
Stanford AI project team apologizes for plagiarizing Chinese model
An artificial intelligence (AI) team at Stanford University apologized for plagiarizing a large language model (LLM) from a Chinese AI company, which became a trending topic on the Chinese social media platforms, where it sparked concern among netizens on Tuesday. We apologize to the authors of MiniCPM [the AI model developed by a Chinese company] for any inconvenience that we caused for not doing the full diligence to verify and peer review the novelty of this work, the multimodal AI model Llama3-V's developers wrote in a post on social platform X. The apology came after the team from Stanford University announced Llama3-V on May 29, claiming it had comparable performance to GPT4-V and other models with the capability to train for less than $500. According to media reports, the announcement published by one of the team members quickly received more than 300,000 views. However, some netizens from X found and listed evidence of how the Llama3-V project code was reformatted and similar to MiniCPM-Llama3-V 2.5, an LLM developed by a Chinese technology company, ModelBest, and Tsinghua University. Two team members, Aksh Garg and Siddharth Sharma, reposted a netizen's query and apologized on Monday, while claiming that their role was to promote the model on Medium and X (formerly Twitter), and that they had been unable to contact the member who wrote the code for the project. They looked at recent papers to validate the novelty of the work but had not been informed of or were aware of any of the work by Open Lab for Big Model Base, which was founded by the Natural Language Processing Lab at Tsinghua University and ModelBest, according to their responses. They noted that they have taken all references to Llama3-V down in respect to the original work. In response, Liu Zhiyuan, chief scientist at ModelBest, spoke out on the Chinese social media platform Zhihu, saying that the Llama3-V team failed to comply with open-source protocols for respecting and honoring the achievements of previous researchers, thus seriously undermining the cornerstone of open-source sharing. According to a screenshot leaked online, Li Dahai, CEO of ModelBest, also made a post on his WeChat moment, saying that the two models were verified to have highly similarity in terms of providing answers and even the same errors, and that some relevant data had not yet been released to the public. He said the team hopes that their work will receive more attention and recognition, but not in this way. He also called for an open, cooperative and trusting community environment. Director of the Stanford Artificial Intelligence Laboratory Christopher Manning also responded to Garg's explanation on Sunday, commenting "How not to own your mistakes!" on X. As the incident became a trending topic on Sina Weibo, Chinese netizens commented that academic research should be factual, but the incident also proves that the technology development in China is progressing. Global Times

Exclusive: Japan must strengthen NATO ties to safeguard global peace, PM says
TOKYO, July 9 (Reuters) - Russia's deepening military cooperation with North Korea has underlined the need for Japan to forge closer ties with NATO as regional security threats become increasingly intertwined, Prime Minister Fumio Kishida told Reuters. In written remarks ahead of his attendance at a NATO summit in Washington DC this week, Kishida also signalled concern over Beijing's alleged role in aiding Moscow's two-year-old war in Ukraine, although he did not name China. "The securities of the Euro-Atlantic and the Indo-Pacific are inseparable, and Russia’s aggression against Ukraine and its deepened military cooperation with North Korea are strong reminders of that," Kishida said. "Japan is determined to strengthen its cooperation with NATO and its partners," he added. The world, the Japanese leader said, should not tolerate attempts by some countries to disrupt the established international order and reiterated a warning that Ukraine today could be East Asia tomorrow. He also urged cooperation to confront new security threats that transcend geographical boundaries, such as cyber-attacks and conflicts in space. The U.S. and its allies have accused Pyongyang of providing ballistic missiles and artillery shells that Russia has used in its war in Ukraine and say they fear Moscow in return could provide support for North Korea's nuclear missile development. Washington has also said China is supplying droneWithout naming China, Kishida told Reuters "some countries" have allegedly transferred dual-use civilian-military goods to Russia which has served "as a lifeline" for its Ukraine war. "It is necessary to grapple with such situations in a multi-faceted and strategic manner, taking a panoramic view that considers the full range of international actors fuelling Russia’s attempt to change the status quo by force," he said. "The geographical boundary of 'Euro-Atlantic' or 'Indo-Pacific' is no longer relevant in safeguarding global peace and security. Japan and Indo-Pacific partners can play a great role for NATO allies from this perspective." Constrained by decades of pacifism, Tokyo has been reluctant to supply lethal aid to Ukraine. It has, however, provided financial aid to Kyiv, spearheaded efforts to prepare for its post-war reconstruction, and contributed to NATO’s fund to provide Ukraine with non-lethal equipment such as anti-drone detection systems. Tokyo has also repeatedly warned about the risks of a similar conflict emerging in East Asia, where China has been taking an increasingly muscular stance towards its territorial claims including the democratic island of Taiwan. "This summit is a critical opportunity for Japan, the U.S., and the other NATO allies to confront the ongoing challenges against the international order and to reaffirm values and principles that have shaped global peace and prosperity," he said. There may be limits, however, over how far NATO members are prepared to go in forging closer ties in Asia. A plan that surfaced last year for NATO to open a liaison office in Japan, its first in Asia, was blocked by France and criticised by China. and missile technology, satellite imagery and machine tools to Russia, items which fall short of lethal assistance but are helping Moscow build its military to sustain the Ukraine war. Beijing has said it has not provided any weaponry to any party.

