Search Results for author: Shangwei Guo

Found 21 papers, 6 papers with code

TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability

1 code implementation29 Jan 2024 Hao Wang, Tao Xiang, Shangwei Guo, Jialing He, Hangcheng Liu, Tianwei Zhang

Adopting untrusted PTMs may suffer from backdoor attacks, where the adversary can compromise the downstream models by injecting backdoors into the PTM.

Backdoor Attack

Rethinking Adversarial Training with Neural Tangent Kernel

no code implementations4 Dec 2023 Guanlin Li, Han Qiu, Shangwei Guo, Jiwei Li, Tianwei Zhang

To the best of our knowledge, it is the first work leveraging the observations of kernel dynamics to improve existing AT methods.

Mercury: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator

no code implementations2 Aug 2023 Xiaobei Yan, Xiaoxuan Lou, Guowen Xu, Han Qiu, Shangwei Guo, Chip Hong Chang, Tianwei Zhang

One big concern about the usage of the accelerators is the confidentiality of the deployed models: model inference execution on the accelerators could leak side-channel information, which enables an adversary to preciously recover the model details.

Model extraction

Text Classification via Large Language Models

1 code implementation15 May 2023 Xiaofei Sun, Xiaoya Li, Jiwei Li, Fei Wu, Shangwei Guo, Tianwei Zhang, Guoyin Wang

This is due to (1) the lack of reasoning ability in addressing complex linguistic phenomena (e. g., intensification, contrast, irony etc); (2) limited number of tokens allowed in in-context learning.

Domain Adaptation In-Context Learning +3

CompleteDT: Point Cloud Completion with Dense Augment Inference Transformers

no code implementations30 May 2022 Jun Li, Shangwei Guo, Shaokun Han

Point cloud completion task aims to predict the missing part of incomplete point clouds and generate complete point clouds with details.

Point Cloud Completion

CT-block: a novel local and global features extractor for point cloud

no code implementations30 Nov 2021 Shangwei Guo, Jun Li, Zhengchao Lai, Xiantong Meng, Shaokun Han

Meanwhile, the transformer-branch performs offset-attention process on the whole point cloud to extract the global feature.

Point Cloud Classification

Triggerless Backdoor Attack for NLP Tasks with Clean Labels

2 code implementations NAACL 2022 Leilei Gan, Jiwei Li, Tianwei Zhang, Xiaoya Li, Yuxian Meng, Fei Wu, Yi Yang, Shangwei Guo, Chun Fan

To deal with this issue, in this paper, we propose a new strategy to perform textual backdoor attacks which do not require an external trigger, and the poisoned samples are correctly labeled.

Backdoor Attack Sentence

BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models

no code implementations ICLR 2022 Kangjie Chen, Yuxian Meng, Xiaofei Sun, Shangwei Guo, Tianwei Zhang, Jiwei Li, Chun Fan

The key feature of our attack is that the adversary does not need prior information about the downstream tasks when implanting the backdoor to the pre-trained model.

Backdoor Attack Transfer Learning

NASPY: Automated Extraction of Automated Machine Learning Models

no code implementations ICLR 2022 Xiaoxuan Lou, Shangwei Guo, Jiwei Li, Yaoxin Wu, Tianwei Zhang

We present NASPY, an end-to-end adversarial framework to extract the networkarchitecture of deep learning models from Neural Architecture Search (NAS).

BIG-bench Machine Learning Model extraction +1

A Novel Watermarking Framework for Ownership Verification of DNN Architectures

no code implementations29 Sep 2021 Xiaoxuan Lou, Shangwei Guo, Tianwei Zhang, Jiwei Li, Yinqian Zhang, Yang Liu

We present a novel watermarking scheme to achieve the intellectual property (IP) protection and ownership verification of DNN architectures.

Model extraction Neural Architecture Search

Fingerprinting Generative Adversarial Networks

no code implementations19 Jun 2021 Guanlin Li, Guowen Xu, Han Qiu, Shangwei Guo, Run Wang, Jiwei Li, Tianwei Zhang, Rongxing Lu

In this paper, we present the first fingerprinting scheme for the Intellectual Property (IP) protection of GANs.

Local Black-box Adversarial Attacks: A Query Efficient Approach

no code implementations4 Jan 2021 Tao Xiang, Hangcheng Liu, Shangwei Guo, Tianwei Zhang, Xiaofeng Liao

Based on this property, we identify the discriminative areas of a given clean example easily for local perturbations.

DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation

no code implementations13 Dec 2020 Han Qiu, Yi Zeng, Shangwei Guo, Tianwei Zhang, Meikang Qiu, Bhavani Thuraisingham

In this paper, we investigate the effectiveness of data augmentation techniques in mitigating backdoor attacks and enhancing DL models' robustness.

Backdoor Attack Data Augmentation

Privacy-preserving Collaborative Learning with Automatic Transformation Search

3 code implementations CVPR 2021 Wei Gao, Shangwei Guo, Tianwei Zhang, Han Qiu, Yonggang Wen, Yang Liu

Comprehensive evaluations demonstrate that the policies discovered by our method can defeat existing reconstruction attacks in collaborative learning, with high efficiency and negligible impact on the model performance.

Data Augmentation Privacy Preserving

Topology-aware Differential Privacy for Decentralized Image Classification

no code implementations14 Jun 2020 Shangwei Guo, Tianwei Zhang, Guowen Xu, Han Yu, Tao Xiang, Yang Liu

In this paper, we design Top-DP, a novel solution to optimize the differential privacy protection of decentralized image classification systems.

Classification Image Classification

Stealing Deep Reinforcement Learning Models for Fun and Profit

no code implementations9 Jun 2020 Kangjie Chen, Shangwei Guo, Tianwei Zhang, Xiaofei Xie, Yang Liu

This paper presents the first model extraction attack against Deep Reinforcement Learning (DRL), which enables an external adversary to precisely recover a black-box DRL model only from its interaction with the environment.

Imitation Learning Model extraction +2

Byzantine-resilient Decentralized Stochastic Gradient Descent

no code implementations20 Feb 2020 Shangwei Guo, Tianwei Zhang, Han Yu, Xiaofei Xie, Lei Ma, Tao Xiang, Yang Liu

It guarantees that each benign node in a decentralized system can train a correct model under very strong Byzantine attacks with an arbitrary number of faulty nodes.

Edge-computing Image Classification

Cannot find the paper you are looking for? You can Submit a new open access paper.