Pro

joined 3 months ago
MODERATOR OF
 

Large language models (LLMs) like ChatGPT can generate and revise text with human-level performance. These models come with clear limitations, can produce inaccurate information, and reinforce existing biases. Yet, many scientists use them for their scholarly writing. But how widespread is such LLM usage in the academic literature? To answer this question for the field of biomedical research, we present an unbiased, large-scale approach: We study vocabulary changes in more than 15 million biomedical abstracts from 2010 to 2024 indexed by PubMed and show how the appearance of LLMs led to an abrupt increase in the frequency of certain style words. This excess word analysis suggests that at least 13.5% of 2024 abstracts were processed with LLMs. This lower bound differed across disciplines, countries, and journals, reaching 40% for some subcorpora. We show that LLMs have had an unprecedented impact on scientific writing in biomedical research, surpassing the effect of major world events such as the COVID pandemic.

 

Post-apocalyptic horror film '28 Years Later' is doing well at the box office, with $100 million in revenue in its first two weeks. The latest installment in the horror franchise also renewed interest in the previous films, with '28 Weeks Later' showing up in various streaming charts. The original '28 Days Later' is less widely available due to licensing issues, so many have turned to pirate sites instead.

 
  • GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. GitHub keeps these dangling commits, from what we can tell, forever. In the archive, they show up as “zero-commit” PushEvents.
  • I scanned every force push event since 2020 and uncovered secrets worth $25k in bug bounties.
  • Together with Truffle Security, we're open sourcing a new tool to scan your own GitHub organization for these hidden commits (try it here).
 
  • GitHub Archive logs every public commit, even the ones developers try to delete. Force pushes often cover up mistakes like leaked credentials by rewriting Git history. GitHub keeps these dangling commits, from what we can tell, forever. In the archive, they show up as “zero-commit” PushEvents.
  • I scanned every force push event since 2020 and uncovered secrets worth $25k in bug bounties.
  • Together with Truffle Security, we're open sourcing a new tool to scan your own GitHub organization for these hidden commits (try it here).
 
view more: ‹ prev next ›