Picture for Qiuling Xu

Qiuling Xu

Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift

Add code
Nov 27, 2023
Viaarxiv icon

POSIT: Promotion of Semantic Item Tail via Adversarial Learning

Add code
Aug 07, 2023
Viaarxiv icon

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense

Add code
Jan 16, 2023
Viaarxiv icon

FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning

Add code
Oct 23, 2022
Figure 1 for FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Figure 2 for FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Figure 3 for FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Figure 4 for FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Viaarxiv icon

DECK: Model Hardening for Defending Pervasive Backdoors

Add code
Jun 18, 2022
Figure 1 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 2 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 3 for DECK: Model Hardening for Defending Pervasive Backdoors
Figure 4 for DECK: Model Hardening for Defending Pervasive Backdoors
Viaarxiv icon

Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense

Add code
Feb 11, 2022
Figure 1 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 2 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 3 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Figure 4 for Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense
Viaarxiv icon

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization

Add code
Feb 09, 2021
Figure 1 for Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Figure 2 for Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Figure 3 for Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Figure 4 for Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Viaarxiv icon

Fundamental Limits of Adversarial Learning

Add code
Jul 01, 2020
Figure 1 for Fundamental Limits of Adversarial Learning
Viaarxiv icon

D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack

Add code
Jun 12, 2020
Figure 1 for D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack
Figure 2 for D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack
Figure 3 for D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack
Figure 4 for D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack
Viaarxiv icon

Towards Feature Space Adversarial Attack

Add code
Apr 26, 2020
Figure 1 for Towards Feature Space Adversarial Attack
Figure 2 for Towards Feature Space Adversarial Attack
Figure 3 for Towards Feature Space Adversarial Attack
Figure 4 for Towards Feature Space Adversarial Attack
Viaarxiv icon