Results 261 to 270 of about 233,719 (314)

Evaluation of GPT-4 Accuracy in the Interpretation of Medical Imaging: Potential Benefits, Limitations, and the Future. [PDF]

open access: yesCureus
Papiashvili N   +9 more
europepmc   +1 more source

Helping or Herding? Reward Model Ensembles Mitigate but do not Eliminate Reward Hacking

arXiv.org, 2023
Reward models play a key role in aligning language model applications towards human preferences. However, this setup creates an incentive for the language model to exploit errors in the reward model to achieve high estimated reward, a phenomenon often ...
Jacob Eisenstein   +11 more
semanticscholar   +1 more source

Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition

arXiv.org, 2023
Large Language Models (LLMs) are deployed in interactive contexts with direct user engagement, such as chatbots and writing assistants. These deployments are vulnerable to prompt injection and jailbreaking (collectively, prompt hacking), in which models ...
Sander Schulhoff   +9 more
semanticscholar   +1 more source

Growth hacking and international dynamic marketing capabilities: a conceptual framework and research propositions

International Marketing Review, 2023
PurposeFew studies have conceptualized how companies can build and nurture international dynamic marketing capabilities (IDMCs) by implementing growth hacking strategies. This paper conceptualizes growth hacking, a managerial-born process to embed a data-
Augusto Bargoni   +3 more
semanticscholar   +1 more source

Moral Hacking & Hacking Assaults

2023
Know about hacking and hacker, Know about who is a hacker and how to attack?, Identify different types of hackers.
Mohsin Rashid Shaikh   +1 more
openaire   +1 more source

Methods Matter: p-Hacking and Publication Bias in Causal Analysis in Economics

The American Economic Review, 2020
The credibility revolution in economics has promoted causal identification using randomized control trials (RCT), difference-in-differences (DID), instrumental variables (IV) and regression discontinuity design (RDD). Applying multiple approaches to over
A. Brodeur, Nikolai Cook, A. Heyes
semanticscholar   +1 more source

Hacks, Hackers and Political Hacking

2023
The rise of the political-hacker phenomenon over the last two decades is something distinctive from instances of simple boasting, ransomware hijackers making money, or chaos creating malcontents. Part of this distinctiveness is both the political agenda these hackers have come to possess, as well as the necessary use of violence as part of them ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy