Chaofan Dai, Qideng Tang, Wubin Ma, Yahui Wu, Haohao Zhou, and Huahua Ding, Science and Technology on Information Systems Engineering Laboratory, National University of Defense Technology, Changsha, China
Entity resolution (ER), which aims to identify whether data records from various sources refer to the same real-world entity, is a crucial part of data integration systems. Traditional ER solutions assumes that data records are stored in relational tables with an aligned schema. However, in practical applications, it is common that data records to be matched may have different formats (e.g., relational, semi-structured, or textual types). In order to support ER for data records with varying formats, Generalized Entity Resolution has been proposed and has recently gained much attention. In this paper, we propose PromptER, a model based on pre-trained language models that offers an efficient and effective approach to accomplish Generalized Entity Resolution tasks. PromptER starts with a supervised contrastive learning process to train a Transformer encoder, which is afterward used for blocking and fine-tuned for matching. Specially, in the record embedding process, PromptER uses the proposed prompt embedding technique to better utilized the pre-trained language model layers and avoid embedding bias. Morever, we design a novel data augmentation method and an evaluation method to enhance the performance of the proposed model. We conduct experiments on the Generalized Entity Resolution dataset Machamp and the results show that PromptER significantly outperforms other state-of-art methods in the blocking and matching tasks.
Entity resolution, data integration, deep learning, contrastive learning, prompt learning.
Lara Alotaibi1, Sumayyah Seher2, and Nazeeruddin Mohammad3, 1Department of Computer Engineering and Science, Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia, 2Department of Computer Engineering and Science, Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia, 3Cybersecurity Center, Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia
The emergence of ChatGPT within the realm of computing has provided considerable advantages to a diverse array of individuals. However, it has also become a tool employed by adversaries to execute cyberattacks. This research paper examines the implementation of prompt engineering as a means to coerce ChatGPT into generating malicious content that deviates from its ethical boundaries. By leveraging these techniques, cybercriminals can effortlessly create a range of attacks, including phishing attempts, creating and propagating malware, backdoor attacks, and impersonation schemes, often in conjunction with deep fakes. To substantiate these cases, we successfully present concrete evidence by prompt engineering, which enabled the production of convincing phishing emails and code snippets for malware generation such as keyloggers. Additionally, we address the pressing concern of defending against these malicious activities, exploring effective approaches such as AI-generated text detection and system vulnerability detection.
AI-Powered Attacks, Backdoor Attacks, ChatGPT, Cyberattacks, Cybercrime, Malware, Prompt Engineering, Phishing Attacks.
Maria Alabdulrahman1, Renad Khayyat2, Kawthar Almowallad3, Zahra Alharz4, and Mohammad Abugurain55, 1Prince Mohammad Bin Fahd University, Alkhobar, Saudi Arabia, 2King Abdulaziz University, Jeddah, Saudi Arabia, 3King Abdulaziz University, Jeddah, Saudi Arabia, 4Imam Abdulrahman Bin Faisal University, Alkhobar, Saudi Arabia, 5King Abdullah University of Science and Technology, Jeddah, Saudi Arabia
We propose a novel approach to Arabic story generation by fine-tuning a pretrained Large Language Model (LLM). Our pipeline includes two stages: text generation and image generation. By fine-tuning the davinci-003 LLM on a dataset of 527 Arabic stories, we tailor the generated stories based on user preferences. For image generation, we utilize the Midjourney model. The results demonstrate the efficacy of fine-tuning a pre-trained image generation model on a limited dataset, as measured by the ROUGE score. Sarid’s contributions include addressing the lack of Arabic story generation models, providing a comprehensive dataset of Arabic stories, and integrating text and image generation for a cohesive story generation pipeline.
Artificial Intelligence, Fine-tuning, Generative Models, Image, Generation, Text Generation.
Jialiang Liu1 and Moddwyn Andaya2, 1La Salle College Prep, Pasadena, CA 91107, 2College of San Mateo, San Mateo, CA 94402
There has been a notable surge in the popularity of 3D donation programs, where numerous participants actively engage in mutual acts of charitable giving. Building upon extensive research conducted within these virtual philanthropic communities, we ve created and implemented a visualization system with the goal of providing users with an immersive and enjoyable experience while exploring and navigating extensive 3D donation networks. Our design harnesses familiar three-dimensional representations to introduce innovative techniques for comprehending the intricate connections within complex donation structures. It supports visual analysis and search functionalities, along with the automatic identification and visualization of philanthropic clusters. Through the deployment of public installations and controlled studies, our system has proven its usability, its capacity to facilitate discovery, and its potential to encourage enjoyable and socially engaging philanthropic endeavors.
