Picture for Shangwei Guo

Shangwei Guo

TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability

Add code
Jan 29, 2024
Viaarxiv icon

Rethinking Adversarial Training with Neural Tangent Kernel

Add code
Dec 04, 2023
Viaarxiv icon

Mercury: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator

Add code
Aug 02, 2023
Viaarxiv icon

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network

Add code
Jul 29, 2023
Viaarxiv icon

Text Classification via Large Language Models

Add code
May 22, 2023
Viaarxiv icon

CompleteDT: Point Cloud Completion with Dense Augment Inference Transformers

Add code
May 30, 2022
Figure 1 for CompleteDT: Point Cloud Completion with Dense Augment Inference Transformers
Figure 2 for CompleteDT: Point Cloud Completion with Dense Augment Inference Transformers
Figure 3 for CompleteDT: Point Cloud Completion with Dense Augment Inference Transformers
Figure 4 for CompleteDT: Point Cloud Completion with Dense Augment Inference Transformers
Viaarxiv icon

CT-block: a novel local and global features extractor for point cloud

Add code
Nov 30, 2021
Viaarxiv icon

Triggerless Backdoor Attack for NLP Tasks with Clean Labels

Add code
Nov 15, 2021
Figure 1 for Triggerless Backdoor Attack for NLP Tasks with Clean Labels
Figure 2 for Triggerless Backdoor Attack for NLP Tasks with Clean Labels
Figure 3 for Triggerless Backdoor Attack for NLP Tasks with Clean Labels
Figure 4 for Triggerless Backdoor Attack for NLP Tasks with Clean Labels
Viaarxiv icon

BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models

Add code
Oct 06, 2021
Figure 1 for BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models
Figure 2 for BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models
Figure 3 for BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models
Figure 4 for BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models
Viaarxiv icon

Local Black-box Adversarial Attacks: A Query Efficient Approach

Add code
Jan 04, 2021
Figure 1 for Local Black-box Adversarial Attacks: A Query Efficient Approach
Figure 2 for Local Black-box Adversarial Attacks: A Query Efficient Approach
Figure 3 for Local Black-box Adversarial Attacks: A Query Efficient Approach
Figure 4 for Local Black-box Adversarial Attacks: A Query Efficient Approach
Viaarxiv icon