no code implementations • 4 Feb 2024 • Michal Shlapentokh-Rothman, Ansel Blume, Yao Xiao, Yuqun Wu, Sethuraman T V, Heyi Tao, Jae Yong Lee, Wilfredo Torres, Yu-Xiong Wang, Derek Hoiem
We investigate whether region-based representations are effective for recognition.
no code implementations • 24 Oct 2023 • Heyi Tao, Sethuraman T V, Michal Shlapentokh-Rothman, Derek Hoiem
The paper investigates using a Large Language Model (LLM) to automatically perform web software tasks using click, scroll, and text input operations.
1 code implementation • 6 Oct 2023 • Andy Zhou, Kai Yan, Michal Shlapentokh-Rothman, Haohan Wang, Yu-Xiong Wang
While large language models (LLMs) have demonstrated impressive performance on a range of decision-making tasks, they rely on simple acting processes and fall short of broad deployment as autonomous agents.
Ranked #3 on Code Generation on HumanEval
1 code implementation • 1 Oct 2020 • Erik Hemberg, Jonathan Kelly, Michal Shlapentokh-Rothman, Bryn Reinstadler, Katherine Xu, Nick Rutar, Una-May O'Reilly
Many public sources of cyber threat and vulnerability information exist to serve the defense of cyber systems.
Cryptography and Security