379 research outputs found

    Assessing Prompt Injection Risks in 200+ Custom GPTs

    Full text link
    In the rapidly evolving landscape of artificial intelligence, ChatGPT has been widely used in various applications. The new feature: customization of ChatGPT models by users to cater to specific needs has opened new frontiers in AI utility. However, this study reveals a significant security vulnerability inherent in these user-customized GPTs: prompt injection attacks. Through comprehensive testing of over 200 user-designed GPT models via adversarial prompts, we demonstrate that these systems are susceptible to prompt injections. Through prompt injection, an adversary can not only extract the customized system prompts but also access the uploaded files. This paper provides a first-hand analysis of the prompt injection, alongside the evaluation of the possible mitigation of such attacks. Our findings underscore the urgent need for robust security frameworks in the design and deployment of customizable GPT models. The intent of this paper is to raise awareness and prompt action in the AI community, ensuring that the benefits of GPT customization do not come at the cost of compromised security and privacy

    A Survey of Graph Pre-processing Methods: From Algorithmic to Hardware Perspectives

    Full text link
    Graph-related applications have experienced significant growth in academia and industry, driven by the powerful representation capabilities of graph. However, efficiently executing these applications faces various challenges, such as load imbalance, random memory access, etc. To address these challenges, researchers have proposed various acceleration systems, including software frameworks and hardware accelerators, all of which incorporate graph pre-processing (GPP). GPP serves as a preparatory step before the formal execution of applications, involving techniques such as sampling, reorder, etc. However, GPP execution often remains overlooked, as the primary focus is directed towards enhancing graph applications themselves. This oversight is concerning, especially considering the explosive growth of real-world graph data, where GPP becomes essential and even dominates system running overhead. Furthermore, GPP methods exhibit significant variations across devices and applications due to high customization. Unfortunately, no comprehensive work systematically summarizes GPP. To address this gap and foster a better understanding of GPP, we present a comprehensive survey dedicated to this area. We propose a double-level taxonomy of GPP, considering both algorithmic and hardware perspectives. Through listing relavent works, we illustrate our taxonomy and conduct a thorough analysis and summary of diverse GPP techniques. Lastly, we discuss challenges in GPP and potential future directions

    Economic viability of dynamic wireless charging technology for private EVs

    Get PDF
    Dynamic wireless charging (DWC), which enables charging while EVs are in motion, is an attractive charging way. However, additional installed power tracks underneath the lane bring a significant concern on its economic viability. This paper proposes a comprehensive framework to evaluate the economic viability of the DWC lane for private EVs. The investment of local power support with renewable energy integration and energy storage is also considered in the DWC system. Charging choices of private EVs among multiple charging providers are modelled to estimate the electricity demand of the DWC system. The grid impact of the DWC system is studied via a multi-bus AC network. Moreover, an optimization policy is proposed to maximize the DWC provider’s profit and minimize the grid impact by adjusting the charging price and electricity procurement at each horizon. It is found that the payback period of the DWC system with the proposed optimization policy is shortened by 25% compared with the fixed charging price strategy. Even with a tight grid impact limit, the payback period will not be significantly longer under the proposed optimization policy. When the efficiency of the DWC lane increases to 90% and the cost reduces to 50%, the payback period is shortened by 19% and 22%, respectively

    Customized Network Security for Cloud Service

    Get PDF
    Modern cloud computing platforms based on virtual machine monitors (VMMs) host a variety of complex businesses which present many network security vulnerabilities. In order to protect network security for these businesses in cloud computing, nowadays, a number of middleboxes are deployed at front-end of cloud computing or parts of middleboxes are deployed in cloud computing. However, the former is leading to high cost and management complexity, and also lacking of network security protection between virtual machines while the latter does not effectively prevent network attacks from external traffic. To address the above-mentioned challenges, we introduce a novel customized network security for cloud service (CNS), which not only prevents attacks from external and internal traffic to ensure network security of services in cloud computing, but also affords customized network security service for cloud users. CNS is implemented by modifying the Xen hypervisor and proved by various experiments which showing the proposed solution can be directly applied to the extensive practical promotion in cloud computing

    Thioredoxin Reductase Is Involved in Development and Pathogenicity in Fusarium graminearum

