Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024JUST ACCEPTED
A Survey on Hallucination in Large Language Models: Principles, Taxonomy, Challenges, and Open Questions
- Lei Huang,
- Weijiang Yu,
- Weitao Ma,
- Weihong Zhong,
- Zhangyin Feng,
- Haotian Wang,
- Qianglong Chen,
- Weihua Peng,
- Xiaocheng Feng,
- Bing Qin,
- Ting Liu
The emergence of large language models (LLMs) has marked a significant breakthrough in natural language processing (NLP), fueling a paradigm shift in information acquisition. Nevertheless, LLMs are prone to hallucination, generating plausible yet ...
- ArticleNovember 2024
Enhancing Complex Causality Extraction via Improved Subtask Interaction and Knowledge Fusion
Natural Language Processing and Chinese ComputingPages 67–80https://doi.org/10.1007/978-981-97-9440-9_6AbstractEvent Causality Extraction (ECE) aims at extracting causal event pairs from texts. Despite ChatGPT’s recent success, fine-tuning small models remains the best approach for the ECE task. However, existing fine-tuning based ECE methods cannot ...
- research-articleOctober 2024
IconDM: Text-Guided Icon Set Expansion Using Diffusion Models
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 156–165https://doi.org/10.1145/3664647.3681057Icons are ubiquitous visual elements in graphic design, yet their creation is often complex and time-consuming. To resolve this problem, we draw inspiration from the booming text-to-image field and propose Text-Guided Icon Set Expansion, a novel task ...
- research-articleOctober 2024
One-shot In-context Part Segmentation
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 10966–10975https://doi.org/10.1145/3664647.3680989In this paper, we present the One-shot In-context Part Segmentation (OIParts) framework, designed to tackle the challenges of part segmentation by leveraging visual foundation models (VFMs). Existing training-based one-shot part segmentation methods that ...
- research-articleOctober 2024
GIST: Improving Parameter Efficient Fine-Tuning via Knowledge Interaction
MM '24: Proceedings of the 32nd ACM International Conference on MultimediaPages 8835–8844https://doi.org/10.1145/3664647.3680843Recently, the Parameter Efficient Fine-Tuning (PEFT) method, which adjusts or introduces fewer trainable parameters to calibrate pre-trained models on downstream tasks, has been a hot research topic. However, existing PEFT methods within the traditional ...
-
- research-articleOctober 2024
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs
- Yin Wang,
- Ming Fan,
- Hao Zhou,
- Haijun Wang,
- Wuxia Jin,
- Jiajia Li,
- Wenbo Chen,
- Shijie Li,
- Yu Zhang,
- Deqiang Han,
- Ting Liu
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1667–1679https://doi.org/10.1145/3691620.3695534The rising popularity of mini-programs deployed on super-app platforms has drawn significant attention due to their convenience. However, developers' improper handling of data permission application in mini-programs has raised concerns about non-...
- research-articleOctober 2024
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1595–1606https://doi.org/10.1145/3691620.3695528Mobile apps often access personal information to meet business needs, raising concerns about privacy breaches. Compliance detection methods are proposed to check for inconsistencies between program code and privacy policies. However, existing methods ...
- research-articleOctober 2024
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1570–1582https://doi.org/10.1145/3691620.3695526Smart contracts are susceptible to various vulnerabilities that can be exploited by hackers via developing adversarial contracts. Existing vulnerability detection techniques often concentrate solely on vulnerable contracts, neglecting adversarial ...
- research-articleOctober 2024
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1019–1031https://doi.org/10.1145/3691620.3695482Smart contracts are prone to vulnerabilities, with reentrancy attacks posing significant risks due to their destructive potential. While various methods exist for detecting reentrancy vulnerabilities in smart contracts, such as static analysis, these ...
- ArticleNovember 2024
- research-articleNovember 2024
Event Causality Identification via Competitive-Cooperative Cognition Networks
AbstractIdentifying the causal relations between events is an important task in natural language processing (NLP). However, existing methods mainly leverage human empirical information about causality from limited labeled corpus or pseudo-data, which ...
Highlights- A novel cognitively-inspired method for the event causality identification task.
- Application of dual process theory in natural language processing.
- Parallel competition between the intuitive and the logical reasoning processes.
- research-articleOctober 2024
A fine-grained self-adapting prompt learning approach for few-shot learning with pre-trained language models
AbstractPre-trained language models have demonstrated remarkable performance in few-shot learning through the emergence of “prompt-based learning” methods, where the performance of these tasks highly rely on the quality of prompts. Existing prompt ...
Highlights- We present the weak consistency assumption that the prompts in a task are consistent in the whole task but diverse in individuals, which allows us to learn example-specific templates.
- We propose to train a prompt generator with the ...
- research-articleAugust 2024
3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency
IEEE Transactions on Software Engineering (ISOF), Volume 50, Issue 10Pages 2633–2655https://doi.org/10.1109/TSE.2024.3449564As software continues to evolve and business functions become increasingly complex, architectural inconsistency arises when the implementation architecture deviates from the expected architecture design. This architectural problem makes maintenance ...
- research-articleAugust 2024JUST ACCEPTED
Knowledge-tuning Large Language Models with Structured Medical Knowledge Bases for Trustworthy Response Generation in Chinese
ACM Transactions on Knowledge Discovery from Data (TKDD), Just Accepted https://doi.org/10.1145/3686807Large Language Models (LLMs) have demonstrated remarkable success in diverse natural language processing (NLP) tasks in general domains. However, LLMs sometimes generate responses with the hallucination about medical facts due to limited domain knowledge. ...
- ArticleAugust 2024
Oceanship: A Large-Scale Dataset for Underwater Audio Target Recognition
Advanced Intelligent Computing Technology and ApplicationsPages 475–486https://doi.org/10.1007/978-981-97-5591-2_40AbstractThe recognition of underwater audio plays a significant role in identifying a vessel while it is in motion. Underwater target recognition tasks have a wide range of applications in areas such as marine environmental protection, detection of ship ...
- research-articleAugust 2024
Uncertainty-guided label correction with wavelet-transformed discriminative representation enhancement
AbstractLabel noises, categorized into closed-set noise and open-set noise, are prevalent in real-world scenarios and can seriously hinder the generalization ability of models. Identifying noise is challenging because noisy samples closely resemble true ...
- research-articleJuly 2024
ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwarePages 377–386https://doi.org/10.1145/3671016.3674820In the field of software development, the application of code quality check tools has become a key factor in improving product quality and development efficiency. While many existing tools are effective at detecting common problems in code, there are ...
- short-paperJuly 2024
LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication
Internetware '24: Proceedings of the 15th Asia-Pacific Symposium on InternetwarePages 81–84https://doi.org/10.1145/3671016.3671404Malicious Android applications often employ covert behaviors to exfiltrate sensitive data, thereby compromising user privacy. Traditional detection techniques predominantly utilize static analysis of the source code to detect such sensitive behaviors, ...
- ArticleJuly 2024
A Novel Entropy-Based Regularization for NeRF to View Synthesis in Few-Shot Scenarios
AbstractThe Neural Radiance Field (NeRF) has marked a significant advance in 3D computer vision and graphics, offering the ability to generate high-quality views from multiple images. However, its performance is significantly limited in scenarios with ...
- ArticleJuly 2024
3D Multi-scene Stylization Based on Conditional Neural Radiance Fields
AbstractNeural Radiation Field (NeRF) is a scene model capable of achieving high-quality view synthesis, optimized for each specific scene. In this paper, we propose a conditional neural radiation field based on multi-resolution hash coding, enabling high-...