are verified by several numerical experiments.
Worldwide, Geo-distributed Data Centers (GDCs) provide computing and storage services for massive workflow applications, resulting in high electricity costs that vary depending on geographical locations and time. How ...
详细信息
暂无评论