{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T06:27:43Z","timestamp":1774420063705,"version":"3.50.1"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T00:00:00Z","timestamp":1743897600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,6]]},"DOI":"10.1109\/icassp49660.2025.10888800","type":"proceedings-article","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:52:43Z","timestamp":1741787563000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Meta Evidence for Prompt Optimization"],"prefix":"10.1109","author":[{"given":"Yao","family":"He","sequence":"first","affiliation":[{"name":"University of Macau,School of Institute of Collaborate Innovation,Macau,China"}]},{"given":"Jiajun","family":"Liu","sequence":"additional","affiliation":[{"name":"Southeast University,School of Computer Science and Engineering,Nanjing,China"}]},{"given":"Wenjun","family":"Ke","sequence":"additional","affiliation":[{"name":"Southeast University,School of Computer Science and Engineering,Nanjing,China"}]},{"given":"Peng","family":"Wang","sequence":"additional","affiliation":[{"name":"Southeast University,School of Computer Science and Engineering,Nanjing,China"}]},{"given":"Congda","family":"Xiao","sequence":"additional","affiliation":[{"name":"Southeast University,School of Computer Science and Engineering,Nanjing,China"}]},{"given":"Yining","family":"Li","sequence":"additional","affiliation":[{"name":"Southeast University,School of Computer Science and Engineering,Nanjing,China"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Sparks of artificial general intelligence: Early experiments with gpt-4","author":"Bubeck","year":"2023"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.acl-long.176"},{"key":"ref3","article-title":"Promptagent: Strategic planning with language models enables expert-level prompt optimization","volume-title":"The 12nd International Conference on Learning Representations","author":"Wang"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2024\/704"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-emnlp.459"},{"key":"ref6","article-title":"Unlocking instructive in-context learning with tabular prompting for relational triple extraction","volume-title":"The 2024 Joint International Conference on Computational Linguistics, Language Resources and Evaluation","author":"Li"},{"key":"ref7","article-title":"PromptBoosting: Black-box text classification with ten forward passes","volume-title":"The 40th International Conference on Machine Learning","author":"Hou"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2025.101260"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.findings-acl.21"},{"key":"ref10","article-title":"A systematic survey of prompt engineering in large language models: Techniques and applications","author":"Sahoo","year":"2024"},{"key":"ref11","article-title":"Understanding how encoder-decoder architectures attend","volume-title":"The 35th Conference on Neural Information Processing Systems","author":"Aitken"},{"key":"ref12","article-title":"Infoprompt: Information-theoretic soft prompt tuning for natural language understanding","volume-title":"The 37th Conference on Neural Information Processing Systems","author":"Wu"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.acl-long.174"},{"key":"ref14","article-title":"Task prompt vectors: Effective initialization through multi-task soft-prompt transfer","author":"Belanec","year":"2024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52729.2023.02225"},{"key":"ref16","article-title":"Hard prompts made easy: Gradient-based discrete optimization for prompt tuning and discovery","volume-title":"The 37th Conference on Neural Information Processing Systems","author":"Wen"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.acl-long.690"},{"key":"ref18","article-title":"Openagi: When llm meets domain experts","volume-title":"The 37th Conference on Neural Information Processing Systems","author":"Ge"},{"key":"ref19","article-title":"LLM-informed discrete prompt optimization","volume-title":"The 41st International Conference on Machine Learning","author":"Memon"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2988796"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13091746"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14421\/icse.v3.531"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/p17-2067"},{"key":"ref24","article-title":"Jailbreakv-28k: A benchmark for assessing the robustness of multimodal large language models against jailbreak attacks","author":"Luo","year":"2024","journal-title":"arxiv preprint arxiv: 2404.03027"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.emnlp-main.243"},{"key":"ref26","article-title":"Instructzero: Efficient instruction optimization for black-box large language models","author":"Chen","year":"2023","journal-title":"arxiv preprint arxiv: 2306.03082"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.emnlp-main.346"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.494"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.eacl-main.277"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-main.222"},{"key":"ref31","article-title":"Large language models are human-level prompt engineers","volume-title":"The 11th International Conference on Learning Representations","author":"Zhou"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v38i17.29924"},{"key":"ref33","article-title":"Promptboosting: black-box text classification with ten forward passes","volume-title":"The 40th International Conference on Machine Learning","author":"Hou"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"ref35","article-title":"Hard prompts made easy: Gradient-based discrete optimization for prompt tuning and discovery","volume-title":"The 37th Conference on Neural Information Processing Systems","author":"Wen"}],"event":{"name":"ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)","location":"Hyderabad, India","start":{"date-parts":[[2025,4,6]]},"end":{"date-parts":[[2025,4,11]]}},"container-title":["ICASSP 2025 - 2025 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10887540\/10887541\/10888800.pdf?arnumber=10888800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T05:26:12Z","timestamp":1774416372000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10888800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/icassp49660.2025.10888800","relation":{},"subject":[],"published":{"date-parts":[[2025,4,6]]}}}