Search Results for author: Ping Yi

Found 8 papers, 3 papers with code

CredID: Credible Multi-Bit Watermark for Large Language Models Identification

1 code implementation4 Dec 2024 Haoyu Jiang, Xuhong Wang, Ping Yi, Shanzhe Lei, Yilun Lin

This paper proposes a multi-party credible watermarking framework (CredID) involving a trusted third party (TTP) and multiple LLM vendors to address these issues.

Building Intelligence Identification System via Large Language Model Watermarking: A Survey and Beyond

no code implementations15 Jul 2024 Xuhong Wang, Haoyu Jiang, Yi Yu, Jingru Yu, Yilun Lin, Ping Yi, Yingchun Wang, Yu Qiao, Li Li, Fei-Yue Wang

Large Language Models (LLMs) are increasingly integrated into diverse industries, posing substantial security risks due to unauthorized replication and misuse.

Language Modelling Large Language Model

Magnitude-based Neuron Pruning for Backdoor Defens

no code implementations28 May 2024 Nan Li, Haoyu Jiang, Ping Yi

Deep Neural Networks (DNNs) are known to be vulnerable to backdoor attacks, posing concerning threats to their reliable deployment.

backdoor defense

Rethinking Pruning for Backdoor Mitigation: An Optimization Perspective

no code implementations28 May 2024 Nan Li, Haiyang Yu, Ping Yi

Deep Neural Networks (DNNs) are known to be vulnerable to backdoor attacks, posing concerning threats to their reliable deployment.

backdoor defense Graph Neural Network +1

TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models

no code implementations22 May 2024 Pengzhou Cheng, Yidong Ding, Tianjie Ju, Zongru Wu, Wei Du, Ping Yi, Zhuosheng Zhang, Gongshen Liu

To improve the recall of the RAG for the target contexts, we introduce a knowledge graph to construct structured data to achieve hard matching at a fine-grained level.

Backdoor Attack Contrastive Learning +2

OCGEC: One-class Graph Embedding Classification for DNN Backdoor Detection

1 code implementation4 Dec 2023 Haoyu Jiang, Haiyang Yu, Nan Li, Ping Yi

We then pre-train a generative self-supervised graph autoencoder (GAE) to better learn the features of benign models in order to detect backdoor models without knowing the attack strategy.

backdoor defense Graph Embedding +2

DAFAR: Defending against Adversaries by Feedback-Autoencoder Reconstruction

no code implementations11 Mar 2021 Haowen Liu, Ping Yi, Hsiao-Ying Lin, Jie Shi, Weidong Qiu

We propose DAFAR, a feedback framework that allows deep learning models to detect/purify adversarial examples in high effectiveness and universality, with low area and time overhead.

Cannot find the paper you are looking for? You can Submit a new open access paper.