Introduced in 2017 [28], Consensus-Based Optimization (CBO) has rapidly emerged as a significant breakthrough in global optimization. This straightforward yet powerful multi-particle, zero-order optimization method dr...
详细信息
In this paper, we attempt to summarize monthly reports as investment reports. Fund managers have a wide range of tasks, one of which is the preparation of investment reports. In addition to preparing monthly reports o...
详细信息
With the increasing integration of ChatGPT into higher education, understanding faculty members' acceptance intentions toward this technology has become a critical area of inquiry. Grounded in the Technology Accep...
详细信息
ISBN:
(数字)9798331528409
ISBN:
(纸本)9798331528416
With the increasing integration of ChatGPT into higher education, understanding faculty members' acceptance intentions toward this technology has become a critical area of inquiry. Grounded in the Technology Acceptance Model (TAM), this study analyzed survey data from 264 Chinese university faculty members using structural equation modeling to explore their acceptance intentions regarding ChatGPT for teaching and research. The findings revealed three key insights: (1) Faculty members demonstrated a “high willingness to use - cautious attitude” pattern, indicating a rational balance between the perceived value of the technology and its ethical risks. (2) Training support was identified as a crucial mediating factor influencing faculty members' acceptance intentions. (3) To foster the responsible use of ChatGPT in higher education, the study recommends the development of pedagogy-oriented AI support systems tailored to faculty needs. By expanding the application of TAM theory to educational contexts, this study provides valuable theoretical and practical guidance for the responsible and effective adoption of ChatGPT in higher education.
Advances in computational power and AI have increased interest in reinforcement learning approaches to inventory management. This paper provides a theoretical foundation for these approaches and investigates the benef...
详细信息
Multimodal Large Language Models (MLLMs) have shown tremendous potential in Multimodal Entity Linking (MEL). However, they are still far from achieving the expected effectiveness in practical applications. This could ...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Multimodal Large Language Models (MLLMs) have shown tremendous potential in Multimodal Entity Linking (MEL). However, they are still far from achieving the expected effectiveness in practical applications. This could be due to limitations in the MEL dataset used for training. Existing MEL datasets primarily focus on simple tasks and only consider the direct matching of mentions with labeled entities within a multimodal context, ignoring mentions of unmatched entities. Factors such as the presence of the ground-truth entity within the candidate set and its position directly impact the performance of MLLMs on MEL tasks. To tackle these obstacles, we constructed DiffMEL, the first large-scale difficulty-graded dataset for MEL of MLLMs. DiffMEL contains 79,625 instances and 318.5K instance-related high-resolution images, covering 3 various difficulty graded linking tasks and 5 different entity themes. We utilize DiffMEL to train several open-source MLLMs. Experiment results demonstrate DiffMEL empowers MLLMs with stronger capabilities in MEL by a large-margin (5%-56.1%). our dataset is now available at https://***/ww-ffff/DiffMEL.
To explore the vulnerability of deep neural networks (DNNs), many attack paradigms have been well studied, such as the poisoning-based backdoor attack in the training stage and the adversarial attack in the inference ...
详细信息
PHP Object Injection (POI) vulnerabilities enable unexpected execution of class methods in PHP applications, resulting in various attacks. In the meanwhile, designing effective patches for POI vulnerabilities demands ...
详细信息
ISBN:
(数字)9798331522360
ISBN:
(纸本)9798331522377
PHP Object Injection (POI) vulnerabilities enable unexpected execution of class methods in PHP applications, resulting in various attacks. In the meanwhile, designing effective patches for POI vulnerabilities demands substantial engineering efforts. Existing research mostly focused on the detection of POI gadget chains, whereas the automatic patch generation remains an under-explored problem. In this work, we empirically study known gadget chains, and discover that adversaries usually construct gadget chains by diverging the execution to paths that developers never considered. The methods that get unexpectedly jump into (i.e., executed) are referred to as possible methods (PM). Based on the observation, we propose PFortifier, a framework for automatic POI patch generation. PFortifier operates in two stages: (i) the gadget chain detection phase, in which PFortifier simulates the execution of PHP applications, and detects gadget chains that pass attacker controlled objects to dangerous sinks, and (ii) the patch generation phase, in which PFortifier automatically generates POI patches by restricting PM jumps detected in the first phase. We evaluate PFortifier on 31 PHP applications and frameworks. The experiment results demonstrate the effectiveness of PFortifier: it generates precise patches for 52.53% of gadget chains, and suggests potential patches for 45.45% chains, resulting in a total chain coverage of 97.98%.
This paper presents the energy planning problem (EPP) as an optimization problem to find the optimal schedules to minimize energy consumption costs and demand and enhance users’ comfort levels. The grey wolf optimize...
详细信息
Domain generalization (DG) is proposed to deal with the issue of domain shift, which occurs when statistical differences exist between source and target domains. However, most current methods do not account for a comm...
详细信息
Contrast enhancement is widely used to improve the visual quality of images. This paper proposes a distortion function for steganography in enhanced images. The pixel prediction error and the cost of the pixel value i...
详细信息
暂无评论