Picture for Yingjie Lao

Yingjie Lao

Less is More: Sparse Watermarking in LLMs with Enhanced Text Quality

Add code
Jul 17, 2024
Viaarxiv icon

Fully Attentional Networks with Self-emerging Token Labeling

Add code
Jan 08, 2024
Viaarxiv icon

Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks

Add code
Oct 01, 2023
Viaarxiv icon

Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class

Add code
Oct 17, 2022
Figure 1 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 2 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 3 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 4 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Viaarxiv icon

NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language

Add code
Aug 29, 2022
Figure 1 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 2 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 3 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 4 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Viaarxiv icon

Defending Backdoor Attacks on Vision Transformer via Patch Processing

Add code
Jun 24, 2022
Figure 1 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 2 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 3 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 4 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Viaarxiv icon

Class-Oriented Poisoning Attack

Add code
Jul 31, 2020
Figure 1 for Class-Oriented Poisoning Attack
Figure 2 for Class-Oriented Poisoning Attack
Figure 3 for Class-Oriented Poisoning Attack
Figure 4 for Class-Oriented Poisoning Attack
Viaarxiv icon

Rallying Adversarial Techniques against Deep Learning for Network Security

Add code
Mar 27, 2019
Figure 1 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 2 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 3 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 4 for Rallying Adversarial Techniques against Deep Learning for Network Security
Viaarxiv icon

Hardware Trojan Attacks on Neural Networks

Add code
Jun 14, 2018
Figure 1 for Hardware Trojan Attacks on Neural Networks
Figure 2 for Hardware Trojan Attacks on Neural Networks
Figure 3 for Hardware Trojan Attacks on Neural Networks
Figure 4 for Hardware Trojan Attacks on Neural Networks
Viaarxiv icon