3D Modeling, Donation, Computer Science, Unity, Website.
Mohamed Jacem Guezguez1 and Olfa Besbes2, 1Cogicom, Paris, France, 2University of Monastir, Monastir, Tunisia
The fifth generation (5G) network represents the latest evolution in mobile communication technology, offering several significant advancements over its predecessors, including 4G (LTE) and 3G. These advancements include faster speeds, lower latency, and a wealth of new capabilities. In parallel, unmanned aerial vehicles (UAVs), commonly referred to as drones, are gaining increasing popularity and becoming more ubiquitous. Integrating drones with 5G networks unlocks new possibilities and applications that harness the high-speed, low-latency, and extensive connectivity features of 5G technology. However, the misuse of drones can pose various risks and concerns, including issues related to privacy invasion and safety hazards. In response to these challenges, this research paper presents an innovative 5G Open RAN platform, featuring programmable software deployed on 5G gNodeBs, enabling the collection and monitoring of radio-sensitive events in relation to drone intrusion attacks. Additionally, a radio-based detection technique is proposed to identify threats and block unauthorized drones, thus safeguarding private infrastructures. To illustrate the effectiveness of this platform, a case study is included, demonstrating its capabilities in addressing drone intrusion attacks at an airport.
Mobile Network, Drone Attacks, 5G Networks, Beamforming, Network Slicing.
Ertuğrul AKBAŞ, Computer Engineering, Istanbul Esenyurt University, İstanbul, Turkey
This research paper examines the high risks encountered while using a Security Information and Event Management (SIEM) product or acquiring Security Operations Center (SOC) services. The paper focuses on key challenges such as insufficient logging, the importance of live log retentions, scalability concerns, and the critical aspect of correlation within SIEM. It also emphasizes the significance of compliance with various standards and regulations, as well as industry best practices for effective cybersecurity incident detection, response, and management.
SIEM, Security, SOC, Cyber Security, Insufficient logging, Live Log, Hot Log, Log Loss, Correlation.
ALMONZER SALAH NOORALDAIM1 and ADIL ALI SAED2, 1Department of Computer Science, Faculty of Electronics & Informatics, Xian Jiatong University, China, 2Department of Computer Science, International University of Africa, Sudan
This review delves into the realm of artificial intelligence (AI) applications within dentistry, with a specific focus on the identification of teeth and caries. A thorough exploration was conducted across PubMed and the Institute of Electrical and Electronics Engineers (IEEE) Xplore databases, yielding 29 pertinent studies (17 focusing on caries detection and 12 on tooth detection). The studies incorporated diverse dental images, including panoramic, bitewing, periapical, intraoral radiographs, radiovisiography, and computed tomography. Panoramic images were the most utilized (n=8), followed by bitewing (n=6), periapical (n=5), and computed tomography. Various neural networks were employed to discern the targeted variables, with outcomes diverging notably based on the quality and characteristics of the input data. To further broaden the scope of AI applications in dental diagnostics, upcoming research endeavors should explore the integration of neural networks in different radiological studies, such as cone beam computed tomography (CBCT) or cephalometry.
Carries Detection, Tooth Detection, Artificial intelligence, Clinical Decision System.
Negin Sokhandan, Amazon, United States of America
In Virtual Product Placement (VPP) applications, the discrete integration of specific brand products into images or videos has emerged as a challenging yet important task. This paper introduces a novel three-stage fully-automated VPP system. In the first stage, a language-guided image segmentation model identifies optimal regions within images for product inpainting. In the second stage, Stable Diffusion (SD), fine-tuned with a few example product images, is used to inpaint the product into the previously identified candidate regions. The final stage introduces an ’Alignment Module’, which is designed to effectively sieve out low-quality images. Comprehensive experiments demonstrate that the Alignment Module ensures the presence of the intended product in every generated image, and enhances the average quality of images by 35%. The results presented in this paper demonstrate the effectiveness of the proposed VPP system, which holds significant potential for transforming the landscape of virtual advertising and marketing strategies.
