Alert button
Picture for Jiyi Zhang

Jiyi Zhang

Alert button

Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs

Add code
Bookmark button
Alert button
Feb 27, 2024
Xiaoxia Li, Siyuan Liang, Jiyi Zhang, Han Fang, Aishan Liu, Ee-Chien Chang

Viaarxiv icon

Domain Bridge: Generative model-based domain forensic for black-box models

Add code
Bookmark button
Alert button
Feb 07, 2024
Jiyi Zhang, Han Fang, Ee-Chien Chang

Viaarxiv icon

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Add code
Bookmark button
Alert button
Jun 02, 2023
Jiyi Zhang, Han Fang, Ee-Chien Chang

Figure 1 for Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Figure 2 for Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Figure 3 for Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Figure 4 for Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks
Viaarxiv icon

Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation

Add code
Bookmark button
Alert button
May 10, 2023
Jiyi Zhang, Han Fang, Hwee Kuan Lee, Ee-Chien Chang

Figure 1 for Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
Figure 2 for Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
Figure 3 for Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
Figure 4 for Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation
Viaarxiv icon

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence

Add code
Bookmark button
Alert button
Dec 31, 2022
Han Fang, Jiyi Zhang, Yupeng Qiu, Ke Xu, Chengfang Fang, Ee-Chien Chang

Figure 1 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 2 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 3 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Figure 4 for Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence
Viaarxiv icon

Mitigating Adversarial Attacks by Distributing Different Copies to Different Users

Add code
Bookmark button
Alert button
Nov 30, 2021
Jiyi Zhang, Wesley Joon-Wie Tann, Ee-Chien Chang

Figure 1 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 2 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 3 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Figure 4 for Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Viaarxiv icon

Detection and Recovery of Adversarial Attacks with Injected Attractors

Add code
Bookmark button
Alert button
Mar 05, 2020
Jiyi Zhang, Ee-Chien Chang, Hwee Kuan Lee

Figure 1 for Detection and Recovery of Adversarial Attacks with Injected Attractors
Figure 2 for Detection and Recovery of Adversarial Attacks with Injected Attractors
Figure 3 for Detection and Recovery of Adversarial Attacks with Injected Attractors
Figure 4 for Detection and Recovery of Adversarial Attacks with Injected Attractors
Viaarxiv icon

Flipped-Adversarial AutoEncoders

Add code
Bookmark button
Alert button
Apr 04, 2018
Jiyi Zhang, Hung Dang, Hwee Kuan Lee, Ee-Chien Chang

Figure 1 for Flipped-Adversarial AutoEncoders
Figure 2 for Flipped-Adversarial AutoEncoders
Figure 3 for Flipped-Adversarial AutoEncoders
Figure 4 for Flipped-Adversarial AutoEncoders
Viaarxiv icon