Picture for Jiyi Zhang

Jiyi Zhang

Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs

Add code
Feb 27, 2024
Figure 1 for Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs
Figure 2 for Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs
Figure 3 for Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs
Figure 4 for Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs
Viaarxiv icon

Domain Bridge: Generative model-based domain forensic for black-box models

Add code
Feb 07, 2024
Viaarxiv icon

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Add code
Jun 02, 2023
Figure 1 for Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Figure 2 for Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Figure 3 for Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Figure 4 for Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Viaarxiv icon

Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation

Add code
May 10, 2023
Figure 1 for Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
Figure 2 for Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
Figure 3 for Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
Figure 4 for Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
Viaarxiv icon

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence

Add code
Dec 31, 2022
Figure 1 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 2 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 3 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 4 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Viaarxiv icon

Mitigating Adversarial Attacks by Distributing Different Copies to Different Users

Add code
Nov 30, 2021
Figure 1 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 2 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 3 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 4 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Viaarxiv icon

Detection and Recovery of Adversarial Attacks with Injected Attractors

Add code
Mar 05, 2020
Figure 1 for Detection and Recovery of Adversarial Attacks with Injected Attractors
Figure 2 for Detection and Recovery of Adversarial Attacks with Injected Attractors
Figure 3 for Detection and Recovery of Adversarial Attacks with Injected Attractors
Figure 4 for Detection and Recovery of Adversarial Attacks with Injected Attractors
Viaarxiv icon

Flipped-Adversarial AutoEncoders

Add code
Apr 04, 2018
Figure 1 for Flipped-Adversarial AutoEncoders
Figure 2 for Flipped-Adversarial AutoEncoders
Figure 3 for Flipped-Adversarial AutoEncoders
Figure 4 for Flipped-Adversarial AutoEncoders
Viaarxiv icon