Seguir
Siyuan Cheng
Siyuan Cheng
Dirección de correo verificada de purdue.edu - Página principal
Título
Citado por
Citado por
Año
Deep feature space trojan attack of neural networks by controlled detoxification
S Cheng, Y Liu, S Ma, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 35 (2), 1148-1156, 2021
1832021
Backdoor scanning for deep neural networks through k-arm optimization
G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang
International Conference on Machine Learning, 9525-9536, 2021
1212021
Towards feature space adversarial attack by style perturbation
Q Xu, G Tao, S Cheng, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 35 (12), 10523 …, 2021
67*2021
Detecting backdoors in pre-trained encoders
S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
542023
Flip: A provable defense framework for backdoor mitigation in federated learning
K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ...
ICLR 2023 (Best Paper Award at ECCV 2022 AROW Workshop), 2022
522022
On large language models’ resilience to coercive interrogation
Z Zhang, G Shen, G Tao, S Cheng, X Zhang
2024 IEEE Symposium on Security and Privacy (SP), 252-252, 2024
30*2024
Leveraging Generative Models to Recover Variable Names from Stripped Binary
X Xu, Z Zhang, Z Su, Z Huang, S Feng, Y Ye, N Jiang, D Xie, S Cheng, ...
arXiv preprint arXiv:2306.02546, 2023
27*2023
Elijah: Eliminating backdoors injected in diffusion models via distribution shift
S An, SY Chou, K Zhang, Q Xu, G Tao, G Shen, S Cheng, S Ma, PY Chen, ...
Proceedings of the AAAI Conference on Artificial Intelligence 38 (10), 10847 …, 2024
21*2024
Improving binary code similarity transformer models by semantics-driven instruction deemphasis
X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ...
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
21*2023
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ...
30th Annual Network And Distributed System Security Symposium (NDSS 2023), 2023
152023
Backdoor vulnerabilities in normally trained deep learning models
G Tao, Z Wang, S Cheng, S Ma, S An, Y Liu, G Shen, Z Zhang, Y Mao, ...
arXiv preprint arXiv:2211.15929, 2022
152022
Rapid optimization for jailbreaking llms via subconscious exploitation and echopraxia
G Shen, S Cheng, K Zhang, G Tao, S An, L Yan, Z Zhang, S Ma, X Zhang
arXiv preprint arXiv:2402.05467, 2024
122024
Opening a Pandora's box: things you should know in the era of custom GPTs
G Tao, S Cheng, Z Zhang, J Zhu, G Shen, X Zhang
arXiv preprint arXiv:2401.00905, 2023
102023
Hard-label black-box universal adversarial patch attack
G Tao, S An, S Cheng, G Shen, X Zhang
32nd USENIX Security Symposium (USENIX Security 23), 697-714, 2023
82023
Medic: Remove model backdoors via importance driven cloning
Q Xu, G Tao, J Honorio, Y Liu, S An, G Shen, S Cheng, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
8*2023
Django: Detecting trojans in object detection models via gaussian focus calibration
G Shen, S Cheng, G Tao, K Zhang, Y Liu, S An, S Ma, X Zhang
Advances in Neural Information Processing Systems 36, 51253-51272, 2023
72023
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes
S An, Y Yao, Q Xu, S Ma, G Tao, S Cheng, K Zhang, Y Liu, G Shen, I Kelk, ...
2023 IEEE Symposium on Security and Privacy (SP), 899-916, 2023
52023
Deck: Model hardening for defending pervasive backdoors
G Tao, Y Liu, S Cheng, S An, Z Zhang, Q Xu, G Shen, X Zhang
arXiv preprint arXiv:2206.09272, 2022
52022
Odscan: Backdoor scanning for object detection models
S Cheng, G Shen, G Tao, K Zhang, Z Zhang, S An, X Xu, Y Li, S Ma, ...
2024 IEEE Symposium on Security and Privacy (SP), 1703-1721, 2024
42024
Rethinking the invisible protection against unauthorized image usage in stable diffusion
S An, L Yan, S Cheng, G Shen, K Zhang, Q Xu, G Tao, X Zhang
33rd USENIX Security Symposium (USENIX Security 24), 3621-3638, 2024
42024
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20