Search Results for author: Guozhu Meng

Found 11 papers, 5 papers with code

Evaluating Decision Optimality of Autonomous Driving via Metamorphic Testing

no code implementations28 Feb 2024 Mingfei Cheng, Yuan Zhou, Xiaofei Xie, Junjie Wang, Guozhu Meng, Kairui Yang

In this paper, we focus on evaluating the decision-making quality of an ADS and propose the first method for detecting non-optimal decision scenarios (NoDSs), where the ADS does not compute optimal paths for AVs.

Autonomous Driving Decision Making

Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction

no code implementations28 Feb 2024 Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen

We evaluate DRA across various open-source and close-source models, showcasing state-of-the-art jailbreak success rates and attack efficiency.

Reconstruction Attack

DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models

1 code implementation18 Dec 2023 Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma

Dataset sanitization is a widely adopted proactive defense against poisoning-based backdoor attacks, aimed at filtering out and removing poisoned samples from training datasets.

Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing

1 code implementation9 Sep 2023 Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li

While enjoying the great achievements brought by deep learning (DL), people are also worried about the decision made by DL models, since the high degree of non-linearity of DL models makes the decision extremely difficult to understand.

ConFL: Constraint-guided Fuzzing for Machine Learning Framework

no code implementations11 Jul 2023 Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang

Guided by the constraints, ConFL is able to generate valid inputs that can pass the verification and explore deeper paths of kernel codes.

Decision Making valid

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

1 code implementation8 Sep 2022 Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng

Recent years have witnessed tremendous success in Self-Supervised Learning (SSL), which has been widely utilized to facilitate various downstream tasks in Computer Vision (CV) and Natural Language Processing (NLP) domains.

Self-Supervised Learning

Learning Program Semantics with Code Representations: An Empirical Study

1 code implementation22 Mar 2022 Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu

However, currently, a comprehensive and systematic study on evaluating different program representation techniques across diverse tasks is still missed.

Clone Detection Code Classification +1

GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search

1 code implementation4 Nov 2021 Shangqing Liu, Xiaofei Xie, JingKai Siow, Lei Ma, Guozhu Meng, Yang Liu

Specifically, we propose to construct graphs for the source code and queries with bidirectional GGNN (BiGGNN) to capture the local structural information of the source code and queries.

Code Search Code Summarization +3

DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks

no code implementations13 May 2021 Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, Xingbo Hu

Compared to the method of retraining from scratch, our approach can achieve 99. 0%, 95. 0%, 91. 9%, 96. 7%, 74. 1% accuracy rates and 66. 7$\times$, 75. 0$\times$, 33. 3$\times$, 29. 4$\times$, 13. 7$\times$ speedups on the MNIST, SVHN, CIFAR-10, Purchase, and ImageNet datasets, respectively.

Machine Unlearning

Towards Security Threats of Deep Learning Systems: A Survey

no code implementations28 Nov 2019 Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He

In order to unveil the security weaknesses and aid in the development of a robust deep learning system, we undertake an investigation on attacks towards deep learning, and analyze these attacks to conclude some findings in multiple views.

Adversarial Attack Model extraction

Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection

no code implementations21 Jun 2016 Annamalai Narayanan, Guozhu Meng, Liu Yang, Jinliang Liu, Lihui Chen

To address this, we develop the Contextual Weisfeiler-Lehman kernel (CWLK) which is capable of capturing both these types of information.

Malware Detection

Cannot find the paper you are looking for? You can Submit a new open access paper.