Search Results for author: Jimmy Huang

Found 6 papers, 1 papers with code

A Survey on Retrieval-Augmented Text Generation for Large Language Models

no code implementations17 Apr 2024 Yizheng Huang, Jimmy Huang

Retrieval-Augmented Generation (RAG) merges retrieval methods with deep learning advancements to address the static limitations of large language models (LLMs) by enabling the dynamic integration of up-to-date external information.

Retrieval Text Generation

Exploring ChatGPT for Next-generation Information Retrieval: Opportunities and Challenges

no code implementations17 Feb 2024 Yizheng Huang, Jimmy Huang

The rapid advancement of artificial intelligence (AI) has highlighted ChatGPT as a pivotal technology in the field of information retrieval (IR).

Attribute Information Retrieval +1

A Comprehensive Evaluation of Large Language Models on Benchmark Biomedical Text Processing Tasks

1 code implementation6 Oct 2023 Israt Jahan, Md Tahmid Rahman Laskar, Chun Peng, Jimmy Huang

While their performance is still quite poor in comparison to the biomedical models that were fine-tuned on large training sets, our findings demonstrate that LLMs have the potential to be a valuable tool for various biomedical tasks that lack large annotated data.

CQSumDP: A ChatGPT-Annotated Resource for Query-Focused Abstractive Summarization Based on Debatepedia

no code implementations31 Mar 2023 Md Tahmid Rahman Laskar, Mizanur Rahman, Israt Jahan, Enamul Hoque, Jimmy Huang

Debatepedia is a publicly available dataset consisting of arguments and counter-arguments on controversial topics that has been widely used for the single-document query-focused abstractive summarization task in recent years.

Abstractive Text Summarization Text Generation

Extending Isolation Forest for Anomaly Detection in Big Data via K-Means

no code implementations27 Apr 2021 Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu

Moreover, we evaluate our proposed model on the live streaming data and find that our proposed system can be used for real-time anomaly detection in the industrial setup.

Anomaly Detection Intrusion Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.