Picture for Chunyi Zhou

Chunyi Zhou

Navigating the Risks: A Survey of Security, Privacy, and Ethics Threats in LLM-Based Agents

Add code
Nov 14, 2024
Viaarxiv icon

Intellectual Property Protection for Deep Learning Model and Dataset Intelligence

Add code
Nov 07, 2024
Viaarxiv icon

"No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks

Add code
Oct 02, 2024
Figure 1 for "No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks
Figure 2 for "No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks
Figure 3 for "No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks
Figure 4 for "No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks
Viaarxiv icon

TruVRF: Towards Triple-Granularity Verification on Machine Unlearning

Add code
Aug 12, 2024
Viaarxiv icon

Decaf: Data Distribution Decompose Attack against Federated Learning

Add code
May 24, 2024
Viaarxiv icon

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects

Add code
Mar 13, 2024
Viaarxiv icon

PPA: Preference Profiling Attack Against Federated Learning

Add code
Feb 10, 2022
Figure 1 for PPA: Preference Profiling Attack Against Federated Learning
Figure 2 for PPA: Preference Profiling Attack Against Federated Learning
Figure 3 for PPA: Preference Profiling Attack Against Federated Learning
Figure 4 for PPA: Preference Profiling Attack Against Federated Learning
Viaarxiv icon