Search Results for author: Jinyin Chen

Found 44 papers, 15 papers with code

GUARD: Role-playing to Generate Natural-language Jailbreakings to Test Guideline Adherence of Large Language Models

no code implementations5 Feb 2024 Haibo Jin, Ruoxi Chen, Andy Zhou, Jinyin Chen, Yang Zhang, Haohan Wang

Our system of different roles will leverage this knowledge graph to generate new jailbreaks, which have proved effective in inducing LLMs to generate unethical or guideline-violating responses.

Sentence

AIR: Threats of Adversarial Attacks on Deep Learning-Based Information Recovery

no code implementations17 Aug 2023 Jinyin Chen, Jie Ge, Shilian Zheng, Linhui Ye, Haibin Zheng, Weiguo Shen, Keqiang Yue, Xiaoniu Yang

It can also be found that the DeepReceiver is vulnerable to adversarial perturbations even with very low power and limited PAPR.

Adversarial Attack

CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature Space

no code implementations18 Jul 2023 Haibin Zheng, Jinyin Chen, Haibo Jin

Therefore, it is crucial to identify the misbehavior of DNN-based software and improve DNNs' quality.

AdvCheck: Characterizing Adversarial Examples via Local Gradient Checking

no code implementations25 Mar 2023 Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng

To address the issues, we introduce the concept of local gradient, and reveal that adversarial examples have a quite larger bound of local gradient than the benign ones.

Edge Deep Learning Model Protection via Neuron Authorization

1 code implementation22 Mar 2023 Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang, Shouling Ji

With the development of deep learning processors and accelerators, deep learning models have been widely deployed on edge devices as part of the Internet of Things.

FedRight: An Effective Model Copyright Protection for Federated Learning

no code implementations18 Mar 2023 Jinyin Chen, Mingjun Li, Haibin Zheng

For the first time, we formalize the problem of copyright protection for FL, and propose FedRight to protect model copyright based on model fingerprints, i. e., extracting model features by generating adversarial examples as model fingerprints.

Federated Learning

Motif-Backdoor: Rethinking the Backdoor Attack on Graph Neural Networks via Motifs

1 code implementation25 Oct 2022 Haibin Zheng, Haiyang Xiong, Jinyin Chen, Haonan Ma, Guohan Huang

Most of the proposed studies launch the backdoor attack using a trigger that either is the randomly generated subgraph (e. g., erd\H{o}s-r\'enyi backdoor) for less computational burden, or the gradient-based generative subgraph (e. g., graph trojaning attack) to enable a more effective attack.

Backdoor Attack

Label Inference Attacks Against Vertical Federated Learning

2 code implementations USENIX Security 22 2022 Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang

However, we discover that the bottom model structure and the gradient update mechanism of VFL can be exploited by a malicious participant to gain the power to infer the privately owned labels.

Vertical Federated Learning

Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection

1 code implementation14 Aug 2022 Haibin Zheng, Haiyang Xiong, Haonan Ma, Guohan Huang, Jinyin Chen

Consequently, the link prediction model trained on the backdoored dataset will predict the link with trigger to the target state.

Backdoor Attack Link Prediction

Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection

no code implementations17 Jun 2022 Jinyin Chen, Chengyu Jia, Haibin Zheng, Ruoxi Chen, Chenbo Fu

The proliferation of fake news and its serious negative social influence push fake news detection methods to become necessary tools for web managers.

Backdoor Attack Fake News Detection

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency

1 code implementation11 Jun 2022 Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Changting Lin

To address these challenges, we reconsider the defense from a novel perspective, i. e., model weight evolving frequency. Empirically, we gain a novel insight that during the FL's training, the model weight evolving frequency of free-riders and that of benign clients are significantly different.

Federated Learning Privacy Preserving

Improving robustness of language models from a geometry-aware perspective

no code implementations Findings (ACL) 2022 Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan

On top of FADA, we propose geometry-aware adversarial training (GAT) to perform adversarial training on friendly adversarial data so that we can save a large number of search steps.

Data Augmentation

GAIL-PT: A Generic Intelligent Penetration Testing Framework with Generative Adversarial Imitation Learning

1 code implementation5 Apr 2022 Jinyin Chen, Shulong Hu, Haibin Zheng, Changyou Xing, Guomin Zhang

Addressing the challenges, for the first time, we introduce expert knowledge to guide the agent to make better decisions in RL-based PT and propose a Generative Adversarial Imitation Learning-based generic intelligent Penetration testing framework, denoted as GAIL-PT, to solve the problems of higher labor costs due to the involvement of security experts and high-dimensional discrete action space.

Imitation Learning Q-Learning

Excitement Surfeited Turns to Errors: Deep Learning Testing Framework Based on Excitable Neurons

1 code implementation12 Feb 2022 Haibo Jin, Ruoxi Chen, Haibin Zheng, Jinyin Chen, Yao Cheng, Yue Yu, Xianglong Liu

By maximizing the number of excitable neurons concerning various wrong behaviors of models, DeepSensor can generate testing examples that effectively trigger more errors due to adversarial inputs, polluted data and incomplete training.

