1 code implementation • CVPR 2023 • Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans
We demonstrate attacks in which an adversary can manipulate the upstream model to conduct highly effective and specific property inference attacks (AUC score $> 0. 9$), without incurring significant performance loss on the main task.
1 code implementation • ICASSP 2022 • Xiaopeng Ke, Boyu Chang, Hao Wu, Fengyuan Xu, Sheng Zhong
Recently, video summarization (VS) techniques are widely used to alleviate huge processing pressure brought by numerous long videos.
no code implementations • 18 Jun 2021 • Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong
In our model, two pretext tasks designed from spatial and temporal perspectives help us effectively learn useful node embedding from the huge amount of unlabelled transaction data.
1 code implementation • 30 Apr 2021 • Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans
In a backdoor attack on a machine learning model, an adversary produces a model that performs well on normal inputs but outputs targeted misclassifications on inputs containing a small trigger pattern.
no code implementations • 4 Feb 2021 • Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong
ARM TrustZone is widely deployed on commercial-off-the-shelf mobile devices for secure execution.
Cryptography and Security
no code implementations • 17 Jan 2021 • Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song
Log-based cyber threat hunting has emerged as an important solution to counter sophisticated cyber attacks.
1 code implementation • 26 Oct 2020 • Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song
Log-based cyber threat hunting has emerged as an important solution to counter sophisticated attacks.
1 code implementation • Findings of the Association for Computational Linguistics 2020 • Shucheng Li, Lingfei Wu, Shiwei Feng, Fangli Xu, Fengyuan Xu, Sheng Zhong
In particular, we investigated our model for solving two problems, neural semantic parsing and math word problem.