LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks S Ullah, M Han, S Pujar, H Pearce, A Coskun, G Stringhini
IEEE Symposium on Security and Privacy, 2024
52 2024 On m-impact regions and standing top-k influence problems B Tang, K Mouratidis, M Han
Proceedings of the 2021 International Conference on Management of Data, 1784 …, 2021
9 2021 Fast core-based top-k frequent pattern discovery in knowledge graphs J Zeng, X Yan, M Han, B Tang
2021 IEEE 37th International Conference on Data Engineering (ICDE), 936-947, 2021
9 2021 Ghive: accelerating analytical query processing in apache hive via cpu-gpu heterogeneous computing H Liu, B Tang, J Zhang, Y Deng, X Yan, X Zheng, Q Shen, D Zeng, Z Mao, ...
Proceedings of the 13th Symposium on Cloud Computing, 158-172, 2022
7 2022 Bytecheckpoint: A unified checkpointing system for llm development B Wan, M Han, Y Sheng, Z Lai, M Zhang, J Zhang, Y Peng, H Lin, X Liu, ...
arXiv e-prints, arXiv: 2407.20143, 2024
4 2024 Ghive: A demonstration of gpu-accelerated query processing in apache hive H Liu, B Tang, J Zhang, Y Deng, X Zheng, Q Shen, X Yan, D Zeng, Z Mao, ...
Proceedings of the 2022 International Conference on Management of Data, 2417 …, 2022
4 2022 Extracting Top- Frequent and Diversified Patterns in Knowledge Graphs J Zeng, X Yan, Y Li, M Han, B Tang
IEEE Transactions on Knowledge and Data Engineering, 2023
2023