Picture for Xudong Pan

Xudong Pan

No-Skim: Towards Efficiency Robustness Evaluation on Skimming-based Language Models

Add code
Dec 18, 2023
Viaarxiv icon

BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting

Add code
Dec 08, 2023
Viaarxiv icon

JADE: A Linguistics-based Safety Evaluation Platform for LLM

Add code
Nov 02, 2023
Viaarxiv icon

MIRA: Cracking Black-box Watermarking on Deep Neural Networks via Model Inversion-based Removal Attacks

Add code
Sep 07, 2023
Viaarxiv icon

Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation

Add code
Mar 17, 2023
Viaarxiv icon

Exorcising ''Wraith'': Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks

Add code
Mar 17, 2023
Viaarxiv icon

A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling

Add code
Jul 18, 2022
Figure 1 for A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling
Figure 2 for A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling
Figure 3 for A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling
Figure 4 for A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling
Viaarxiv icon

Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model

Add code
Jun 29, 2022
Figure 1 for Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Figure 2 for Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Figure 3 for Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Figure 4 for Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model
Viaarxiv icon

Cracking White-box DNN Watermarks via Invariant Neuron Transforms

Add code
May 19, 2022
Figure 1 for Cracking White-box DNN Watermarks via Invariant Neuron Transforms
Figure 2 for Cracking White-box DNN Watermarks via Invariant Neuron Transforms
Figure 3 for Cracking White-box DNN Watermarks via Invariant Neuron Transforms
Figure 4 for Cracking White-box DNN Watermarks via Invariant Neuron Transforms
Viaarxiv icon

Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver

Add code
Oct 26, 2020
Figure 1 for Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver
Figure 2 for Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver
Figure 3 for Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver
Figure 4 for Theory-Oriented Deep Leakage from Gradients via Linear Equation Solver
Viaarxiv icon