Robust natural language processing: Recent advances, challenges, and future directions

M Omar, S Choi, DH Nyang, D Mohaisen - IEEE Access, 2022 - ieeexplore.ieee.org
Recent natural language processing (NLP) techniques have accomplished high
performance on benchmark data sets, primarily due to the significant improvement in the …

Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding

Z Tian, B Tian, J Lv, Y Chen, L Chen - Expert Systems with Applications, 2024 - Elsevier
The explosive growth of software vulnerabilities poses a serious threat to the system security
and has become one of the urgent problems of the day. However, existing vulnerability …

Distilling knowledge on text graph for social media attribute inference

Q Li, X Li, L Chen, D Wu - Proceedings of the 45th International ACM …, 2022 - dl.acm.org
The popularization of social media generates a large amount of user-oriented data, where
text data especially attracts researchers and speculators to infer user attributes (eg, age …

Silent guardian: Protecting text from malicious exploitation by large language models

J Zhao, K Chen, X Yuan, Y Qi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The rapid development of large language models (LLMs) has yielded impressive success in
various downstream tasks. However, the vast potential and remarkable capabilities of LLMs …

Adversary for social good: Leveraging attribute-obfuscating attack to protect user privacy on social networks

X Li, L Chen, D Wu - International Conference on Security and Privacy in …, 2022 - Springer
As social networks become indispensable for people's daily lives, inference attacks pose
significant threat to users' privacy where attackers can infiltrate users' information and infer …

RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things

Z Chen, X Chai, Z Gan, B Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Medical images on the Internet of Medical Things (IoMT) can be easily collected, recognized
and analyzed by unauthorized individuals and companies using deep neural networks …

Adversary for social good: Leveraging adversarial attacks to protect personal attribute privacy

X Li, L Chen, D Wu - ACM Transactions on Knowledge Discovery from …, 2023 - dl.acm.org
Social media has drastically reshaped the world that allows billions of people to engage in
such interactive environments to conveniently create and share content with the public …

Knowledge distillation on cross-modal adversarial reprogramming for data-limited attribute inference

Q Li, L Chen, S **g, D Wu - Companion Proceedings of the ACM Web …, 2023 - dl.acm.org
Social media generates a rich source of text data with intrinsic user attributes (eg, age,
gender), where different parties benefit from disclosing them. Attribute inference can be cast …