Robust natural language processing: Recent advances, challenges, and future directions
Recent natural language processing (NLP) techniques have accomplished high
performance on benchmark data sets, primarily due to the significant improvement in the …
performance on benchmark data sets, primarily due to the significant improvement in the …
Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding
The explosive growth of software vulnerabilities poses a serious threat to the system security
and has become one of the urgent problems of the day. However, existing vulnerability …
and has become one of the urgent problems of the day. However, existing vulnerability …
Distilling knowledge on text graph for social media attribute inference
The popularization of social media generates a large amount of user-oriented data, where
text data especially attracts researchers and speculators to infer user attributes (eg, age …
text data especially attracts researchers and speculators to infer user attributes (eg, age …
Silent guardian: Protecting text from malicious exploitation by large language models
The rapid development of large language models (LLMs) has yielded impressive success in
various downstream tasks. However, the vast potential and remarkable capabilities of LLMs …
various downstream tasks. However, the vast potential and remarkable capabilities of LLMs …
Adversary for social good: Leveraging attribute-obfuscating attack to protect user privacy on social networks
As social networks become indispensable for people's daily lives, inference attacks pose
significant threat to users' privacy where attackers can infiltrate users' information and infer …
significant threat to users' privacy where attackers can infiltrate users' information and infer …
RAE-VWP: A Reversible Adversarial Example-Based Privacy and Copyright Protection Method of Medical Images for Internet of Medical Things
Z Chen, X Chai, Z Gan, B Wang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
Medical images on the Internet of Medical Things (IoMT) can be easily collected, recognized
and analyzed by unauthorized individuals and companies using deep neural networks …
and analyzed by unauthorized individuals and companies using deep neural networks …
Adversary for social good: Leveraging adversarial attacks to protect personal attribute privacy
Social media has drastically reshaped the world that allows billions of people to engage in
such interactive environments to conveniently create and share content with the public …
such interactive environments to conveniently create and share content with the public …
Knowledge distillation on cross-modal adversarial reprogramming for data-limited attribute inference
Social media generates a rich source of text data with intrinsic user attributes (eg, age,
gender), where different parties benefit from disclosing them. Attribute inference can be cast …
gender), where different parties benefit from disclosing them. Attribute inference can be cast …