Image Classification Speaker Recognition

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification

1 code implementation25 Dec 2021 Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen

To overcome the challenges, we propose NeuronFair, a new DNN fairness testing framework that differs from previous work in several key aspects: (1) interpretable - it quantitatively interprets DNNs' fairness violations for the biased decision; (2) effective - it uses the interpretation results to guide the generation of more diverse instances in less time; (3) generic - it can handle both structured and unstructured data.

Fairness

CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing

no code implementations24 Dec 2021 Haibo Jin, Ruoxi Chen, Jinyin Chen, Yao Cheng, Chong Fu, Ting Wang, Yue Yu, Zhaoyan Ming

Existing DNN testing methods are mainly designed to find incorrect corner case behaviors in adversarial settings but fail to discover the backdoors crafted by strong trojan attacks.

DNN Testing

NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks

no code implementations24 Dec 2021 Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng, Yue Yu, Shouling Ji

From the perspective of image feature space, some of them cannot reach satisfying results due to the shift of features.

Understanding the Dynamics of DNNs Using Graph Modularity

1 code implementation24 Nov 2021 Yao Lu, Wen Yang, Yunzhe Zhang, Zuohui Chen, Jinyin Chen, Qi Xuan, Zhen Wang, Xiaoniu Yang

Specifically, we model the process of class separation of intermediate representations in pre-trained DNNs as the evolution of communities in dynamic graphs.

Feature Engineering

Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction

no code implementations8 Oct 2021 Jinyin Chen, Haiyang Xiong, Haibin Zheng, Jian Zhang, Guodong Jiang, Yi Liu

Backdoor attacks induce the DLP methods to make wrong prediction by the malicious training data, i. e., generating a subgraph sequence as the trigger and embedding it to the training data.

Backdoor Attack Dynamic Link Prediction +1

Blockchain Phishing Scam Detection via Multi-channel Graph Classification

no code implementations19 Aug 2021 Dunjie Zhang, Jinyin Chen

The transaction pattern graphs and MCGC are more able to detect potential phishing scammers by extracting the transaction pattern features of the target users.

Graph Classification Graph Embedding +1

EGC2: Enhanced Graph Classification with Easy Graph Compression

1 code implementation16 Jul 2021 Jinyin Chen, Haiyang Xiong, Haibin Zhenga, Dunjie Zhang, Jian Zhang, Mingwei Jia, Yi Liu

To achieve lower-complexity defense applied to graph classification models, EGC2 utilizes a centrality-based edge-importance index to compress the graphs, filtering out trivial structures and adversarial perturbations in the input graphs, thus improving the model's robustness.

Graph Classification

Salient Feature Extractor for Adversarial Defense on Deep Neural Networks

1 code implementation14 May 2021 Jinyin Chen, Ruoxi Chen, Haibin Zheng, Zhaoyan Ming, Wenrong Jiang, Chen Cui

Motivated by the observation that adversarial examples are due to the non-robust feature learned from the original dataset by models, we propose the concepts of salient feature(SF) and trivial feature(TF).

Adversarial Defense Generative Adversarial Network

GraphAttacker: A General Multi-Task GraphAttack Framework

1 code implementation18 Jan 2021 Jinyin Chen, Dunjie Zhang, Zhaoyan Ming, Kejie Huang, Wenrong Jiang, Chen Cui

To address this problem, we propose GraphAttacker, a novel generic graph attack framework that can flexibly adjust the structures and the attack strategies according to the graph analysis tasks.

General Classification Generative Adversarial Network +3

DeepPoison: Feature Transfer Based Stealthy Poisoning Attack

no code implementations6 Jan 2021 Jinyin Chen, Longyuan Zhang, Haibin Zheng, Xueke Wang, Zhaoyan Ming

As existing episodes mainly focused on attack success rate with patch-based samples, defense algorithms can easily detect these poisoning samples.

ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries

no code implementations18 Dec 2020 Jinyin Chen, Zhen Wang, Haibin Zheng, Jun Xiao, Zhaoyan Ming

This work proposes a generic evaluation metric ROBY, a novel attack-independent robustness measure based on the model's decision boundaries.

Time-Series Snapshot Network for Partner Recommendation: A Case Study on OSS

no code implementations18 Nov 2020 Jinyin Chen, Yunyi Xie, Jian Zhang, Xincheng Shu, Qi Xuan

In this paper, we introduce time-series snapshot network (TSSN) which is a mixture network to model the interactions among users and developers.

Social and Information Networks

Visualizing Deep Learning-based Radio Modulation Classifier

no code implementations3 May 2020 Liang Huang, You Zhang, Weijian Pan, Jinyin Chen, Li Ping Qian, Yuan Wu

Extensive numerical results show both the CNN-based classifier and LSTM-based classifier extract similar radio features relating to modulation reference points.

General Classification

MGA: Momentum Gradient Attack on Network

no code implementations26 Feb 2020 Jinyin Chen, Yixian Chen, Haibin Zheng, Shijing Shen, Shanqing Yu, Dan Zhang, Qi Xuan

The adversarial attack methods based on gradient information can adequately find the perturbations, that is, the combinations of rewired links, thereby reducing the effectiveness of the deep learning model based graph embedding algorithms, but it is also easy to fall into a local optimum.

Social and Information Networks

Time-aware Gradient Attack on Dynamic Network Link Prediction

no code implementations24 Nov 2019 Jinyin Chen, Jian Zhang, Zhi Chen, Min Du, Qi Xuan

In this work, we present the first study of adversarial attack on dynamic network link prediction (DNLP).

Adversarial Attack Link Prediction +1

Multiscale Evolutionary Perturbation Attack on Community Detection

no code implementations22 Oct 2019 Jinyin Chen, Yixian Chen, Lihong Chen, Minghao Zhao, Qi Xuan

In this paper, we formalize this community detection attack problem in three scales, including global attack (macroscale), target community attack (mesoscale) and target node attack (microscale).

Social and Information Networks Physics and Society

Open DNN Box by Power Side-Channel Attack

no code implementations21 Jul 2019 Yun Xiang, Zhuangzhi Chen, Zuohui Chen, Zebin Fang, Haiyang Hao, Jinyin Chen, Yi Liu, Zhefu Wu, Qi Xuan, Xiaoniu Yang

However, recent studies indicate that they are also vulnerable to adversarial attacks.

Unsupervised Euclidean Distance Attack on Network Embedding

no code implementations27 May 2019 Qi Xuan, Jun Zheng, Lihong Chen, Shanqing Yu, Jinyin Chen, Dan Zhang, Qingpeng Zhang Member

Since a large number of downstream network algorithms, such as community detection and node classification, rely on the Euclidean distance between nodes to evaluate the similarity between them in the embedding space, EDA can be considered as a universal attack on a variety of network algorithms.

Social and Information Networks Physics and Society

POBA-GA: Perturbation Optimized Black-Box Adversarial Attacks via Genetic Algorithm

no code implementations1 May 2019 Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng

In this paper, comprehensive evaluation metrics are brought up for different adversarial attack methods.

Adversarial Attack

N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network

no code implementations12 Apr 2019 Jinyin Chen, Yangyang Wu, Lu Fan, Xiang Lin, Haibin Zheng, Shanqing Yu, Qi Xuan

In particular, we use a bipartite network to construct the user-item network, and represent the interactions among users (or items) by the corresponding one-mode projection network.

Clustering Recommendation Systems

Can Adversarial Network Attack be Defended?

no code implementations11 Mar 2019 Jinyin Chen, Yangyang Wu, Xiang Lin, Qi Xuan

In this paper, we are interested in the possibility of defense against adversarial attack on network, and propose defense strategies for GNNs against attacks.

Social and Information Networks Physics and Society

E-LSTM-D: A Deep Learning Framework for Dynamic Network Link Prediction

1 code implementation22 Feb 2019 Jinyin Chen, Jian Zhang, Xuanheng Xu, Chengbo Fu, Dan Zhang, Qingpeng Zhang, Qi Xuan

Predicting the potential relations between nodes in networks, known as link prediction, has long been a challenge in network science.

Link Prediction Time Series Analysis

GC-LSTM: Graph Convolution Embedded LSTM for Dynamic Link Prediction

2 code implementations ‎‎‏‏‎ ‎ 2020 Jinyin Chen, Xuanheng Xu, Yangyang Wu, Haibin Zheng

To the best of our knowledge, it is the first time that GCN embedded LSTM is put forward for link prediction of dynamic networks.

Social and Information Networks Physics and Society

FineFool: Fine Object Contour Attack via Attention

no code implementations1 Dec 2018 Jinyin Chen, Haibin Zheng, Hui Xiong, Mengmeng Su

Inspired by the correlations between adversarial perturbations and object contour, slighter perturbations is produced via focusing on object contour features, which is more imperceptible and difficult to be defended, especially network add-on defense methods with the trade-off between perturbations filtering and contour feature loss.

Adversarial Attack Object

GA Based Q-Attack on Community Detection

no code implementations1 Nov 2018 Jinyin Chen, Lihong Chen, Yixian Chen, Minghao Zhao, Shanqing Yu, Qi Xuan, Xiaoniu Yang

In particular, we first give two heuristic attack strategies, i. e., Community Detection Attack (CDA) and Degree Based Attack (DBA), as baselines, utilizing the information of detected community structure and node degree, respectively.

Social and Information Networks

Link Prediction Adversarial Attack

no code implementations2 Oct 2018 Jinyin Chen, Ziqiang Shi, Yangyang Wu, Xuanheng Xu, Haibin Zheng

Deep neural network has shown remarkable performance in solving computer vision and some graph evolved tasks, such as node classification and link prediction.

Physics and Society Social and Information Networks

Fast Gradient Attack on Network Embedding

no code implementations8 Sep 2018 Jinyin Chen, Yangyang Wu, Xuanheng Xu, Yixian Chen, Haibin Zheng, Qi Xuan

Network embedding maps a network into a low-dimensional Euclidean space, and thus facilitate many network analysis tasks, such as node classification, link prediction and community detection etc, by utilizing machine learning methods.

Physics and Society Social and Information Networks

Cannot find the paper you are looking for? You can Submit a new open access paper.