Search Results for author: Xuhong Zhang

Found 30 papers, 13 papers with code

TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment

no code implementations17 Apr 2024 Qinfeng Li, Zhiqiang Shen, Zhenghan Qin, Yangfan Xie, Xuhong Zhang, Tianyu Du, Jianwei Yin

Specifically, we identify four critical protection properties that existing methods fail to simultaneously satisfy: (1) maintaining protection after a model is physically copied; (2) authorizing model access at request level; (3) safeguarding runtime reverse engineering; (4) achieving high security with negligible runtime overhead.

ERA-CoT: Improving Chain-of-Thought through Entity Relationship Analysis

1 code implementation11 Mar 2024 Yanming Liu, Xinyue Peng, Tianyu Du, Jianwei Yin, Weihao Liu, Xuhong Zhang

Large language models (LLMs) have achieved commendable accomplishments in various natural language processing tasks.

Question Answering

RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-Feedback

1 code implementation11 Mar 2024 Yanming Liu, Xinyue Peng, Xuhong Zhang, Weihao Liu, Jianwei Yin, Jiannan Cao, Tianyu Du

Large language models (LLMs) demonstrate exceptional performance in numerous tasks but still heavily rely on knowledge stored in their parameters.

Retrieval

PRSA: Prompt Reverse Stealing Attacks against Large Language Models

no code implementations29 Feb 2024 Yong Yang, Xuhong Zhang, Yi Jiang, Xi Chen, Haoyu Wang, Shouling Ji, Zonghui Wang

In the mutation phase, we propose a prompt attention algorithm based on differential feedback to capture these critical features for effectively inferring the target prompts.

3D Volumetric Super-Resolution in Radiology Using 3D RRDB-GAN

no code implementations6 Feb 2024 Juhyung Ha, Nian Wang, Surendra Maharjan, Xuhong Zhang

This study introduces the 3D Residual-in-Residual Dense Block GAN (3D RRDB-GAN) for 3D super-resolution for radiology imagery.

Super-Resolution

MEAOD: Model Extraction Attack against Object Detectors

no code implementations22 Dec 2023 Zeyu Li, Chenghui Shi, Yuwen Pu, Xuhong Zhang, Yu Li, Jinbao Li, Shouling Ji

The widespread use of deep learning technology across various industries has made deep neural network models highly valuable and, as a result, attractive targets for potential attackers.

Active Learning Model extraction +3

Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval

1 code implementation15 Dec 2023 Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, Lei Yang

Instead of crafting a new method pursuing further improvement on accuracy, in this paper we propose a multi-teacher distillation framework Whiten-MTD, which is able to transfer knowledge from off-the-shelf pre-trained retrieval models to a lightweight student model for efficient visual retrieval.

Image Retrieval Retrieval +1

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention

no code implementations29 Nov 2023 Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang

Extensive experiments demonstrate that dynamic attention significantly mitigates the impact of adversarial attacks, improving up to 33\% better performance than previous methods against widely-used adversarial attacks.

AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection

no code implementations13 Nov 2023 Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji

Code Clone Detection, which aims to retrieve functionally similar programs from large code bases, has been attracting increasing attention.

Clone Detection Contrastive Learning

How ChatGPT is Solving Vulnerability Management Problem

no code implementations11 Nov 2023 Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang

Prior works show that ChatGPT has the capabilities of processing foundational code analysis tasks, such as abstract syntax tree generation, which indicates the potential of using ChatGPT to comprehend code syntax and static behaviors.

Management

CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code

1 code implementation24 Oct 2023 Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang

Automatically generating function summaries for binaries is an extremely valuable but challenging task, since it involves translating the execution behavior and semantics of the low-level language (assembly code) into human-readable natural language.

