Alert button
Picture for Benjamin Zi Hao Zhao

Benjamin Zi Hao Zhao

Alert button

Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories

Add code
Bookmark button
Alert button
Apr 06, 2023
Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar

Figure 1 for Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories
Figure 2 for Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories
Figure 3 for Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories
Figure 4 for Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories
Viaarxiv icon

DDoD: Dual Denial of Decision Attacks on Human-AI Teams

Add code
Bookmark button
Alert button
Dec 07, 2022
Benjamin Tag, Niels van Berkel, Sunny Verma, Benjamin Zi Hao Zhao, Shlomo Berkovsky, Dali Kaafar, Vassilis Kostakos, Olga Ohrimenko

Figure 1 for DDoD: Dual Denial of Decision Attacks on Human-AI Teams
Viaarxiv icon

Unintended Memorization and Timing Attacks in Named Entity Recognition Models

Add code
Bookmark button
Alert button
Nov 04, 2022
Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar

Figure 1 for Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Figure 2 for Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Figure 3 for Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Figure 4 for Unintended Memorization and Timing Attacks in Named Entity Recognition Models
Viaarxiv icon

MANDERA: Malicious Node Detection in Federated Learning via Ranking

Add code
Bookmark button
Alert button
Oct 22, 2021
Wanchuang Zhu, Benjamin Zi Hao Zhao, Simon Luo, Ke Deng

Figure 1 for MANDERA: Malicious Node Detection in Federated Learning via Ranking
Figure 2 for MANDERA: Malicious Node Detection in Federated Learning via Ranking
Figure 3 for MANDERA: Malicious Node Detection in Federated Learning via Ranking
Figure 4 for MANDERA: Malicious Node Detection in Federated Learning via Ranking
Viaarxiv icon

Hidden Backdoors in Human-Centric Language Models

Add code
Bookmark button
Alert button
May 01, 2021
Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu

Figure 1 for Hidden Backdoors in Human-Centric Language Models
Figure 2 for Hidden Backdoors in Human-Centric Language Models
Figure 3 for Hidden Backdoors in Human-Centric Language Models
Figure 4 for Hidden Backdoors in Human-Centric Language Models
Viaarxiv icon

On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models

Add code
Bookmark button
Alert button
Mar 12, 2021
Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

Figure 1 for On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models
Figure 2 for On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models
Figure 3 for On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models
Figure 4 for On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models
Viaarxiv icon

Oriole: Thwarting Privacy against Trustworthy Deep Learning Models

Add code
Bookmark button
Alert button
Feb 23, 2021
Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian

Figure 1 for Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
Figure 2 for Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
Figure 3 for Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
Figure 4 for Oriole: Thwarting Privacy against Trustworthy Deep Learning Models
Viaarxiv icon

Deep Learning Backdoors

Add code
Bookmark button
Alert button
Jul 16, 2020
Shaofeng Li, Shiqing Ma, Minhui Xue, Benjamin Zi Hao Zhao

Figure 1 for Deep Learning Backdoors
Figure 2 for Deep Learning Backdoors
Figure 3 for Deep Learning Backdoors
Figure 4 for Deep Learning Backdoors
Viaarxiv icon

With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models

Add code
Bookmark button
Alert button
Jun 23, 2020
Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian

Figure 1 for With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models
Figure 2 for With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models
Figure 3 for With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models
Figure 4 for With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models
Viaarxiv icon

On the Resilience of Biometric Authentication Systems against Random Inputs

Add code
Bookmark button
Alert button
Jan 24, 2020
Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar

Figure 1 for On the Resilience of Biometric Authentication Systems against Random Inputs
Figure 2 for On the Resilience of Biometric Authentication Systems against Random Inputs
Figure 3 for On the Resilience of Biometric Authentication Systems against Random Inputs
Figure 4 for On the Resilience of Biometric Authentication Systems against Random Inputs
Viaarxiv icon