Picture for Haitao Zheng

Haitao Zheng

Linguistic Rules-Based Corpus Generation for Native Chinese Grammatical Error Correction

Add code
Oct 19, 2022
Figure 1 for Linguistic Rules-Based Corpus Generation for Native Chinese Grammatical Error Correction
Figure 2 for Linguistic Rules-Based Corpus Generation for Native Chinese Grammatical Error Correction
Figure 3 for Linguistic Rules-Based Corpus Generation for Native Chinese Grammatical Error Correction
Figure 4 for Linguistic Rules-Based Corpus Generation for Native Chinese Grammatical Error Correction
Viaarxiv icon

Natural Backdoor Datasets

Add code
Jun 21, 2022
Figure 1 for Natural Backdoor Datasets
Figure 2 for Natural Backdoor Datasets
Figure 3 for Natural Backdoor Datasets
Figure 4 for Natural Backdoor Datasets
Viaarxiv icon

Can Backdoor Attacks Survive Time-Varying Models?

Add code
Jun 08, 2022
Figure 1 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 2 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 3 for Can Backdoor Attacks Survive Time-Varying Models?
Figure 4 for Can Backdoor Attacks Survive Time-Varying Models?
Viaarxiv icon

Global Mixup: Eliminating Ambiguity with Clustering

Add code
Jun 06, 2022
Figure 1 for Global Mixup: Eliminating Ambiguity with Clustering
Figure 2 for Global Mixup: Eliminating Ambiguity with Clustering
Figure 3 for Global Mixup: Eliminating Ambiguity with Clustering
Figure 4 for Global Mixup: Eliminating Ambiguity with Clustering
Viaarxiv icon

Assessing Privacy Risks from Feature Vector Reconstruction Attacks

Add code
Feb 11, 2022
Figure 1 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 2 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 3 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Figure 4 for Assessing Privacy Risks from Feature Vector Reconstruction Attacks
Viaarxiv icon

SoK: Anti-Facial Recognition Technology

Add code
Dec 08, 2021
Figure 1 for SoK: Anti-Facial Recognition Technology
Figure 2 for SoK: Anti-Facial Recognition Technology
Figure 3 for SoK: Anti-Facial Recognition Technology
Figure 4 for SoK: Anti-Facial Recognition Technology
Viaarxiv icon

Traceback of Data Poisoning Attacks in Neural Networks

Add code
Oct 13, 2021
Figure 1 for Traceback of Data Poisoning Attacks in Neural Networks
Figure 2 for Traceback of Data Poisoning Attacks in Neural Networks
Figure 3 for Traceback of Data Poisoning Attacks in Neural Networks
Figure 4 for Traceback of Data Poisoning Attacks in Neural Networks
Viaarxiv icon

"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World

Add code
Sep 20, 2021
Figure 1 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 2 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 3 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Figure 4 for "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World
Viaarxiv icon

ASR-GLUE: A New Multi-task Benchmark for ASR-Robust Natural Language Understanding

Add code
Aug 30, 2021
Figure 1 for ASR-GLUE: A New Multi-task Benchmark for ASR-Robust Natural Language Understanding
Figure 2 for ASR-GLUE: A New Multi-task Benchmark for ASR-Robust Natural Language Understanding
Figure 3 for ASR-GLUE: A New Multi-task Benchmark for ASR-Robust Natural Language Understanding
Figure 4 for ASR-GLUE: A New Multi-task Benchmark for ASR-Robust Natural Language Understanding
Viaarxiv icon

Understanding the Effect of Bias in Deep Anomaly Detection

Add code
May 16, 2021
Figure 1 for Understanding the Effect of Bias in Deep Anomaly Detection
Figure 2 for Understanding the Effect of Bias in Deep Anomaly Detection
Figure 3 for Understanding the Effect of Bias in Deep Anomaly Detection
Figure 4 for Understanding the Effect of Bias in Deep Anomaly Detection
Viaarxiv icon