Large language models for software engineering: A systematic literature review
Large Language Models (LLMs) have significantly impacted numerous domains, including
Software Engineering (SE). Many recent publications have explored LLMs applied to …
Software Engineering (SE). Many recent publications have explored LLMs applied to …
[HTML][HTML] A survey on large language model (llm) security and privacy: The good, the bad, and the ugly
Abstract Large Language Models (LLMs), such as ChatGPT and Bard, have revolutionized
natural language understanding and generation. They possess deep language …
natural language understanding and generation. They possess deep language …
Large language models for forecasting and anomaly detection: A systematic literature review
This systematic literature review comprehensively examines the application of Large
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …
Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …
CLAP: Learning transferable binary code representations with natural language supervision
Binary code representation learning has shown significant performance in binary analysis
tasks. But existing solutions often have poor transferability, particularly in few-shot and zero …
tasks. But existing solutions often have poor transferability, particularly in few-shot and zero …
Musechat: A conversational music recommendation system for videos
Music recommendation for videos attracts growing interest in multi-modal research.
However existing systems focus primarily on content compatibility often ignoring the users' …
However existing systems focus primarily on content compatibility often ignoring the users' …
Advanced network intrusion detection with tabtransformer
In today's digital era, the security of networked systems is of utmost importance amidst the
increasing prevalence of cyber threats and sophisticated intrusion techniques. This paper …
increasing prevalence of cyber threats and sophisticated intrusion techniques. This paper …
[PDF][PDF] Graphene: Infrastructure Security Posture Analysis with AI-generated Attack Graphs
The rampant occurrence of cybersecurity breaches imposes substantial limitations on the
progress of network infrastructures, leading to compromised data, financial losses, potential …
progress of network infrastructures, leading to compromised data, financial losses, potential …
Accelerating Semi-Asynchronous Federated Learning
C Xu, Y Qiao, Z Zhou, F Ni, J **ong - arxiv preprint arxiv:2402.10991, 2024 - arxiv.org
Federated Learning (FL) is a distributed machine learning paradigm that allows clients to
train models on their data while preserving their privacy. FL algorithms, such as Federated …
train models on their data while preserving their privacy. FL algorithms, such as Federated …
On the effectiveness of large language models in statement-level code summarization
J Zhu, Y Miao, T Xu, J Zhu, X Sun - 2024 IEEE 24th …, 2024 - ieeexplore.ieee.org
Code comments are crucial for program comprehension, and the automated generation of
comments greatly enhances the efficiency of code commenting. Statement-level code …
comments greatly enhances the efficiency of code commenting. Statement-level code …
Enhancing kitchen independence: Deep learning-based object detection for visually impaired assistance
B Dang, D Ma, S Li, X Dong, H Zang… - Academic Journal of …, 2024 - drpress.org
Visually impaired individuals face substantial challenges in kitchens, where identifying
objects accurately is crucial yet difficult due to the complexity and variability of the …
objects accurately is crucial yet difficult due to the complexity and variability of the …