no code implementations • 28 Feb 2024 • Mingfei Cheng, Yuan Zhou, Xiaofei Xie, Junjie Wang, Guozhu Meng, Kairui Yang
In this paper, we focus on evaluating the decision-making quality of an ADS and propose the first method for detecting non-optimal decision scenarios (NoDSs), where the ADS does not compute optimal paths for AVs.
1 code implementation • 28 Feb 2024 • Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen
We evaluate DRA across various open-source and closed-source models, showcasing state-of-the-art jailbreak success rates and attack efficiency.
1 code implementation • 18 Dec 2023 • Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma
Dataset sanitization is a widely adopted proactive defense against poisoning-based backdoor attacks, aimed at filtering out and removing poisoned samples from training datasets.
1 code implementation • 9 Sep 2023 • Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li
While enjoying the great achievements brought by deep learning (DL), people are also worried about the decision made by DL models, since the high degree of non-linearity of DL models makes the decision extremely difficult to understand.
no code implementations • 11 Jul 2023 • Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang
Guided by the constraints, ConFL is able to generate valid inputs that can pass the verification and explore deeper paths of kernel codes.
1 code implementation • 8 Sep 2022 • Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng
Recent years have witnessed tremendous success in Self-Supervised Learning (SSL), which has been widely utilized to facilitate various downstream tasks in Computer Vision (CV) and Natural Language Processing (NLP) domains.
1 code implementation • 22 Mar 2022 • Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu
However, currently, a comprehensive and systematic study on evaluating different program representation techniques across diverse tasks is still missed.
1 code implementation • 4 Nov 2021 • Shangqing Liu, Xiaofei Xie, JingKai Siow, Lei Ma, Guozhu Meng, Yang Liu
Specifically, we propose to construct graphs for the source code and queries with bidirectional GGNN (BiGGNN) to capture the local structural information of the source code and queries.
no code implementations • 13 May 2021 • Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, Xingbo Hu
Compared to the method of retraining from scratch, our approach can achieve 99. 0%, 95. 0%, 91. 9%, 96. 7%, 74. 1% accuracy rates and 66. 7$\times$, 75. 0$\times$, 33. 3$\times$, 29. 4$\times$, 13. 7$\times$ speedups on the MNIST, SVHN, CIFAR-10, Purchase, and ImageNet datasets, respectively.
no code implementations • 28 Nov 2019 • Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He
In order to unveil the security weaknesses and aid in the development of a robust deep learning system, we undertake an investigation on attacks towards deep learning, and analyze these attacks to conclude some findings in multiple views.
no code implementations • 21 Jun 2016 • Annamalai Narayanan, Guozhu Meng, Liu Yang, Jinliang Liu, Lihui Chen
To address this, we develop the Contextual Weisfeiler-Lehman kernel (CWLK) which is capable of capturing both these types of information.