Search Results for author: Daoyuan Wu

Found 9 papers, 3 papers with code

Testing and Understanding Erroneous Planning in LLM Agents through Synthesized User Inputs

no code implementations27 Apr 2024 Zhenlan Ji, Daoyuan Wu, Pingchuan Ma, Zongjie Li, Shuai Wang

These synthesized inputs are natural language paragraphs that specify the requirements for completing a series of tasks.

LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper

no code implementations24 Feb 2024 Daoyuan Wu, Shuai Wang, Yang Liu, Ning Liu

Our key insight is that regardless of the kind of jailbreak strategies employed, they eventually need to include a harmful prompt (e. g., "how to make a bomb") in the prompt sent to LLMs, and we found that existing LLMs can effectively recognize such harmful prompts that violate their safety policies.

Adversarial Attack

LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning

no code implementations29 Jan 2024 Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Wei Ma, Lyuye Zhang, Miaolei Shi, Yang Liu

Large language models (LLMs) have demonstrated significant poten- tial for many downstream tasks, including those requiring human- level intelligence, such as vulnerability detection.

Vulnerability Detection

VRPTEST: Evaluating Visual Referring Prompting in Large Multimodal Models

no code implementations7 Dec 2023 Zongjie Li, Chaozheng Wang, Chaowei Liu, Pingchuan Ma, Daoyuan Wu, Shuai Wang, Cuiyun Gao

With recent advancements in Large Multimodal Models (LMMs) across various domains, a novel prompting method called visual referring prompting has emerged, showing significant potential in enhancing human-computer interaction within multimodal systems.

Split and Merge: Aligning Position Biases in Large Language Model based Evaluators

no code implementations29 Sep 2023 Zongjie Li, Chaozheng Wang, Pingchuan Ma, Daoyuan Wu, Shuai Wang, Cuiyun Gao, Yang Liu

Specifically, PORTIA splits the answers into multiple segments, aligns similar content across candidate answers, and then merges them back into a single prompt for evaluation by LLMs.

Language Modelling Large Language Model +1

GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis

1 code implementation7 Aug 2023 Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu

Instead of relying solely on GPT to identify vulnerabilities, which can lead to high false positives and is limited by GPT's pre-trained knowledge, we utilize GPT as a versatile code understanding tool.

Vulnerability Detection

iExam: A Novel Online Exam Monitoring and Analysis System Based on Face Detection and Recognition

1 code implementation27 Jun 2022 Xu Yang, Daoyuan Wu, Xiao Yi, Jimmy H. M. Lee, Tan Lee

In this paper, we propose iExam, an intelligent online exam monitoring and analysis system that can not only use face detection to assist invigilators in real-time student identification, but also be able to detect common abnormal behaviors (including face disappearing, rotating faces, and replacing with a different person during the exams) via a face recognition-based post-exam video analysis.

Face Detection Face Recognition +2

A Sink-driven Approach to Detecting Exposed Component Vulnerabilities in Android Apps

1 code implementation24 May 2014 Daoyuan Wu, Xiapu Luo, Rocky K. C. Chang

We implement our sink-driven approach in a tool called ECVDetector and evaluate it with the top 1K Android apps.

Cryptography and Security

Analyzing Android Browser Apps for file:// Vulnerabilities

no code implementations17 Apr 2014 Daoyuan Wu, Rocky K. C. Chang

We design an automated system to dynamically test 115 browser apps collected from Google Play and find that 64 of them are vulnerable to the attacks.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.