Generative Artificial Intelligence: Fundamentals

被引:10
作者
Corchado, Juan M. [1 ]
Lopez, F. Sebastian [1 ]
Nunez, V. Juan M. [1 ]
Garcia, S. Raul [1 ]
Chamoso, Pablo [1 ]
机构
[1] Univ Salamanca, BISITE Res Grp, Edificio Multiusos IDI, Salamanca 37007, Spain
来源
ADCAIJ-ADVANCES IN DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE JOURNAL | 2023年 / 12卷 / 01期
关键词
large language models; artificial intelligence; transformers; GPT; DIAGNOSIS;
D O I
10.14201/adcaij.31704
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Generative language models have witnessed substantial traction, notably with the introduction of refined models aimed at more coherent user-AI interactions-principally conversational models. The epitome of this public attention has arguably been the refinement of the GPT-3 model into ChatGPT and its subsequent integration with auxiliary capabilities such as search features in Microsoft Bing. Despite voluminous prior research devoted to its developmental trajectory, the model's performance, and applicability to a myriad of quotidian tasks remained nebulous and task specific. In terms of technological implementation, the advent of models such as LLMv2 and ChatGPT-4 has elevated the discourse beyond mere textual coherence to nuanced contextual understanding and real-world task completion. Concurrently, emerging architectures that focus on interpreting latent spaces have offered more granular control over text generation, thereby amplifying the model's applicability across various verticals. Within the purview of cyber defense, especially in the Swiss operational ecosystem, these models pose both unprecedented opportunities and challenges. Their capabilities in data analytics, intrusion detection, and even misinformation combatting is laudable; yet the ethical and security implications concerning data privacy, surveillance, and potential misuse warrant judicious scrutiny.
引用
收藏
页数:43
相关论文
共 119 条
[1]  
Abdullah Malak, 2022, 2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS), P1, DOI 10.1109/SNAMS58071.2022.10062688
[2]   Hybrid learning machines [J].
Abraham, Ajith ;
Corchado, Emilio ;
Corchado, Juan M. .
NEUROCOMPUTING, 2009, 72 (13-15) :2729-2730
[3]   What Does DALL-E 2 Know About Radiology? [J].
Adams, Lisa C. ;
Busch, Felix ;
Truhn, Daniel ;
Makowski, Marcus R. ;
Aerts, Hugo J. W. L. ;
Bressem, Keno K. .
JOURNAL OF MEDICAL INTERNET RESEARCH, 2023, 25
[4]   DCServCG: A data-centric service code generation using deep learning [J].
Alizadehsani, Zakieh ;
Ghaemi, Hadi ;
Shahraki, Amin ;
Gonzalez-Briones, Alfonso ;
Corchado, Juan M. .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2023, 123
[5]  
[Anonymous], 2019, Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition
[6]  
Ba JL, 2016, Layer normalization
[7]  
Bahdanau D, 2016, Arxiv, DOI [arXiv:1409.0473, DOI 10.48550/ARXIV.1409.0473]
[8]  
Baidoo-Anu D., 2023, Journal of AI, V7, P52, DOI [DOI 10.61969/JAI.1337500, 10.2139/ssrn.4337484, DOI 10.2139/SSRN.4337484]
[9]   On the Dangers of Stochastic Parrots: Can Language Models Be Too Big? [J].
Bender, Emily M. ;
Gebru, Timnit ;
McMillan-Major, Angelina ;
Shmitchell, Shmargaret .
PROCEEDINGS OF THE 2021 ACM CONFERENCE ON FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY, FACCT 2021, 2021, :610-623
[10]   Learning Deep Architectures for AI [J].
Bengio, Yoshua .
FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2009, 2 (01) :1-127