Researcher / data /seed_papers.json
amarck's picture
Add HF Spaces support, preference seeding, archive search, tests
430d0f8
[
{
"arxiv_id": "2401.04088",
"title": "DeepSeek-Coder-V2: Breaking the Barrier of Closed-Source Models in Code Intelligence",
"domain": "aiml",
"categories": ["cs.CL", "cs.SE", "cs.AI"],
"summary": "Open-source code LLM matching GPT-4 Turbo on coding benchmarks with MoE architecture."
},
{
"arxiv_id": "2403.05530",
"title": "GaLore: Memory-Efficient LLM Training by Gradient Low-Rank Projection",
"domain": "aiml",
"categories": ["cs.LG", "cs.CL"],
"summary": "Reduces memory usage for LLM training via gradient projection, enabling 7B training on consumer GPUs."
},
{
"arxiv_id": "2402.13616",
"title": "World Model on Million-Length Video and Language with RingAttention",
"domain": "aiml",
"categories": ["cs.CV", "cs.CL", "cs.LG"],
"summary": "Trains world models on million-token video sequences using ring attention for long context."
},
{
"arxiv_id": "2403.03206",
"title": "The Claude 3 Model Family",
"domain": "aiml",
"categories": ["cs.CL", "cs.AI"],
"summary": "Multimodal LLM family with strong vision capabilities and extended context windows."
},
{
"arxiv_id": "2402.17764",
"title": "Sora: A Review on Background, Technology, Limitations, and Opportunities",
"domain": "aiml",
"categories": ["cs.CV", "cs.AI"],
"summary": "Analysis of video generation model capabilities, architecture, and limitations."
},
{
"arxiv_id": "2401.02954",
"title": "MoE-Mamba: Efficient Selective State Space Models with Mixture of Experts",
"domain": "aiml",
"categories": ["cs.LG", "cs.CL"],
"summary": "Combines Mamba state-space model with mixture-of-experts for efficient scaling."
},
{
"arxiv_id": "2403.09611",
"title": "Quiet-STaR: Language Models Can Teach Themselves to Think Before Speaking",
"domain": "aiml",
"categories": ["cs.CL", "cs.AI", "cs.LG"],
"summary": "Self-taught reasoning where LLMs learn to generate internal rationale tokens."
},
{
"arxiv_id": "2402.01032",
"title": "OLMo: Accelerating the Science of Language Models",
"domain": "aiml",
"categories": ["cs.CL", "cs.AI"],
"summary": "Fully open-source LLM with released weights, code, data, and training logs."
},
{
"arxiv_id": "2403.14608",
"title": "ReALM: Reference Resolution As Language Modeling",
"domain": "aiml",
"categories": ["cs.CL", "cs.AI"],
"summary": "Resolves onscreen and conversational references using LLMs for device agents."
},
{
"arxiv_id": "2402.14261",
"title": "Griffin: Mixing Gated Linear Recurrences with Local Attention for Efficient Language Models",
"domain": "aiml",
"categories": ["cs.LG", "cs.CL"],
"summary": "Hybrid architecture combining gated linear RNNs with local attention, matching transformer quality."
},
{
"arxiv_id": "2401.14196",
"title": "GPTQ: Accurate Post-Training Quantization for Generative Pre-trained Transformers",
"domain": "aiml",
"categories": ["cs.LG", "cs.CL"],
"summary": "One-shot quantization method reducing LLM size to 3-4 bits with minimal accuracy loss."
},
{
"arxiv_id": "2403.07691",
"title": "Stealing Part of a Production Language Model",
"domain": "security",
"categories": ["cs.CR", "cs.LG", "cs.AI"],
"summary": "Extracts internal architecture details from production LLM APIs through crafted queries."
},
{
"arxiv_id": "2402.06132",
"title": "SoK: Where's the Bug? A Study of Bug Localization Tools",
"domain": "security",
"categories": ["cs.CR", "cs.SE"],
"summary": "Systematizes bug localization approaches and evaluates 23 tools on real-world CVEs."
},
{
"arxiv_id": "2401.16727",
"title": "A Survey of Side-Channel Attacks on Intel SGX",
"domain": "security",
"categories": ["cs.CR"],
"summary": "Comprehensive analysis of side-channel attacks targeting Intel SGX enclaves."
},
{
"arxiv_id": "2403.02783",
"title": "SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning",
"domain": "security",
"categories": ["cs.CR", "cs.SE"],
"summary": "RL-guided kernel fuzzer that outperforms Syzkaller in bug discovery rate."
},
{
"arxiv_id": "2402.15483",
"title": "BSIMM: An Empirical Study of 130 Software Security Programs",
"domain": "security",
"categories": ["cs.CR", "cs.SE"],
"summary": "Large-scale study of enterprise security maturity across 130 organizations."
},
{
"arxiv_id": "2403.14469",
"title": "Reverse Engineering eBPF Programs: Challenges and Approaches",
"domain": "security",
"categories": ["cs.CR", "cs.OS"],
"summary": "Novel techniques for reverse engineering eBPF bytecode in Linux kernel security."
},
{
"arxiv_id": "2401.09577",
"title": "WiFi-Based Keystroke Inference Attack Using Adversarial CSI Perturbation",
"domain": "security",
"categories": ["cs.CR", "cs.NI"],
"summary": "Exploits WiFi channel state information to infer keystrokes from nearby devices."
},
{
"arxiv_id": "2402.08787",
"title": "Binary Code Similarity Detection via Graph Neural Networks",
"domain": "security",
"categories": ["cs.CR", "cs.SE", "cs.LG"],
"summary": "GNN-based approach to detect similar binary functions across compilers and architectures."
},
{
"arxiv_id": "2403.01218",
"title": "Practical Exploitation of DNS Rebinding in IoT Devices",
"domain": "security",
"categories": ["cs.CR", "cs.NI"],
"summary": "Demonstrates DNS rebinding attacks against 15 popular IoT devices in home networks."
},
{
"arxiv_id": "2401.15491",
"title": "GPU.zip: Side Channel Attacks on GPU-Based Graphical Data Compression",
"domain": "security",
"categories": ["cs.CR"],
"summary": "First cross-origin pixel-stealing attack through GPU hardware data compression."
},
{
"arxiv_id": "2402.03367",
"title": "CryptoFuzz: Fully Automated Testing of Cryptographic API Misuse",
"domain": "security",
"categories": ["cs.CR", "cs.SE"],
"summary": "Automated fuzzer detecting cryptographic API misuse patterns in Java applications."
},
{
"arxiv_id": "2403.08946",
"title": "Video Generation Models as World Simulators",
"domain": "aiml",
"categories": ["cs.CV", "cs.AI", "cs.LG"],
"summary": "Explores how video generation models learn physical world dynamics as implicit simulators."
},
{
"arxiv_id": "2402.05929",
"title": "V-JEPA: Video Joint Embedding Predictive Architecture",
"domain": "aiml",
"categories": ["cs.CV", "cs.LG"],
"summary": "Self-supervised video representation learning that predicts in latent space rather than pixel space."
},
{
"arxiv_id": "2401.10020",
"title": "AlphaGeometry: Solving Olympiad Geometry without Human Demonstrations",
"domain": "aiml",
"categories": ["cs.AI", "cs.LG"],
"summary": "AI system solving IMO-level geometry problems through neurosymbolic reasoning."
},
{
"arxiv_id": "2403.04132",
"title": "Design2Code: How Far Are We From Automating Front-End Engineering?",
"domain": "aiml",
"categories": ["cs.CV", "cs.CL", "cs.SE"],
"summary": "Benchmarks multimodal LLMs on converting visual designs to functional HTML/CSS code."
},
{
"arxiv_id": "2402.14905",
"title": "YOLOv9: Learning What You Want to Learn Using Programmable Gradient Information",
"domain": "aiml",
"categories": ["cs.CV"],
"summary": "New YOLO architecture using programmable gradient information for better object detection."
},
{
"arxiv_id": "2401.06066",
"title": "MagicVideo-V2: Multi-Stage High-Aesthetic Video Generation",
"domain": "aiml",
"categories": ["cs.CV", "cs.AI"],
"summary": "Multi-stage video generation pipeline producing high-quality aesthetic videos from text."
},
{
"arxiv_id": "2402.01680",
"title": "Grandmaster-Level Chess Without Search",
"domain": "aiml",
"categories": ["cs.AI", "cs.LG"],
"summary": "Transformer achieving grandmaster chess play through pure pattern recognition without tree search."
},
{
"arxiv_id": "2403.04706",
"title": "SWE-agent: Agent-Computer Interfaces Enable Automated Software Engineering",
"domain": "aiml",
"categories": ["cs.SE", "cs.CL", "cs.AI"],
"summary": "LLM agent that autonomously fixes GitHub issues by interacting with code repositories."
}
]