Picture for Guozhu Meng

Guozhu Meng

Evaluating Decision Optimality of Autonomous Driving via Metamorphic Testing

Add code
Feb 28, 2024
Viaarxiv icon

Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction

Add code
Feb 28, 2024
Figure 1 for Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction
Figure 2 for Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction
Figure 3 for Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction
Figure 4 for Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction
Viaarxiv icon

DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models

Add code
Dec 20, 2023
Figure 1 for DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models
Figure 2 for DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models
Figure 3 for DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models
Figure 4 for DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models
Viaarxiv icon

Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing

Add code
Sep 09, 2023
Figure 1 for Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing
Figure 2 for Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing
Figure 3 for Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing
Figure 4 for Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing
Viaarxiv icon

ConFL: Constraint-guided Fuzzing for Machine Learning Framework

Add code
Jul 11, 2023
Figure 1 for ConFL: Constraint-guided Fuzzing for Machine Learning Framework
Figure 2 for ConFL: Constraint-guided Fuzzing for Machine Learning Framework
Figure 3 for ConFL: Constraint-guided Fuzzing for Machine Learning Framework
Figure 4 for ConFL: Constraint-guided Fuzzing for Machine Learning Framework
Viaarxiv icon

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning

Add code
Sep 08, 2022
Figure 1 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 2 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 3 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Figure 4 for SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning
Viaarxiv icon

Learning Program Semantics with Code Representations: An Empirical Study

Add code
Mar 22, 2022
Figure 1 for Learning Program Semantics with Code Representations: An Empirical Study
Figure 2 for Learning Program Semantics with Code Representations: An Empirical Study
Figure 3 for Learning Program Semantics with Code Representations: An Empirical Study
Figure 4 for Learning Program Semantics with Code Representations: An Empirical Study
Viaarxiv icon

DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks

Add code
May 13, 2021
Figure 1 for DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks
Figure 2 for DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks
Figure 3 for DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks
Figure 4 for DeepObliviate: A Powerful Charm for Erasing Data Residual Memory in Deep Neural Networks
Viaarxiv icon

Towards Privacy and Security of Deep Learning Systems: A Survey

Add code
Nov 28, 2019
Figure 1 for Towards Privacy and Security of Deep Learning Systems: A Survey
Figure 2 for Towards Privacy and Security of Deep Learning Systems: A Survey
Figure 3 for Towards Privacy and Security of Deep Learning Systems: A Survey
Figure 4 for Towards Privacy and Security of Deep Learning Systems: A Survey
Viaarxiv icon

Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection

Add code
Jun 21, 2016
Figure 1 for Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection
Figure 2 for Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection
Figure 3 for Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection
Figure 4 for Contextual Weisfeiler-Lehman Graph Kernel For Malware Detection
Viaarxiv icon