-
1201
-
1202
Generation, Detection, and Evaluation of Role-play based Jailbreak attacks in Large Language Models
Published 2024“…Through these processes, we learn the following information, respectively. 1) Out-of-the-box models such as GPT-4 are effective at generating successful role-play jailbreak attack prompts when being generated on just a few examples via fewshot prompting. 2) We can automatically classify LLM responses as jailbroken or not with high accuracy using statistical methods including Principal Component Analysis (PCA) and Support Vector Machines (SVMs). 3) Most classification architectures are unable to perform the complex task of accurately predicting whether a role-play prompt will successfully yield a jailbreak attack. …”
Get full text
Thesis -
1203
Investigation of fluorescence lifetime imaging for quantitative cervical cancer screening and diagnosis
Published 2015“…Mean and standard deviation of the characteristic fluorescence lifetime were used as feature vectors to feed into a neural network extreme learning machine (ELM) classifier for discrimination. …”
Get full text
Thesis -
1204
Cognizant multitasking in multiobjective multifactorial evolution : MO-MFEA-II
Published 2021“…While multitasking solvers have led to recent success stories, a known shortcoming of existing methods is their inability to adapt the extent of transfer in a principled manner. …”
Get full text
Journal Article -
1205
-
1206
Modelling and characterization of membrane fouling in osmotically-driven membrane processes (ODMPs)
Published 2021“…Performance of neural networks bears strong relationship with learning rate, number of hidden layers and number of nodes in hidden layer. …”
Get full text
Thesis-Doctor of Philosophy -
1207
Examining diabetes management apps recommended from a Google search : content analysis
Published 2019“…Objective: The objective of this study was to investigate apps identified through a Google search and characterize these apps in terms of features that support diabetes management. Methods: We performed a Google search for the “best diabetes apps 2017” and explored the first 4 search results. …”
Get full text
Get full text
Journal Article -
1208
Energy-efficient hardware accelerators based on bit-serial graph and memory-centric computing architectures
Published 2023“…In the second half of the thesis, we propose two all-digital bit-serial computing graph-based accelerators to solve PDEs using the finite difference method (FDM) and a checkerboard grid update method. …”
Get full text
Thesis-Doctor of Philosophy -
1209
Perovskite superstructures and heterostructures for enhanced optical performance
Published 2023“…In this work, MA/FA/CsPbBr3 perovskite SSs were synthesized using the more scalable and facile ligand-assisted reprecipitation (LARP) method, demonstrating both the existence of hybrid perovskite SSs and the potential of the LARP method in obtaining perovskite SSs. …”
Get full text
Thesis-Doctor of Philosophy -
1210
Efficient algorithms for subgraph counting and enumeration on large graphs
Published 2024“…It determines the weights of edges in a data-driven fashion, using a novel method based on reinforcement learning. We conduct extensive experi- ments to verify that our technique can produce estimates with smaller errors while often running faster compared with existing algorithms. …”
Get full text
Thesis-Doctor of Philosophy -
1211
Autoencoder-Based Anomaly Detection System for Online Data Quality Monitoring of the CMS Electromagnetic Calorimeter
Published 2024“…A real-time autoencoder-based anomaly detection system using semi-supervised machine learning is presented enabling the detection of anomalies in the CMS electromagnetic calorimeter data. …”
Get full text
Article -
1212
GPU-based commonsense reasoning for real-time query answering and multimodal analysis
Published 2017“…The graph compression method converts the data graph to a weighted graph which is small enough to be maintained in GPU memory. …”
Get full text
Thesis -
1213
Active Extrinsic Contact Sensing: Application to General Peg-in-Hole Insertion
Published 2024Get full text
Article -
1214
Spatiotemporal saliency detection via sparse representation
Published 2013“…Multimedia applications like retrieval, copy detection etc. can gain from saliency detection, which is essentially a method to identify areas in images and videos that capture the attention of the human visual system. …”
Get full text
Get full text
Conference Paper -
1215
Lighting transfer across multiple views through local color transforms
Published 2018“…We present a method for transferring lighting between photographs of a static scene. …”
Get full text
Get full text
Journal Article -
1216
Universal Adaptive Control of Nonlinear Systems
Published 2024“…The approach adjusts the rate of adaptation online to eliminate the effects of parameter estimation transients on stability. The method can be immediately combined with a previously designed or learned feedback policy if a corresponding model-parameterized Lyapunov function or contraction metric is known. …”
Get full text
Article -
1217
Received signal strength based indoor positioning using a random vector functional link network
Published 2020“…Moreover, the feature selector and predictor are jointly learned iteratively in a single framework based on an augmented Lagrangian method. …”
Get full text
Journal Article -
1218
Graph embeddings on gene ontology annotations for protein-protein interaction prediction
Published 2021“…To address these two issues, we define two corresponding tasks, namely missing PPI prediction and spurious PPI prediction, and propose a method that employs graph embeddings that learn vector representations from constructed Gene Ontology Annotation (GOA) graphs and then use embedded vectors to achieve the two tasks. …”
Get full text
Journal Article -
1219
Transactional log analysis approach to evaluating an education Website
Published 2010“…Even with limited resources, organisations could use this method to learn how their resources on the World Wide Web are serving their clientele or a particular group of clients.…”
Get full text
Thesis -
1220
Visual activity monitoring : assisted child-minding home camera surveillance system
Published 2010“…The main focus of this project is to develop a robust activity monitoring system which is able track and automatically recognize the activities of a child in an unsupervised environment. Codebook method is used to learn the background for foreground detection and tracking is initialized for every new foreground object detected. …”
Get full text
Final Year Project (FYP)