Search Results for author: Shuli Jiang

Found 4 papers, 2 papers with code

Forcing Generative Models to Degenerate Ones: The Power of Data Poisoning Attacks

no code implementations7 Dec 2023 Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Ling Cai, Nathalie Baracaldo

Growing applications of large language models (LLMs) trained by a third party raise serious concerns on the security vulnerability of LLMs. It has been demonstrated that malicious actors can covertly exploit these vulnerabilities in LLMs through poisoning attacks aimed at generating undesirable outputs.

Data Poisoning object-detection +2

D.MCA: Outlier Detection with Explicit Micro-Cluster Assignments

1 code implementation15 Oct 2022 Shuli Jiang, Robson Leonardo Ferreira Cordeiro, Leman Akoglu

How can we perform both tasks in-house, i. e., without any post-hoc processing, so that both detection and assignment can benefit simultaneously from each other?

Clustering Outlier Detection

An Efficient Protocol for Distributed Column Subset Selection in the Entrywise $\ell_p$ Norm

no code implementations1 Jan 2021 Shuli Jiang, Dongyu Li, Irene Mengze Li, Arvind V. Mahankali, David Woodruff

We give a distributed protocol with nearly-optimal communication and number of rounds for Column Subset Selection with respect to the entrywise {$\ell_1$} norm ($k$-CSS$_1$), and more generally, for the $\ell_p$-norm with $1 \leq p < 2$.

3D Reconstruction

Characterizing Allegheny County Opioid Overdoses with an Interactive Data Explorer and Synthetic Prediction Tool

1 code implementation24 Apr 2018 Theresa Gebert, Shuli Jiang, Jiaxian Sheng

The United States has an opioid epidemic, and Pennsylvania's Allegheny County is among the worst.

Applications Populations and Evolution

Cannot find the paper you are looking for? You can Submit a new open access paper.