1 code implementation • 4 Dec 2024 • Haoyu Jiang, Xuhong Wang, Ping Yi, Shanzhe Lei, Yilun Lin
This paper proposes a multi-party credible watermarking framework (CredID) involving a trusted third party (TTP) and multiple LLM vendors to address these issues.
no code implementations • 15 Jul 2024 • Xuhong Wang, Haoyu Jiang, Yi Yu, Jingru Yu, Yilun Lin, Ping Yi, Yingchun Wang, Yu Qiao, Li Li, Fei-Yue Wang
Large Language Models (LLMs) are increasingly integrated into diverse industries, posing substantial security risks due to unauthorized replication and misuse.
no code implementations • 28 May 2024 • Nan Li, Haoyu Jiang, Ping Yi
Deep Neural Networks (DNNs) are known to be vulnerable to backdoor attacks, posing concerning threats to their reliable deployment.
1 code implementation • 4 Dec 2023 • Haoyu Jiang, Haiyang Yu, Nan Li, Ping Yi
We then pre-train a generative self-supervised graph autoencoder (GAE) to better learn the features of benign models in order to detect backdoor models without knowing the attack strategy.
no code implementations • 25 May 2023 • Lantian Li, Xiaolou Li, Haoyu Jiang, Chen Chen, Ruihai Hou, Dong Wang
A comprehensive study was conducted to compare CN-Celeb-AV with two popular public AVPR benchmark datasets, and the results demonstrated that CN-Celeb-AV is more in line with real-world scenarios and can be regarded as a new benchmark dataset for AVPR research.
no code implementations • 21 Oct 2022 • Haoyu Jiang, Jason Xu
Stochastic versions of proximal methods have gained much attention in statistics and machine learning.
no code implementations • 10 Jan 2022 • Tao Chen, Yiran Liu, Haoyu Jiang, Ruirui Li
While CNN excels at extracting local detail features, the Transformer naturally perceives global contextual information.