no code implementations • 14 Feb 2024 • Yixin Cheng, Markos Georgopoulos, Volkan Cevher, Grigorios G. Chrysos
We contend that the prior context--the information preceding the attack query--plays a pivotal role in enabling potent Jailbreaking attacks.
no code implementations • 31 Jan 2024 • Yixin Cheng, Grigorios G. Chrysos, Markos Georgopoulos, Volkan Cevher
On the other hand, Polynomial Networks is a class of models that does not require activation functions, but have yet to perform on par with modern architectures.
1 code implementation • 2 May 2022 • Yixin Cheng
In terms of curriculum semantic analysis, after conducting a comprehensive systematic review regarding the use of semantic technologies in the Computer Science curriculum, a major finding of the study is that technologies used to measure similarity have limitations in terms of accuracy and ambiguity in the representation of concepts, courses, etc.