Baluguri et al., 2025 - Google Patents
Prosense-Defending Text Generation with Adversarial FeedbackBaluguri et al., 2025
- Document ID
- 12064542908095216230
- Author
- Baluguri A
- Pasumarthy V
- Repakula Y
- Zhou Z
- Publication year
- Publication venue
- International Conference on Software Engineering and Data Engineering
External Links
Snippet
Text generation models such as DeepSeek, Qwen, and ChatGPT have become indispensable tools for automation and data generation in the era of AI-powered creation. However, there are significant weaknesses that expose these models to attacks such as …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2705—Parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2785—Semantic analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
- G06N5/025—Extracting rules from data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/10—Requirements analysis; Specification techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/51—Source to source
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N7/00—Computer systems based on specific mathematical models
- G06N7/005—Probabilistic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/18—Digital computers in general; Data processing equipment in general in which a programme is changed according to experience gained by the computer itself during a complete run; Learning machines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Watson et al. | A systematic literature review on the use of deep learning in software engineering research | |
| Du et al. | Techniques for interpretable machine learning | |
| Wu et al. | Usable XAI: 10 strategies towards exploiting explainability in the LLM era | |
| Lei et al. | Materials science in the era of large language models: a perspective | |
| Majumdar et al. | Automated evaluation of comments to aid software maintenance | |
| Gongane et al. | A survey of explainable AI techniques for detection of fake news and hate speech on social media platforms | |
| Busch et al. | ChatGPT in the loop: a natural language extension for domain-specific modeling languages | |
| Sellam et al. | Deepbase: Deep inspection of neural networks | |
| Shaw | Myths and mythconceptions: What does it mean to be a programming language, anyhow? | |
| Lin et al. | Deep neural-based vulnerability discovery demystified: data, model and performance | |
| Lim et al. | Test case information extraction from requirements specifications using NLP-based unified boilerplate approach | |
| Saraf et al. | Towards robust automated math problem solving: a survey of statistical and deep learning approaches | |
| Kamburjan et al. | Semantic reflection and digital twins: A comprehensive overview | |
| Ni et al. | A survey on large language model benchmarks | |
| Alenazi et al. | Assuring virtual PLC in the context of SysML models | |
| Baluguri et al. | Prosense-Defending Text Generation with Adversarial Feedback | |
| Watson | Deep learning in software engineering | |
| Baluguri et al. | Prosense-Defending Text Generation | |
| Saxena et al. | Mitigating Hallucinations in Large Language Models: A Comprehensive Survey on Detection and Reduction Strategies | |
| Sankaranarayanan et al. | Exploring BioClinical BERT’s NLP Capabilities with Explainability Techniques | |
| Xie et al. | An intelligent guided troubleshooting method for aircraft based on HybirdRAG | |
| Zhang et al. | Atomic Reasoning for Scientific Table Claim Verification | |
| Cummaudo | Improving the Reliability of Cloud-Based Pre-Trained Machine Learning Models | |
| Liu | Design and Implementation of an AI-based Agent to Inform Best Practices on Test Case Execution Routines | |
| Amyan et al. | Automating Fault Test Cases Generation and Execution for Automotive Safety Validation via NLP and HIL Simulation |