no code implementations • 7 Apr 2024 • Zhilong Wang, Yebo Cao, Peng Liu
This paper proposes a new type of jailbreak attacks which can deceive both the LLMs and human (i. e., security analyst).
no code implementations • 2 Mar 2024 • An Chen, Zhilong Wang, Karl Luigi Loza Vidaurre, Yanqiang Han, Simin Ye, Kehao Tao, Shiwei Wang, Jing Gao, Jinjin Li
We focus on the application of transfer learning methods for the discovery of advanced molecules/materials, particularly, the construction of transfer learning frameworks for different systems, and how transfer learning can enhance the performance of models.
1 code implementation • 24 Jul 2023 • Zhilong Wang, Lan Zhang, Chen Cao, Nanqing Luo, Peng Liu
LLMs can be used on code analysis tasks like code review, vulnerabilities analysis and etc.
Ranked #3 on Code Generation on MBPP
no code implementations • 20 Jan 2023 • Lan Zhang, Chen Cao, Zhilong Wang, Peng Liu
The Bidirectional Encoder Representations from Transformers (BERT) were proposed in the natural language process (NLP) and shows promising results.
no code implementations • 12 Dec 2019 • Yoon-Ho Choi, Peng Liu, Zitong Shang, Haizhou Wang, Zhilong Wang, Lan Zhang, Junwei Zhou, Qingtian Zou
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Cryptography and Security