Search Results for author: Heyuan Shi

Found 3 papers, 1 papers with code

Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications

no code implementations26 Apr 2024 Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang

Presently, with the assistance of advanced LLM application development frameworks, more and more LLM-powered applications can effortlessly augment the LLMs' knowledge with external content using the retrieval augmented generation (RAG) technique.

Retrieval

QuanTest: Entanglement-Guided Testing of Quantum Neural Network Systems

1 code implementation20 Feb 2024 Jinjing Shi, Zimeng Xiao, Heyuan Shi, Yu Jiang, Xuelong Li

Subsequently, QuanTest formulates the problem of generating test inputs that maximize the quantum entanglement sufficiency and capture incorrect behaviors of the QNN system as a joint optimization problem and solves it in a gradient-based manner to generate quantum adversarial examples.

HyperAttack: Multi-Gradient-Guided White-box Adversarial Structure Attack of Hypergraph Neural Networks

no code implementations24 Feb 2023 Chao Hu, Ruishi Yu, Binqi Zeng, Yu Zhan, Ying Fu, Quan Zhang, Rongkai Liu, Heyuan Shi

Hypergraph neural networks (HGNN) have shown superior performance in various deep learning tasks, leveraging the high-order representation ability to formulate complex correlations among data by connecting two or more nodes through hyperedge modeling.

Adversarial Attack

Cannot find the paper you are looking for? You can Submit a new open access paper.