The digital landscape has changed in recent years due to the rise in popularity of edge computing and Content Delivery Networks (CDNs), which offer faster and more effective internet access. Edge computing, a solution...
详细信息
Medicinal plants have the potential to both significantly progress the pharmaceutical and medical industries and shield people from fatal diseases like cancer and cardiovascular conditions. Since there are hundreds of...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...
详细信息
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
The effectiveness of modeling contextual information has been empirically shown in numerous computer vision tasks. In this paper, we propose a simple yet efficient augmented fully convolutional network(AugFCN) by aggr...
详细信息
The effectiveness of modeling contextual information has been empirically shown in numerous computer vision tasks. In this paper, we propose a simple yet efficient augmented fully convolutional network(AugFCN) by aggregating content-and position-based object contexts for semantic ***, motivated because each deep feature map is a global, class-wise representation of the input,we first propose an augmented nonlocal interaction(AugNI) to aggregate the global content-based contexts through all feature map interactions. Compared to classical position-wise approaches, AugNI is more efficient. Moreover, to eliminate permutation equivariance and maintain translation equivariance, a learnable,relative position embedding branch is then supportably installed in AugNI to capture the global positionbased contexts. AugFCN is built on a fully convolutional network as the backbone by deploying AugNI before the segmentation head network. Experimental results on two challenging benchmarks verify that AugFCN can achieve a competitive 45.38% mIoU(standard mean intersection over union) and 81.9% mIoU on the ADE20K val set and Cityscapes test set, respectively, with little computational overhead. Additionally, the results of the joint implementation of AugNI and existing context modeling schemes show that AugFCN leads to continuous segmentation improvements in state-of-the-art context modeling. We finally achieve a top performance of 45.43% mIoU on the ADE20K val set and 83.0% mIoU on the Cityscapes test set.
Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solve...
详细信息
Unmanned and aerial systems as interactors among different system components for communications,have opened up great opportunities for truth data discovery in Mobile Crowd Sensing(MCS)which has not been properly solved in the *** this paper,an Unmanned Aerial Vehicles-supported Intelligent Truth Discovery(UAV-ITD)scheme is proposed to obtain truth data at low-cost communications for *** main innovations of the UAV-ITD scheme are as follows:(1)UAV-ITD scheme takes the first step in employing UAV joint Deep Matrix Factorization(DMF)to discover truth data based on the trust mechanism for an Information Elicitation Without Verification(IEWV)problem in MCS.(2)This paper introduces a truth data discovery scheme for the first time that only needs to collect a part of n data samples to infer the data of the entire network with high accuracy,which saves more communication costs than most previous data collection schemes,where they collect n or kn data ***,we conducted extensive experiments to evaluate the UAV-ITD *** results show that compared with previous schemes,our scheme can reduce estimated truth error by 52.25%–96.09%,increase the accuracy of workers’trust evaluation by 0.68–61.82 times,and save recruitment costs by 24.08%–54.15%in truth data discovery.
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism withou...
详细信息
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism without prior ***,endogenous security lacks a scientific and formal definition in industrial ***,firstly we give a formal definition of endogenous security in industrial Internet and propose a new industrial Internet endogenous security architecture with cost ***,the endogenous security innovation mechanism is clearly ***,an improved clone selection algorithm based on federated learning is ***,we analyze the threat model of the industrial Internet identity authentication scenario,and propose cross-domain authentication mechanism based on endogenous key and zero-knowledge *** conduct identity authentication experiments based on two types of blockchains and compare their experimental *** on the experimental analysis,Ethereum alliance blockchain can be used to provide the identity resolution services on the industrial *** of Things Application(IOTA)public blockchain can be used for data aggregation analysis of Internet of Things(IoT)edge ***,we propose three core challenges and solutions of endogenous security in industrial Internet and give future development directions.
Multi-label classification is a challenging problem that has attracted significant attention from researchers, particularly in the domain of image and text attribute annotation. However, multi-label datasets are prone...
详细信息
Multi-label classification is a challenging problem that has attracted significant attention from researchers, particularly in the domain of image and text attribute annotation. However, multi-label datasets are prone to serious intra-class and inter-class imbalance problems, which can significantly degrade the classification performance. To address the above issues, we propose the multi-label weighted broad learning system(MLW-BLS) from the perspective of label imbalance weighting and label correlation mining. Further, we propose the multi-label adaptive weighted broad learning system(MLAW-BLS) to adaptively adjust the specific weights and values of labels of MLW-BLS and construct an efficient imbalanced classifier set. Extensive experiments are conducted on various datasets to evaluate the effectiveness of the proposed model, and the results demonstrate its superiority over other advanced approaches.
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation *** their trans...
详细信息
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation *** their transformative impact in fields such as machine translation and intelligent dialogue systems,LLMs face significant *** challenges include safety,security,and privacy concerns that undermine their trustworthiness and effectiveness,such as hallucinations,backdoor attacks,and privacy *** works often conflated safety issues with security *** contrast,our study provides clearer and more reasonable definitions for safety,security,and privacy within the context of *** on these definitions,we provide a comprehensive overview of the vulnerabilities and defense mechanisms related to safety,security,and privacy in ***,we explore the unique research challenges posed by LLMs and suggest potential avenues for future research,aiming to enhance the robustness and reliability of LLMs in the face of emerging threats.
In the future, electric vehicles, including automobiles, motorcycles, and public transport, are expected to play a significant role in daily commutes. However, India's current infrastructure lacks a wellestablishe...
详细信息
The Internet of Underwater Things (IoUT) is an interconnected communication ecosystem for underwater devices in maritime environments. IoUT devices range from seabed sensors to ships and boats in oceans which help in ...
详细信息
暂无评论