Chatnvd: Advancing cybersecurity vulnerability assessment with large language models

S Chopra, H Ahmad, D Goel, C Szabo - arxiv preprint arxiv:2412.04756, 2024 - arxiv.org
The increasing frequency and sophistication of cybersecurity vulnerabilities in software
systems underscore the urgent need for robust and effective methods of vulnerability …

ToMoE: Converting Dense Large Language Models to Mixture-of-Experts through Dynamic Structural Pruning

S Gao, T Hua, R Shirkavand, CH Lin, Z Tang… - arxiv preprint arxiv …, 2025 - arxiv.org
Large Language Models (LLMs) have demonstrated remarkable abilities in tackling a wide
range of complex tasks. However, their huge computational and memory costs raise …

All-in-One Tuning and Structural Pruning for Domain-Specific LLMs

L Lu, Z Wang, R Bao, M Wang, F Li, Y Wu… - arxiv preprint arxiv …, 2024 - arxiv.org
Existing pruning techniques for large language models (LLMs) targeting domain-specific
applications typically follow a two-stage process: pruning the pretrained general-purpose …

On Accelerating Edge AI: Optimizing Resource-Constrained Environments

J Sander, A Cohen, VR Dasari, B Venable… - arxiv preprint arxiv …, 2025 - arxiv.org
Resource-constrained edge deployments demand AI solutions that balance high
performance with stringent compute, memory, and energy limitations. In this survey, we …

[CITATION][C] An analytic study of a novel algebraic public key encryption scheme based on polynomials over noncommutative matrix ring

S Kanwal, S Inam, R Ali - Journal of Algebra and Its Applications, 2025 - World Scientific
Different public key exchange protocols can be employed to design a cryptosystem. The
most famous example is the ElGamal cryptosystem which is based on the Diffie–Hellman …