Search Results for author: Shangxi Wu

Found 8 papers, 2 papers with code

Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark

1 code implementation17 May 2023 Wenjun Peng, Jingwei Yi, Fangzhao Wu, Shangxi Wu, Bin Zhu, Lingjuan Lyu, Binxing Jiao, Tong Xu, Guangzhong Sun, Xing Xie

Companies have begun to offer Embedding as a Service (EaaS) based on these LLMs, which can benefit various natural language processing (NLP) tasks for customers.

Model extraction

Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias

no code implementations1 Mar 2023 Shangxi Wu, Qiuyang He, Fangzhao Wu, Jitao Sang, YaoWei Wang, Changsheng Xu

In this work, we found that the backdoor attack can construct an artificial bias similar to the model bias derived in standard training.

Backdoor Attack Knowledge Distillation

An Experimental Study of Semantic Continuity for Deep Learning Models

no code implementations19 Nov 2020 Shangxi Wu, Jitao Sang, Xian Zhao, Lizhang Chen

Deep learning models suffer from the problem of semantic discontinuity: small perturbations in the input space tend to cause semantic-level interference to the model output.

Adversarial Robustness

Adaptive Adversarial Logits Pairing

no code implementations25 May 2020 Shangxi Wu, Jitao Sang, Kaiyuan Xu, Guanhua Zheng, Changsheng Xu

Specifically, AALP consists of an adaptive feature optimization module with Guided Dropout to systematically pursue fewer high-contribution features, and an adaptive sample weighting module by setting sample-specific training weights to balance between logits pairing loss and classification loss.

Classification General Classification +1

Butterfly Detection and Classification Based on Integrated YOLO Algorithm

1 code implementation2 Jan 2020 Bohan Liang, Shangxi Wu, Kaiyuan Xu, Jingyu Hao

Insects are abundant species on the earth, and the task of identification and identification of insects is complex and arduous.

Classification General Classification

Attention, Please! Adversarial Defense via Activation Rectification and Preservation

no code implementations24 Nov 2018 Shangxi Wu, Jitao Sang, Kaiyuan Xu, Jiaming Zhang, Jian Yu

This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.

Adversarial Attack Adversarial Defense

Cannot find the paper you are looking for? You can Submit a new open access paper.