Alert button
Picture for Guozhu Meng

Guozhu Meng

Alert button

Evaluating Decision Optimality of Autonomous Driving via Metamorphic Testing

Add code
Bookmark button
Alert button
Feb 28, 2024
Mingfei Cheng, Yuan Zhou, Xiaofei Xie, Junjie Wang, Guozhu Meng, Kairui Yang

Viaarxiv icon

Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction

Add code
Bookmark button
Alert button
Feb 28, 2024
Tong Liu, Yingjie Zhang, Zhe Zhao, Yinpeng Dong, Guozhu Meng, Kai Chen

Viaarxiv icon

DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models

Add code
Bookmark button
Alert button
Dec 20, 2023
Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma

Viaarxiv icon

Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing

Add code
Bookmark button
Alert button
Sep 09, 2023
Jinwen He, Kai Chen, Guozhu Meng, Jiangshan Zhang, Congyi Li

Figure 1 for Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing
Figure 2 for Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing
Figure 3 for Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing
Figure 4 for Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing
Viaarxiv icon

ConFL: Constraint-guided Fuzzing for Machine Learning Framework

Add code
Bookmark button
Alert button
Jul 11, 2023
Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang

Figure 1 for ConFL: Constraint-guided Fuzzing for Machine Learning Framework
Figure 2 for ConFL: Constraint-guided Fuzzing for Machine Learning Framework
Figure 3 for ConFL: Constraint-guided Fuzzing for Machine Learning Framework
Figure 4 for ConFL: Constraint-guided Fuzzing for Machine Learning Framework
Viaarxiv icon

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

Add code
Bookmark button
Alert button
Sep 08, 2022
Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng

Figure 1 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 2 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 3 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 4 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Viaarxiv icon

Learning Program Semantics with Code Representations: An Empirical Study

Add code
Bookmark button
Alert button
Mar 22, 2022
Jing Kai Siow, Shangqing Liu, Xiaofei Xie, Guozhu Meng, Yang Liu

Figure 1 for Learning Program Semantics with Code Representations: An Empirical Study
Figure 2 for Learning Program Semantics with Code Representations: An Empirical Study
Figure 3 for Learning Program Semantics with Code Representations: An Empirical Study
Figure 4 for Learning Program Semantics with Code Representations: An Empirical Study
Viaarxiv icon

DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks

Add code
Bookmark button
Alert button
May 13, 2021
Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, Xingbo Hu

Figure 1 for DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks
Figure 2 for DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks
Figure 3 for DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks
Figure 4 for DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks
Viaarxiv icon

Towards Privacy and Security of Deep Learning Systems: A Survey

Add code
Bookmark button
Alert button
Nov 28, 2019
Yingzhe He, Guozhu Meng, Kai Chen, Xingbo Hu, Jinwen He

Figure 1 for Towards Privacy and Security of Deep Learning Systems: A Survey
Figure 2 for Towards Privacy and Security of Deep Learning Systems: A Survey
Figure 3 for Towards Privacy and Security of Deep Learning Systems: A Survey
Figure 4 for Towards Privacy and Security of Deep Learning Systems: A Survey
Viaarxiv icon

Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection

Add code
Bookmark button
Alert button
Jun 21, 2016
Annamalai Narayanan, Guozhu Meng, Liu Yang, Jinliang Liu, Lihui Chen

Figure 1 for Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection
Figure 2 for Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection
Figure 3 for Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection
Figure 4 for Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection
Viaarxiv icon