Alert button
Picture for Haojin Zhu

Haojin Zhu

Alert button

Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations

Add code
Bookmark button
Alert button
Feb 22, 2022
Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue

Figure 1 for Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Figure 2 for Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Figure 3 for Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Figure 4 for Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Viaarxiv icon

Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks

Add code
Bookmark button
Alert button
Nov 19, 2021
Wei Wang, Ruoxi Sun, Tian Dong, Shaofeng Li, Minhui Xue, Gareth Tyson, Haojin Zhu

Figure 1 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 2 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 3 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 4 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Viaarxiv icon

Hidden Backdoors in Human-Centric Language Models

Add code
Bookmark button
Alert button
May 01, 2021
Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu

Figure 1 for Hidden Backdoors in Human-Centric Language Models
Figure 2 for Hidden Backdoors in Human-Centric Language Models
Figure 3 for Hidden Backdoors in Human-Centric Language Models
Figure 4 for Hidden Backdoors in Human-Centric Language Models
Viaarxiv icon

Invisible Backdoor Attacks Against Deep Neural Networks

Add code
Bookmark button
Alert button
Sep 06, 2019
Shaofeng Li, Benjamin Zi Hao Zhao, Jiahao Yu, Minhui Xue, Dali Kaafar, Haojin Zhu

Figure 1 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 2 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 3 for Invisible Backdoor Attacks Against Deep Neural Networks
Figure 4 for Invisible Backdoor Attacks Against Deep Neural Networks
Viaarxiv icon

Differentially Private Data Generative Models

Add code
Bookmark button
Alert button
Dec 06, 2018
Qingrong Chen, Chong Xiang, Minhui Xue, Bo Li, Nikita Borisov, Dali Kaarfar, Haojin Zhu

Figure 1 for Differentially Private Data Generative Models
Figure 2 for Differentially Private Data Generative Models
Figure 3 for Differentially Private Data Generative Models
Figure 4 for Differentially Private Data Generative Models
Viaarxiv icon