no code implementations • 27 Apr 2024 • Zhenlan Ji, Daoyuan Wu, Pingchuan Ma, Zongjie Li, Shuai Wang
These synthesized inputs are natural language paragraphs that specify the requirements for completing a series of tasks.
no code implementations • 24 Feb 2024 • Daoyuan Wu, Shuai Wang, Yang Liu, Ning Liu
Our key insight is that regardless of the kind of jailbreak strategies employed, they eventually need to include a harmful prompt (e. g., "how to make a bomb") in the prompt sent to LLMs, and we found that existing LLMs can effectively recognize such harmful prompts that violate their safety policies.
no code implementations • 29 Jan 2024 • Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Wei Ma, Lyuye Zhang, Miaolei Shi, Yang Liu
Large language models (LLMs) have demonstrated significant poten- tial for many downstream tasks, including those requiring human- level intelligence, such as vulnerability detection.
no code implementations • 7 Dec 2023 • Zongjie Li, Chaozheng Wang, Chaowei Liu, Pingchuan Ma, Daoyuan Wu, Shuai Wang, Cuiyun Gao
With recent advancements in Large Multimodal Models (LMMs) across various domains, a novel prompting method called visual referring prompting has emerged, showing significant potential in enhancing human-computer interaction within multimodal systems.
no code implementations • 29 Sep 2023 • Zongjie Li, Chaozheng Wang, Pingchuan Ma, Daoyuan Wu, Shuai Wang, Cuiyun Gao, Yang Liu
Specifically, PORTIA splits the answers into multiple segments, aligns similar content across candidate answers, and then merges them back into a single prompt for evaluation by LLMs.
1 code implementation • 7 Aug 2023 • Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu
Instead of relying solely on GPT to identify vulnerabilities, which can lead to high false positives and is limited by GPT's pre-trained knowledge, we utilize GPT as a versatile code understanding tool.
1 code implementation • 27 Jun 2022 • Xu Yang, Daoyuan Wu, Xiao Yi, Jimmy H. M. Lee, Tan Lee
In this paper, we propose iExam, an intelligent online exam monitoring and analysis system that can not only use face detection to assist invigilators in real-time student identification, but also be able to detect common abnormal behaviors (including face disappearing, rotating faces, and replacing with a different person during the exams) via a face recognition-based post-exam video analysis.
1 code implementation • 24 May 2014 • Daoyuan Wu, Xiapu Luo, Rocky K. C. Chang
We implement our sink-driven approach in a tool called ECVDetector and evaluate it with the top 1K Android apps.
Cryptography and Security
no code implementations • 17 Apr 2014 • Daoyuan Wu, Rocky K. C. Chang
We design an automated system to dynamically test 115 browser apps collected from Google Play and find that 64 of them are vulnerable to the attacks.
Cryptography and Security