link1s.site

Stanford AI project team apologizes for plagiarizing Chinese model

An artificial intelligence (AI) team at Stanford University apologized for plagiarizing a large language model (LLM) from a Chinese AI company, which became a trending topic on the Chinese social media platforms, where it sparked concern among netizens on Tuesday.

We apologize to the authors of MiniCPM [the AI model developed by a Chinese company] for any inconvenience that we caused for not doing the full diligence to verify and peer review the novelty of this work, the multimodal AI model Llama3-V's developers wrote in a post on social platform X.

The apology came after the team from Stanford University announced Llama3-V on May 29, claiming it had comparable performance to GPT4-V and other models with the capability to train for less than $500.

According to media reports, the announcement published by one of the team members quickly received more than 300,000 views.

However, some netizens from X found and listed evidence of how the Llama3-V project code was reformatted and similar to MiniCPM-Llama3-V 2.5, an LLM developed by a Chinese technology company, ModelBest, and Tsinghua University.

Two team members, Aksh Garg and Siddharth Sharma, reposted a netizen's query and apologized on Monday, while claiming that their role was to promote the model on Medium and X (formerly Twitter), and that they had been unable to contact the member who wrote the code for the project.

They looked at recent papers to validate the novelty of the work but had not been informed of or were aware of any of the work by Open Lab for Big Model Base, which was founded by the Natural Language Processing Lab at Tsinghua University and ModelBest, according to their responses. They noted that they have taken all references to Llama3-V down in respect to the original work.

In response, Liu Zhiyuan, chief scientist at ModelBest, spoke out on the Chinese social media platform Zhihu, saying that the Llama3-V team failed to comply with open-source protocols for respecting and honoring the achievements of previous researchers, thus seriously undermining the cornerstone of open-source sharing.

According to a screenshot leaked online, Li Dahai, CEO of ModelBest, also made a post on his WeChat moment, saying that the two models were verified to have highly similarity in terms of providing answers and even the same errors, and that some relevant data had not yet been released to the public.

He said the team hopes that their work will receive more attention and recognition, but not in this way. He also called for an open, cooperative and trusting community environment.

Director of the Stanford Artificial Intelligence Laboratory Christopher Manning also responded to Garg's explanation on Sunday, commenting "How not to own your mistakes!" on X.

As the incident became a trending topic on Sina Weibo, Chinese netizens commented that academic research should be factual, but the incident also proves that the technology development in China is progressing.

Global Times

Former British PM Sunak appoints Conservative Party shadow cabinet
On July 8, local time, former British Prime Minister Sunak announced the appointment of the Conservative Party Shadow Cabinet, which is the first shadow cabinet of the Conservative Party in 14 years. Several former British cabinet members during Sunak's tenure as prime minister were appointed to the Conservative Party Shadow Cabinet, including James Cleverly as Shadow Home Secretary and Jeremy Hunt as Shadow Chancellor of the Exchequer. But former Foreign Secretary Cameron was not appointed as Shadow Foreign Secretary. In addition, the new leader of the Conservative Party will be elected as early as this week. On July 4, the UK held a parliamentary election. The counting results showed that the British Labour Party won more than half of the seats and won an overwhelming victory; the Conservative Party suffered a disastrous defeat, ending its 14-year continuous rule.
Israeli strike kills a senior Hezbollah commander in south Lebanon
BEIRUT/JERUSALEM July 3 (Reuters) - An Israeli strike killed one of Hezbollah's top commanders in south Lebanon on Wednesday, prompting retaliatory rocket fire by the Iran-backed group into Israel as their dangerously poised conflict rumbled on. The Israeli military said it had struck and eliminated Hezbollah's Mohammed Nasser, calling him commander of a unit responsible for firing from southwestern Lebanon at Israel. Nasser, killed by an airstrike near the city of Tyre in southern Lebanon, was the one of the most senior Hezbollah commanders to die yet in the conflict, two security sources in Lebanon said. Sparked by the Gaza war, the hostilities have raised concerns about a wider and ruinous conflict between the heavily armed adversaries, prompting U.S. diplomatic efforts aimed at deescalation. Israeli Defence Minister Yoav Gallant said Israeli forces were hitting Hezbollah "very hard every day" and will be ready to take any action necessary against the group, though the preference is to reach a negotiated arrangement. Hezbollah began firing at Israeli targets at the border after its Palestinian ally Hamas launched the Oct. 7 attack on Israel, declaring support for the Palestinians and saying it would cease fire when Israel stops its Gaza offensive. Hezbollah announced at least two attacks in response to what it called "the assassination", saying it launched 100 Katyusha rockets at an Israeli military base and its Iranian-made Falaq missiles at another base in the town of Kiryat Shmona near the Israeli-Lebanese border. Israel's Channel 12 broadcaster reported that dozens of rockets were fired into northern Israel from Lebanon. There were no reports of casualties. The Israeli Defence Ministry said that air raid sirens sounded in several parts of northern Israel. Israel's military did not give a number of rockets launched but said most of them fell in open areas, some were intercepted, while a number of launches fell in the area of Kiryat Shmona.
The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.
South African rand stable as markets await US interest rate hints
JOHANNESBURG, July 9 (Reuters) - The South African rand was little changed in early trade on Tuesday, as markets awaited the Federal Reserve chair's testimony in Washington and U.S. June inflation data for clues on the country's future interest rate path. At 0644 GMT, the rand traded at 18.1300 against the dollar , near its previous close of 18.1175. "The rand has opened marginally softer at 18.13 this morning, and we expect trading to remain range-bound in the short term," said Andre Cilliers, currency strategist at TreasuryONE. Markets will listen to the tone of Fed Chair Jerome Powell's testimony in Washington on Tuesday and Wednesday and look to June inflation data out of the U.S. later this week for hints on the future interest rate path in the world's biggest economy. "Analysts will be gauging the Fed's response to the recent softer U.S. economic and labour data, with markets already starting to price in two rate cuts this year," Cilliers added. The risk-sensitive rand often takes cues from global drivers like U.S. economic policy in the absence of major local factors. South Africa's benchmark 2030 government bond was slightly stronger in early deals, with the yield down 1 basis point at 9.74%.
NHTSA opens recall query into about 94,000 Jeep Wrangler 4xe SUVs
July 9 (Reuters) - The National Highway Traffic Safety Administration (NHTSA) has opened a recall query into 94,275 Stellantis-owned (STLAM.MI), opens new tab Jeep SUVs over a loss of motive power, the U.S. auto safety regulator said on Tuesday. The investigation targets Jeep's Wrangler 4xe hybrid SUVs manufactured between 2021 through 2024. Chrysler had previously recalled, opens new tab the same model in 2022 to address concerns related to an engine shutdown. A recall query is an investigation opened by safety regulators when a remedy to solve an issue appears inadequate. The complaints noted in the new report include both failures in vehicles that received the recall remedy and those not covered by the prior recall, the NHTSA said.