Nvidia H20 will sell 1 million units this year, contributing $12 billion in revenue!
Recently, according to the FT, citing the latest forecast data of the market research institute SemiAnalysis, AI chip giant NVIDIA will ship more than 1 million new NVIDIA H20 acceleration chips to the Chinese market this year, and it is expected that the cost of each chip is between $12,000 and $13,000. This is expected to generate more than $12 billion in revenue for Nvidia. Affected by the United States export control policy, Nvidia's advanced AI chip exports to China have been restricted, H20 is Nvidia based on H100 specifically for the Chinese market to launch the three "castration version" GPU among the strongest performance, but its AI performance is only less than 15% of H100, some performance is even less than the domestic Ascend 910B. When Nvidia launched the new H20 in the spring of this year, there were reports that due to the large castration of H20 performance, coupled with the high price, Chinese customers' interest in buying is insufficient, and they will turn more to choose China's domestic AI chips. Then there are rumors that Nvidia has lowered the price of the H20 in order to improve its competitiveness. However, the latest news shows that due to supply issues caused by the low yield of the Ascend 910B chip, Chinese manufacturers in the absence of supply and other better options, Nvidia H20 has started to attract new purchases from Chinese tech giants such as Baidu, Alibaba, Tencent and Bytedance. Analysts at both Morgan Stanley and SemiAnalysis said the H20 chip is now being shipped in bulk and is popular with Chinese customers, despite its performance degradation compared to chips Nvidia sells in the United States.

Audi RS e-tron GT intelligent cockpit innovation analysis
RS e-tron GT: Shares J1 platform with Porsche Taycan. The iconic closed hexagonal "big mouth" is quite a brand recognition, and the rear of the car uses a decorative design shaped like a diffuser. Although the difference between it and the regular e-tron GT is very limited, the "RS" nameplate on the rear of the car means that it is not an ordinary person, of course, low-key is also the style of AUD-Sport. The center console continues the family design of the Audi brand, the lines are simple and refined, and the center control screen, the front air conditioning control panel and the function keys below are obviously tilted to the driver's side, echoing the product positioning of the driver's car. Sports seats, leather fabrics with red stitches, etc. appear in the configuration table of the car, rendering the interior sports atmosphere just right, and the overall beauty of the cabin has been affirmed by the reviewers. Although the official model of the cockpit chip selected by the car has not been announced, it has a high score in the evaluation items such as the cold start speed of the car, the start speed of the core application and the navigation search speed, which shows that the car performance is good. In addition, in terms of specifications and accuracy, the car received full marks in the touch accuracy and screen sharpness evaluation, and the daily high-frequency interaction experience is excellent. Of course, if you optimize the voice car control ability, its intelligent experience will be a higher level.

The largest password leak in history exposes nearly 10 billion credentials
The largest collection of stolen passwords ever has been leaked to a notorious crime marketplace, according to cybersecurity researchers at Cybernews. This leak, dubbed RockYou2024 by its original poster “ObamaCare,” holds a file containing nearly 10 billion unique plaintext passwords. Allegedly gathered from a series of data breaches and hacks accumulated over several years, the passwords were posted on July 4th and hailed as the most extensive collection of stolen and leaked credentials ever seen on the forum. “In its essence, the RockYou2024 leak is a compilation of real-world passwords used by individuals all over the world,” the researchers told Cybernews. “Revealing that many passwords for threat actors substantially heightens the risk of credential stuffing attacks.” Credential stuffing attacks are among the most common methods criminals, ransomware affiliates, and state-sponsored hackers use to access services and systems. Threat actors could exploit the RockYou2024 password collection to conduct brute-force attacks against any unprotected system and “gain unauthorized access to various online accounts used by individuals whose passwords are included in the dataset,” the research team said. This could affect online services, cameras and hardware This could affect various targets, from online services to internet-facing cameras and industrial hardware. “Moreover, combined with other leaked databases on hacker forums and marketplaces, which, for example, contain user email addresses and other credentials, RockYou2024 can contribute to a cascade of data breaches, financial frauds, and identity thefts,” the team concluded. However, despite the seriousness of the data leak, it is important to note that RockYou2024 is primarily a compilation of previous password leaks, estimated to contain entries from a total of 4,000 massive databases of stolen credentials, covering at least two decades. This new file notably includes an earlier credentials database known as RockYou2021, which featured 8.4 billion passwords. RockYou2024 added approximately 1.5 billion passwords to the collection, spanning from 2021 through 2024, which, though a massive figure, is only a fraction of the reported 9,948,575,739 passwords in the leak. Thus, users who have changed their passwords since 2021 may not have to panic about a potential breach of their information. That said, the research team at Cybernews stressed the importance of maintaining data security. In response to the leak, they recommend immediately changing the passwords for any accounts associated with the leaked credentials, ensuring each password is strong and unique and not reused across different platforms. Additionally, they advised enabling multi-factor authentication (MFA), which requires an extra form of verification beyond the password, wherever possible, to strengthen cyber security. Lastly, tech users should utilize password manager software, which securely generates and stores complex passwords, mitigating the risk of password reuse across multiple accounts.