Code Summarization

Community-Based Hierarchical Positive-Unlabeled (PU) Model Fusion for Chronic Disease Prediction

1 code implementation6 Sep 2023 Yang Wu, Xurui Li, Xuhong Zhang, Yangyang Kang, Changlong Sun, Xiaozhong Liu

Positive-Unlabeled (PU) Learning is a challenge presented by binary classification problems where there is an abundance of unlabeled data along with a small number of positive data instances, which can be used to address chronic disease screening problem.

Binary Classification Data Augmentation +3

Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting

1 code implementation5 Sep 2023 Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji

The widespread adoption of the Android operating system has made malicious Android applications an appealing target for attackers.

Android Malware Detection Malware Detection

Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization

1 code implementation18 May 2023 Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang

In this paper, we propose a fine-grained Token-level retrieval-augmented mechanism (Tram) on the decoder side rather than the encoder side to enhance the performance of neural models and produce more low-frequency tokens in generating summaries.

Code Summarization Retrieval +2

Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection

no code implementations30 Mar 2023 Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen

We then visualize the identity loss between the test and the reference image from the image differences of the aligned pairs, and design a custom metric to quantify the identity loss.

Attribute DeepFake Detection +1

Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models

no code implementations23 Mar 2023 Yuxuan Duan, Xuhong Zhang, Chuer Yu, Zonghui Wang, Shouling Ji, Wenzhi Chen

We reflect this nature with the confusion of a face identification model and measure the confusion with the maximum value of the output probability distribution.

Face Identification Face Swapping

Edge Deep Learning Model Protection via Neuron Authorization

1 code implementation22 Mar 2023 Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang, Shouling Ji

With the development of deep learning processors and accelerators, deep learning models have been widely deployed on edge devices as part of the Internet of Things.

FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases

1 code implementation28 Feb 2023 Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin

Thus, in this paper, we propose FreeEagle, the first data-free backdoor detection method that can effectively detect complex backdoor attacks on deep neural networks, without relying on the access to any clean samples or samples with the trigger.

Backdoor Attack

TextDefense: Adversarial Text Detection based on Word Importance Entropy

no code implementations12 Feb 2023 Lujia Shen, Xuhong Zhang, Shouling Ji, Yuwen Pu, Chunpeng Ge, Xing Yang, Yanghe Feng

TextDefense differs from previous approaches, where it utilizes the target model for detection and thus is attack type agnostic.

Adversarial Text Text Detection

Hijack Vertical Federated Learning Models As One Party

no code implementations1 Dec 2022 Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang

Vertical federated learning (VFL) is an emerging paradigm that enables collaborators to build machine learning models together in a distributed fashion.

Vertical Federated Learning

Label Inference Attacks Against Vertical Federated Learning

2 code implementations USENIX Security 22 2022 Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang

However, we discover that the bottom model structure and the gradient update mechanism of VFL can be exploited by a malicious participant to gain the power to infer the privately owned labels.

Vertical Federated Learning

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings

no code implementations7 Apr 2022 Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang

To bridge this critical gap, we conduct the first large-scale systematic empirical study of transfer attacks against major cloud-based MLaaS platforms, taking the components of a real transfer attack into account.

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

no code implementations22 Feb 2022 Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang

Facial Liveness Verification (FLV) is widely used for identity authentication in many security-sensitive domains and offered as Platform-as-a-Service (PaaS) by leading cloud vendors.

DeepFake Detection Face Swapping

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification

1 code implementation25 Dec 2021 Haibin Zheng, Zhiqing Chen, Tianyu Du, Xuhong Zhang, Yao Cheng, Shouling Ji, Jingyi Wang, Yue Yu, Jinyin Chen

To overcome the challenges, we propose NeuronFair, a new DNN fairness testing framework that differs from previous work in several key aspects: (1) interpretable - it quantitatively interprets DNNs' fairness violations for the biased decision; (2) effective - it uses the interpretation results to guide the generation of more diverse instances in less time; (3) generic - it can handle both structured and unstructured data.

Fairness

Cannot find the paper you are looking for? You can Submit a new open access paper.