Suivre
Guangyu Shen
Titre
Citée par
Citée par
Année
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization.
G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang
ICML 2021, 2021
1212021
Piccolo: Exposing complex backdoors in nlp transformer models
Y Liu, G Shen, G Tao, S An, S Ma, X Zhang
2022 IEEE Symposium on Security and Privacy (SP), 2025-2042, 2022
872022
Better trigger inversion optimization in backdoor scanning
G Tao, G Shen, Y Liu, S An, Q Xu, S Ma, P Li, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
862022
Complex backdoor detection by symmetric feature differencing
Y Liu, G Shen, G Tao, Z Wang, S Ma, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
76*2022
Mirror: Model inversion for deep learning network with high fidelity
S An, G Tao, Q Xu, Y Liu, G Shen, Y Yao, J Xu, X Zhang
Proceedings of the 29th Network and Distributed System Security Symposium, 2022
602022
Model orthogonalization: Class distance hardening in neural networks for better security
G Tao, Y Liu, G Shen, Q Xu, S An, Z Zhang, X Zhang
2022 IEEE Symposium on Security and Privacy (SP), 1372-1389, 2022
562022
Detecting backdoors in pre-trained encoders
S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
522023
Flip: A provable defense framework for backdoor mitigation in federated learning
K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ...
arXiv preprint arXiv:2210.12873, 2022
492022
Constrained optimization with dynamic bound-scaling for effective nlp backdoor defense
G Shen, Y Liu, G Tao, Q Xu, Z Zhang, S An, S Ma, X Zhang
International Conference on Machine Learning, 19879-19892, 2022
462022
On large language models’ resilience to coercive interrogation
Z Zhang, G Shen, G Tao, S Cheng, X Zhang
2024 IEEE Symposium on Security and Privacy (SP), 252-252, 2024
30*2024
Distribution preserving backdoor attack in self-supervised learning
G Tao, Z Wang, S Feng, G Shen, S Ma, X Zhang
2024 IEEE Symposium on Security and Privacy (SP), 2029-2047, 2024
242024
Penet: object detection using points estimation in aerial images
Z Tang, X Liu, G Shen, B Yang
arXiv preprint arXiv:2001.08247, 2020
232020
Elijah: Eliminating backdoors injected in diffusion models via distribution shift
S An, SY Chou, K Zhang, Q Xu, G Tao, G Shen, S Cheng, S Ma, PY Chen, ...
Proceedings of the AAAI Conference on Artificial Intelligence 38 (10), 10847 …, 2024
20*2024
Improving binary code similarity transformer models by semantics-driven instruction deemphasis
X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ...
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
20*2023
Brain tumor segmentation using concurrent fully convolutional networks and conditional random fields
G Shen, Y Ding, T Lan, H Chen, Z Qin
Proceedings of the 3rd International Conference on Multimedia and Image …, 2018
172018
Beagle: Forensics of deep learning backdoor attack for better defense
S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ...
arXiv preprint arXiv:2301.06241, 2023
152023
Backdoor vulnerabilities in normally trained deep learning models
G Tao, Z Wang, S Cheng, S Ma, S An, Y Liu, G Shen, Z Zhang, Y Mao, ...
arXiv preprint arXiv:2211.15929, 2022
152022
Multi‐modal brain tumor image segmentation based on SDAE
Y Ding, R Dong, T Lan, X Li, G Shen, H Chen, Z Qin
International Journal of Imaging Systems and Technology 28 (1), 38-47, 2018
142018
Advspade: Realistic unrestricted attacks for semantic segmentation
G Shen, C Mao, J Yang, B Ray
arXiv preprint arXiv:1910.02354, 2019
132019
Parafuzz: An interpretability-driven technique for detecting poisoned samples in nlp
L Yan, Z Zhang, G Tao, K Zhang, X Chen, G Shen, X Zhang
Advances in Neural Information Processing Systems 36, 66755-66767, 2023
122023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20