Byeng Hee Chang
YOU?
Author Swipe
View article: Improving Fisher Information Estimation and Efficiency for LoRA-based LLM Unlearning
Improving Fisher Information Estimation and Efficiency for LoRA-based LLM Unlearning Open
LLMs have demonstrated remarkable performance across various tasks but face challenges related to unintentionally generating outputs containing sensitive information. A straightforward approach to address this issue is to retrain the model…
View article: Big Data-Driven Computer-Aided Network Attack Simulation and Defense System Optimization
Big Data-Driven Computer-Aided Network Attack Simulation and Defense System Optimization Open
As cyber-attacks and network vulnerabilities get more sophisticated, optimizing protection systems utilizing advanced computational methodologies is critical. Big data approaches are a viable way to simulate network attacks and improve pro…
View article: The RAG Paradox: A Black-Box Attack Exploiting Unintentional Vulnerabilities in Retrieval-Augmented Generation Systems
The RAG Paradox: A Black-Box Attack Exploiting Unintentional Vulnerabilities in Retrieval-Augmented Generation Systems Open
With the growing adoption of retrieval-augmented generation (RAG) systems, various attack methods have been proposed to degrade their performance. However, most existing approaches rely on unrealistic assumptions in which external attacker…
View article: Network Attack Simulation and Defense System Optimization based on Big Data
Network Attack Simulation and Defense System Optimization based on Big Data Open
View article: An Empirical Analysis on the Success Factors of Crowdfunding: Focusing on the Movie Category Project
An Empirical Analysis on the Success Factors of Crowdfunding: Focusing on the Movie Category Project Open
View article: Factors Affecting the Box Office Performance in the Chinese Film Market: Focusing on Films Released in 2010~2014
Factors Affecting the Box Office Performance in the Chinese Film Market: Focusing on Films Released in 2010~2014 Open