Picture for Siyue Wang

Siyue Wang

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

Add code
Mar 02, 2024
Viaarxiv icon

Detection and Recovery Against Deep Neural Network Fault Injection Attacks Based on Contrastive Learning

Add code
Jan 30, 2024
Viaarxiv icon

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage

Add code
Mar 27, 2023
Viaarxiv icon

MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge

Add code
Oct 26, 2021
Figure 1 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 2 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 3 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 4 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Viaarxiv icon

High-Robustness, Low-Transferability Fingerprinting of Neural Networks

Add code
May 14, 2021
Figure 1 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 2 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 3 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 4 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Viaarxiv icon

AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks

Add code
Feb 19, 2020
Figure 1 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 2 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 3 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 4 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Viaarxiv icon

RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition

Add code
Feb 19, 2020
Figure 1 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 2 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 3 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 4 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Viaarxiv icon

Block Switching: A Stochastic Approach for Deep Learning Security

Add code
Feb 18, 2020
Figure 1 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 2 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 3 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 4 for Block Switching: A Stochastic Approach for Deep Learning Security
Viaarxiv icon

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Add code
Feb 18, 2020
Figure 1 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 2 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 3 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 4 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Viaarxiv icon

Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses

Add code
Aug 20, 2019
Figure 1 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 2 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 3 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 4 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Viaarxiv icon