ALMONZER SALAH NOORALDAIM1 and ADIL ALI SAED2, 1Department of Computer Science, Faculty of Electronics & Informatics, Xian Jiatong University, China, 2Department of Computer Science, International University of Africa, Sudan
This review delves into the realm of artificial intelligence (AI) applications within dentistry, with a specific focus on the identification of teeth and caries. A thorough exploration was conducted across PubMed and the Institute of Electrical and Electronics Engineers (IEEE) Xplore databases, yielding 29 pertinent studies (17 focusing on caries detection and 12 on tooth detection). The studies incorporated diverse dental images, including panoramic, bitewing, periapical, intraoral radiographs, radiovisiography, and computed tomography. Panoramic images were the most utilized (n=8), followed by bitewing (n=6), periapical (n=5), and computed tomography. Various neural networks were employed to discern the targeted variables, with outcomes diverging notably based on the quality and characteristics of the input data. To further broaden the scope of AI applications in dental diagnostics, upcoming research endeavors should explore the integration of neural networks in different radiological studies, such as cone beam computed tomography (CBCT) or cephalometry.
Carries Detection, Tooth Detection, Artificial intelligence, Clinical Decision System.
Cédric Maron1, 2, Virginie Fresse1, Karynn Morand2 and Freddy Havart2, 1Laboratoire Hubert Curien, 18 rue Professeur Benoît Lauras Bâtiment F, 42000 SaintEtienne, France, 2SEGULA Technologie, 1 Rue des Combats du 24 Août 1944, 69200 Vénissieux, France
With the growing interest in neural network compression, several methods aiming to improve the networks accuracy have emerged. One of them, data augmentation aims to enhance model robustness and generalization by increasing the diversity of the training dataset. Another one, knowledge distillation, aims to transfer knowledge from a network (teacher) to a network (student) during its training phase. Knowledge distillation is generally carried out using high-end GPUs because teacher network architectures are often heavy and not adapted to be implemented on the small resources present in the Edge. This makes the distillation process impossible to implement a pure Edge infrastructure. However, this paper proposes a new distillation method adapted to an edge computing infrastructure. By employing multiple monoclasse teachers of small sizes, the proposed distillation method becomes applicable even within the constrained computing resources of the edge. The method proposed is evaluated with classical knowledge distillation based on bigger teacher network, using different data augmentation methods and using different amount of training data.
Neural network compression, knowledge distillation, edge computing, data augmentation.
Organizations have to plan on migrating to quantum-resilient cryptographic measures, also known as PQC. However, this is a difficult task, and to the best of our knowledge, there is no generalized approach to manage such a complex migration for cryptography used in IT systems that explicitly integrates into organizations’ steering mechanisms and control systems. We present PMMP, a risk-based process for managing the migration of organizations from classic cryptography to PQC and establishing crypto agility. Having completed the initial design phase, as well as a theoretical evaluation, we now intend to promote PMMP. Practitioners are encouraged to join the effort in order to enable a comprehensive practical evaluation and further development.
Post-Quantum Cryptography (PQC), PQC Migration Management Process (PMMP), Crypto Agility.
David Noever and Samantha Elizabeth Miller Noever, PeopleTec, 4901-D Corporate Drive, Huntsville, AL, USA, 35805
This study explores the capabilities of multimodal large language models (LLMs) in handling challenging multistep tasks that integrate language and vision, focusing on model steerability, composability, and the application of long-term memory and context understanding. The problem addressed is the LLMs ability (Nov 2023 GPT-4 Vision Preview) to manage tasks that require synthesizing visual and textual information, especially where stepwise instructions and sequential logic are paramount. The research presents a series of 14 creatively and constructively diverse tasks, ranging from AI Lego Designing to AI Satellite Image Analysis, designed to test the limits of current LLMs in contexts that previously proved difficult without extensive memory and contextual understanding. Key findings from evaluating 800 guided dialogs include notable disparities in task completion difficulty. For instance, Image to Ingredient AI Bartender (Low difficulty) contrasted sharply with AI Game Self-Player (High difficulty), highlighting the LLMs varying proficiency in processing complex visual data and generating coherent instructions. Tasks such as AI Genetic Programmer and AI Negotiator showed high completion difficulty, emphasizing challenges in maintaining context over multiple steps. The results underscore the importance of developing LLMs that combine long-term memory and contextual awareness to mimic human-like thought processes in complex problem-solving scenarios.
Large language models, creativity, steerability, composability, dataset.
Copyright © CCSEIT 2024