Obserwuj
Siyuan Cheng
Tytuł
Cytowane przez
Cytowane przez
Rok
Deep feature space trojan attack of neural networks by controlled detoxification
S Cheng, Y Liu, S Ma, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 35 (2), 1148-1156, 2021
1272021
Backdoor scanning for deep neural networks through k-arm optimization
G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang
International Conference on Machine Learning, 9525-9536, 2021
952021
Towards feature space adversarial attack by style perturbation
Q Xu, G Tao, S Cheng, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 35 (12), 10523 …, 2021
49*2021
Flip: A provable defense framework for backdoor mitigation in federated learning
K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ...
arXiv preprint arXiv:2210.12873, 2022
302022
Detecting backdoors in pre-trained encoders
S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
212023
Backdoor vulnerabilities in normally trained deep learning models
G Tao, Z Wang, S Cheng, S Ma, S An, Y Liu, G Shen, Z Zhang, Y Mao, ...
arXiv preprint arXiv:2211.15929, 2022
112022
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ...
30th Annual Network And Distributed System Security Symposium (NDSS 2023), 2023
72023
Medic: Remove model backdoors via importance driven cloning
Q Xu, G Tao, J Honorio, Y Liu, S An, G Shen, S Cheng, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
6*2023
Opening A Pandora's Box: Things You Should Know in the Era of Custom GPTs
G Tao, S Cheng, Z Zhang, J Zhu, G Shen, X Zhang
arXiv preprint arXiv:2401.00905, 2023
42023
Make them spill the beans! coercive knowledge extraction from (production) llms
Z Zhang, G Shen, G Tao, S Cheng, X Zhang
arXiv preprint arXiv:2312.04782, 2023
42023
Improving Binary Code Similarity Transformer Models by Semantics-Driven Instruction Deemphasis
X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ...
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
32023
LmPa: Improving Decompilation by Synergy of Large Language Model and Program Analysis
X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang
arXiv preprint arXiv:2306.02546, 2023
32023
Hard-label black-box universal adversarial patch attack
G Tao, S An, S Cheng, G Shen, X Zhang
32nd USENIX Security Symposium (USENIX Security 23), 697-714, 2023
32023
Deck: Model hardening for defending pervasive backdoors
G Tao, Y Liu, S Cheng, S An, Z Zhang, Q Xu, G Shen, X Zhang
arXiv preprint arXiv:2206.09272, 2022
32022
Elijah: Eliminating backdoors injected in diffusion models via distribution shift
S An, SY Chou, K Zhang, Q Xu, G Tao, G Shen, S Cheng, S Ma, PY Chen, ...
Proceedings of the AAAI Conference on Artificial Intelligence 38 (10), 10847 …, 2024
22024
Django: Detecting trojans in object detection models via gaussian focus calibration
G Shen, S Cheng, G Tao, K Zhang, Y Liu, S An, S Ma, X Zhang
Advances in Neural Information Processing Systems 36, 2024
22024
: Detoxing Deep Learning Dataset
L Yan, S Cheng, G Shen, G Tao, X Chen, K Zhang, Y Mao, X Zhang
NeurIPS 2023 Workshop on Backdoors in Deep Learning-The Good, the Bad, and …, 2023
22023
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model
X Xu, Z Xuan, S Feng, S Cheng, Y Ye, Q Shi, G Tao, L Yu, Z Zhang, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
12023
Rational Manager in Bitcoin Mining Pool: Dynamic Strategies to Gain Extra Rewards
F Yu, N Ruan, S Cheng
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
12020
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
S Cheng, G Tao, Y Liu, G Shen, S An, S Feng, X Xu, K Zhang, S Ma, ...
arXiv preprint arXiv:2403.17188, 2024
2024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20