Picture for Binghui Wang

Binghui Wang

SilentDrift: Exploiting Action Chunking for Stealthy Backdoor Attacks on Vision-Language-Action Models

Add code
Jan 20, 2026
Viaarxiv icon

VeFIA: An Efficient Inference Auditing Framework for Vertical Federated Collaborative Software

Add code
Jul 03, 2025
Figure 1 for VeFIA: An Efficient Inference Auditing Framework for Vertical Federated Collaborative Software
Figure 2 for VeFIA: An Efficient Inference Auditing Framework for Vertical Federated Collaborative Software
Figure 3 for VeFIA: An Efficient Inference Auditing Framework for Vertical Federated Collaborative Software
Figure 4 for VeFIA: An Efficient Inference Auditing Framework for Vertical Federated Collaborative Software
Viaarxiv icon

Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective

Add code
Jun 16, 2025
Figure 1 for Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Figure 2 for Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Figure 3 for Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Figure 4 for Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Viaarxiv icon

GenoArmory: A Unified Evaluation Framework for Adversarial Attacks on Genomic Foundation Models

Add code
May 16, 2025
Figure 1 for GenoArmory: A Unified Evaluation Framework for Adversarial Attacks on Genomic Foundation Models
Figure 2 for GenoArmory: A Unified Evaluation Framework for Adversarial Attacks on Genomic Foundation Models
Figure 3 for GenoArmory: A Unified Evaluation Framework for Adversarial Attacks on Genomic Foundation Models
Figure 4 for GenoArmory: A Unified Evaluation Framework for Adversarial Attacks on Genomic Foundation Models
Viaarxiv icon

FedTilt: Towards Multi-Level Fairness-Preserving and Robust Federated Learning

Add code
Mar 15, 2025
Viaarxiv icon

Backdoor Attacks on Discrete Graph Diffusion Models

Add code
Mar 08, 2025
Viaarxiv icon

Watermarking Graph Neural Networks via Explanations for Ownership Protection

Add code
Jan 09, 2025
Viaarxiv icon

Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method

Add code
Dec 17, 2024
Figure 1 for Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method
Figure 2 for Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method
Figure 3 for Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method
Figure 4 for Practicable Black-box Evasion Attacks on Link Prediction in Dynamic Graphs -- A Graph Sequential Embedding Method
Viaarxiv icon

Learning Robust and Privacy-Preserving Representations via Information Theory

Add code
Dec 15, 2024
Figure 1 for Learning Robust and Privacy-Preserving Representations via Information Theory
Figure 2 for Learning Robust and Privacy-Preserving Representations via Information Theory
Figure 3 for Learning Robust and Privacy-Preserving Representations via Information Theory
Figure 4 for Learning Robust and Privacy-Preserving Representations via Information Theory
Viaarxiv icon

Leveraging Local Structure for Improving Model Explanations: An Information Propagation Approach

Add code
Sep 24, 2024
Figure 1 for Leveraging Local Structure for Improving Model Explanations: An Information Propagation Approach
Figure 2 for Leveraging Local Structure for Improving Model Explanations: An Information Propagation Approach
Figure 3 for Leveraging Local Structure for Improving Model Explanations: An Information Propagation Approach
Figure 4 for Leveraging Local Structure for Improving Model Explanations: An Information Propagation Approach
Viaarxiv icon