From google gemini to openai q*(q-star): A survey of resha** the generative artificial intelligence (ai) research landscape
This comprehensive survey explored the evolving landscape of generative Artificial
Intelligence (AI), with a specific focus on the transformative impacts of Mixture of Experts …
Intelligence (AI), with a specific focus on the transformative impacts of Mixture of Experts …
Using Z3 for formal modeling and verification of FNN global robustness
While Feedforward Neural Networks (FNNs) have achieved remarkable success in various
tasks, they are vulnerable to adversarial examples. Several techniques have been …
tasks, they are vulnerable to adversarial examples. Several techniques have been …
DeepCover: Advancing RNN test coverage and online error prediction using state machine extraction
Recurrent neural networks (RNNs) have emerged as powerful tools for processing
sequential data in various fields, including natural language processing and speech …
sequential data in various fields, including natural language processing and speech …
LUNA: A Model-Based Universal Analysis Framework for Large Language Models
Over the past decade, Artificial Intelligence (AI) has had great success recently and is being
used in a wide range of academic and industrial fields. More recently, Large Language …
used in a wide range of academic and industrial fields. More recently, Large Language …
Automata Extraction from Transformers
In modern machine (ML) learning systems, Transformer-based architectures have achieved
milestone success across a broad spectrum of tasks, yet understanding their operational …
milestone success across a broad spectrum of tasks, yet understanding their operational …
Feasability of Learning Weighted Automata on a Semiring
Since the seminal work by Angluin, active learning of automata, by membership and
equivalence queries, has been extensively studied and several generalisations have been …
equivalence queries, has been extensively studied and several generalisations have been …
Enhancing Adversarial Attacks: The Similar Target Method
S Zhang, Z Wang, Z Zhou, J Liu… - 2024 International Joint …, 2024 - ieeexplore.ieee.org
Adversarial examples are notably characterized by their strong transferability, allowing
attackers to craft these examples on their models and subsequently deploy them against …
attackers to craft these examples on their models and subsequently deploy them against …
[PDF][PDF] Minimising Q-Weighted Finite Automata over Z
J Laumen - 2024 - cs.ru.nl
Weighted finite automata (WFAs) are a generalisation of nondeterministic finite automata,
where transitions are additionally equipped with weights from a semiring. This induces a …
where transitions are additionally equipped with weights from a semiring. This induces a …
[PDF][PDF] On the Robustness of In-Context Learning with Noisy Labels: Train, Inference, and Beyond
C Cheng, H Wen, X Yu, Z Wei - chencheng.me
Abstract Recently, the mysterious In-Context Learning (ICL) ability of Transformer
architecture, particularly in large language models, has garnered considerable research …
architecture, particularly in large language models, has garnered considerable research …
[PDF][PDF] MAP: BOOSTING JAILBREAKING ATTACK WITH MOMENTUM AUTOPROMPT
Y Zhang, Z Wei - researchgate.net
ABSTRACT Large Language Models (LLMs) have achieved remarkable success across
diverse tasks, yet they remain vulnerable to adversarial attacks, notably the welldocumented …
diverse tasks, yet they remain vulnerable to adversarial attacks, notably the welldocumented …