    Get PDF
    Fusarium graminearum is one of the causal agents of Fusarium head blight and produces the trichothecene mycotoxin, deoxynivalenol (DON). Thioredoxin reductases (TRRs) play critical roles in the recycling of oxidized thioredoxin. However, their functions are not well known in plant pathogenic fungi. In this study, we characterized a TRR orthologue FgTRR in F. graminearum. The FgTRR-GFP fusion protein localized to the cytoplasm. FgTRR gene deletion demonstrated that FgTRR is involved in hyphal growth, conidiation, sexual reproduction, DON production, and virulence. The ΔTRR mutants also exhibited a defect in pigmentation, the expression level of aurofusarin biosynthesis-related genes was significantly decreased in the FgTRR mutant. Furthermore, the ΔTRR mutants were more sensitive to oxidative stress and aggravated apoptosis-like cell death compared with the wild type strain. Taken together, these results indicate that FgTRR is important in development and pathogenicity in F. graminearum

    Role of Cytokinin, Strigolactone, and Auxin Export on Outgrowth of Axillary Buds in Apple

    Get PDF
    Shoot branching is regulated by phytohormones, including cytokinin (CK), strigolactone (SL), and auxin in axillary buds. The correlative importance of these phytohormones in the outgrowth of apple axillary buds remains unclear. In this study, the outgrowth dynamics of axillary buds of a more-branching mutant (MB) and its wild-type (WT) of Malus spectabilis were assessed using exogenous chemical treatments, transcriptome analysis, paraffin section, and reverse transcription-quantitative PCR analysis (RT-qPCR). High contents of CK and abscisic acid coincided in MB axillary buds. Exogenous CK promoted axillary bud outgrowth in the WT but not in MB, whereas exogenous gibberellic had no significant effect on bud outgrowth in the WT. Functional analysis of transcriptome data and RT-qPCR analysis of gene transcripts revealed that MB branching were associated with CK signaling, auxin transport, and SL signaling. Transcription of the SL-related genes MsMAX1, MsD14, and MsMAX2 in the axillary buds of MB was generally upregulated during bud outgrowth, whereas MsBRC1/2 were generally downregulated both in WT and MB. Exogenous SL inhibited outgrowth of axillary buds in the WT and the apple varieties T337, M26, and Nagafu 2, whereas axillary buds of the MB were insensitive to SL treatment. Treatment with N-1-naphthylphalamic acid (NPA; an auxin transport inhibitor) inhibited bud outgrowth in plants of the WT and MB. The transcript abundance of MsPIN1 was generally decreased in response to NPA and SL treatments, and increased in CK and decapitation treatments, whereas no consistent pattern was observed for MsD14 and MsMAX2. Collectively, the present results suggest that in apple auxin transport from the axillary bud to the stem may be essential for the outgrowth of axillary buds, and at least, is involved in the process of bud outgrowth

    Development and field evaluation of a novel sugar bait device for controlling residential vector mosquitoes in Zhejiang Province, China

    Get PDF
    BackgroundMosquito-borne diseases pose serious public health threats in Zhejiang Province, China, and vector control is believed to be the primary method for reducing transmission. Due to severe resistance problems, effective and sustainable methods without chemical insecticides are urgently required to control mosquito vectors. Attractive toxic sugar baits (ATSB) are newly developed methods to control mosquitoes in recent decades with the core element sugar bait, which was invented according to the sugar-feeding behavior of mosquitoes. In this study, we developed a Novel Sugar Bait Device (NSBD) trap by combining sugar bait and physical adhesive capture technology. The study aimed to evaluate the effect of the NSBD trap on controlling mosquitoes in residential environments and to identify the optimal sugar solution concentration in the sugar bait of the NSBD for real use.MethodsFour residential villages in Ningbo City with similar geographic environments and mosquito densities were selected for field trials in 2022. One village (site 1) was designated as the control group, and three villages (sites 2–4) served as the test groups to assess the effectiveness of NSBD traps with different sugar solution concentrations (6, 8, and 10%) in the sugar bait. Larval and adult mosquito densities were monitored monthly before and semi-monthly after the trials using the CDC light trap and larval pipette method.ResultsBefore the trials, we monitored mosquito density for 3 months to confirm the baseline mosquito density among the four sites, and no statistical differences in adult and larval mosquitoes were found (adult, F = 3.047, p > 0.05; larvae, F = 0.436, p > 0.05). After the trials, all NCBD traps effectively controlled larval and adult mosquito densities, with the highest standard decrease rates of larval and adult mosquito densities at 57.80 and 86.31%, respectively, observed in site 4. The most suitable sugar solution concentration in the sugar bait was 10%.ConclusionNSBD traps effectively controlled mosquitoes in residential environments during field trials. Without the use of insecticides, this may be a promising choice for mosquito vector control to prevent mosquito-borne diseases
    • …
    corecore