Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
Empathizing Before Generation: A Double-Layered Framework for Emotional Support LLM
AbstractLarge Language Models (LLMs) have found extensive use across different applications due to its diverse capabilities and proficiency in executing instructions. In the case of chatbots, they are frequently required to show empathy when used in the ...
- research-articleNovember 2024
Enhancing text-based knowledge graph completion with zero-shot large language models: A focus on semantic enhancement
AbstractThe design and development of text-based knowledge graph completion (KGC) methods leveraging textual entity descriptions are at the forefront of research. These methods involve advanced optimization techniques such as soft prompts and contrastive ...
- research-articleNovember 2023
Conditional Video Diffusion Network for Fine-Grained Temporal Sentence Grounding
IEEE Transactions on Multimedia (TOM), Volume 26Pages 5461–5476https://doi.org/10.1109/TMM.2023.3334019Temporal sentence grounding (TSG) aims to locate a semantically related segment of an untrimmed video guided by a sentence query. Since the untrimmed videos are too long, almost all existing TSG works first sparsely down-sample each video into a shorter ...
- research-articleOctober 2023
Comparing the Performance of Different Code Representations for Learning-based Vulnerability Detection
Internetware '23: Proceedings of the 14th Asia-Pacific Symposium on InternetwarePages 174–184https://doi.org/10.1145/3609437.3609464Software vulnerabilities can cause severe security threats to cyberspace, and it is of significant importance to conduct automated vulnerability detection research. Considering that the source code contains rich syntax and semantic information, plenty ...
- research-articleJune 2023
Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 30, Issue 8Pages 5299–5312https://doi.org/10.1109/TVCG.2023.3289234Current 3D mesh steganography algorithms relying on geometric modification are prone to detection by steganalyzers. In traditional steganography, adaptive steganography has proven to be an efficient means of enhancing steganography security. Taking ...
- research-articleFebruary 2023
Spectrum‐based fault localization using empirical mode decomposition algorithm
Journal of Software: Evolution and Process (WSMR), Volume 36, Issue 4https://doi.org/10.1002/smr.2546AbstractSpectrum‐based fault localization (SBFL) is considered as the most popular lightweight fault localization method. However, pure SBFL is proved to be tedious and time‐consuming for programmers to detect faults. This is because the suspiciousness ...
We propose a new spectral fault localization technique using empirical mode decomposition method to improve the accuracy of automatic software debugging. To accomplish that, the faulty program is evaluated by spectrum‐based fault localization, and then, ...
- research-articleApril 2022
Decentralized adaptive formation control based on sliding mode strategy for a class of second‐order nonlinear unknown dynamic multi‐agent systems
International Journal of Adaptive Control and Signal Processing (ACSP), Volume 36, Issue 4Pages 1045–1058https://doi.org/10.1002/acs.3381AbstractThis article investigates a decentralized adaptive sliding mode formation control (SMFC) based on the leader–follower formation strategy for a class of second‐order nonlinear unknown dynamic multi‐agent systems. Unlike the first‐order multi‐agent ...