Picture for Mingyi Zhou

Mingyi Zhou

PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach

Add code
Sep 21, 2024
Viaarxiv icon

Investigating White-Box Attacks for On-Device Models

Add code
Feb 26, 2024
Viaarxiv icon

Defense against Privacy Leakage in Federated Learning

Add code
Sep 13, 2022
Figure 1 for Defense against Privacy Leakage in Federated Learning
Figure 2 for Defense against Privacy Leakage in Federated Learning
Figure 3 for Defense against Privacy Leakage in Federated Learning
Figure 4 for Defense against Privacy Leakage in Federated Learning
Viaarxiv icon

Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions

Add code
Apr 22, 2021
Figure 1 for Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Figure 2 for Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Figure 3 for Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Figure 4 for Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions
Viaarxiv icon

Decision-based Universal Adversarial Attack

Add code
Sep 17, 2020
Figure 1 for Decision-based Universal Adversarial Attack
Figure 2 for Decision-based Universal Adversarial Attack
Figure 3 for Decision-based Universal Adversarial Attack
Figure 4 for Decision-based Universal Adversarial Attack
Viaarxiv icon

ProbaNet: Proposal-balanced Network for Object Detection

Add code
May 27, 2020
Figure 1 for ProbaNet: Proposal-balanced Network for Object Detection
Figure 2 for ProbaNet: Proposal-balanced Network for Object Detection
Figure 3 for ProbaNet: Proposal-balanced Network for Object Detection
Figure 4 for ProbaNet: Proposal-balanced Network for Object Detection
Viaarxiv icon

DaST: Data-free Substitute Training for Adversarial Attacks

Add code
Mar 31, 2020
Figure 1 for DaST: Data-free Substitute Training for Adversarial Attacks
Figure 2 for DaST: Data-free Substitute Training for Adversarial Attacks
Figure 3 for DaST: Data-free Substitute Training for Adversarial Attacks
Figure 4 for DaST: Data-free Substitute Training for Adversarial Attacks
Viaarxiv icon

Adversarial Imitation Attack

Add code
Mar 31, 2020
Figure 1 for Adversarial Imitation Attack
Figure 2 for Adversarial Imitation Attack
Figure 3 for Adversarial Imitation Attack
Figure 4 for Adversarial Imitation Attack
Viaarxiv icon