Alert button
Picture for Michael Backes

Michael Backes

Alert button

Last One Standing: A Comparative Analysis of Security and Privacy of Soft Prompt Tuning, LoRA, and In-Context Learning

Add code
Bookmark button
Alert button
Oct 17, 2023
Rui Wen, Tianhao Wang, Michael Backes, Yang Zhang, Ahmed Salem

Viaarxiv icon

Provably Robust Cost-Sensitive Learning via Randomized Smoothing

Add code
Bookmark button
Alert button
Oct 12, 2023
Yuan Xin, Michael Backes, Xiao Zhang

Viaarxiv icon

Composite Backdoor Attacks Against Large Language Models

Add code
Bookmark button
Alert button
Oct 11, 2023
Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang

Figure 1 for Composite Backdoor Attacks Against Large Language Models
Figure 2 for Composite Backdoor Attacks Against Large Language Models
Figure 3 for Composite Backdoor Attacks Against Large Language Models
Figure 4 for Composite Backdoor Attacks Against Large Language Models
Viaarxiv icon

Prompt Backdoors in Visual Prompt Learning

Add code
Bookmark button
Alert button
Oct 11, 2023
Hai Huang, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang

Figure 1 for Prompt Backdoors in Visual Prompt Learning
Figure 2 for Prompt Backdoors in Visual Prompt Learning
Figure 3 for Prompt Backdoors in Visual Prompt Learning
Figure 4 for Prompt Backdoors in Visual Prompt Learning
Viaarxiv icon

Transferable Availability Poisoning Attacks

Add code
Bookmark button
Alert button
Oct 08, 2023
Yiyong Liu, Michael Backes, Xiao Zhang

Figure 1 for Transferable Availability Poisoning Attacks
Figure 2 for Transferable Availability Poisoning Attacks
Figure 3 for Transferable Availability Poisoning Attacks
Figure 4 for Transferable Availability Poisoning Attacks
Viaarxiv icon

Generating Less Certain Adversarial Examples Improves Robust Generalization

Add code
Bookmark button
Alert button
Oct 06, 2023
Minxing Zhang, Michael Backes, Xiao Zhang

Figure 1 for Generating Less Certain Adversarial Examples Improves Robust Generalization
Figure 2 for Generating Less Certain Adversarial Examples Improves Robust Generalization
Figure 3 for Generating Less Certain Adversarial Examples Improves Robust Generalization
Figure 4 for Generating Less Certain Adversarial Examples Improves Robust Generalization
Viaarxiv icon

"Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models

Add code
Bookmark button
Alert button
Aug 07, 2023
Xinyue Shen, Zeyuan Chen, Michael Backes, Yun Shen, Yang Zhang

Figure 1 for "Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models
Figure 2 for "Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models
Figure 3 for "Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models
Figure 4 for "Do Anything Now": Characterizing and Evaluating In-The-Wild Jailbreak Prompts on Large Language Models
Viaarxiv icon

Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing

Add code
Bookmark button
Alert button
Aug 07, 2023
Wai Man Si, Michael Backes, Yang Zhang

Figure 1 for Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing
Figure 2 for Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing
Figure 3 for Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing
Figure 4 for Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing
Viaarxiv icon

Generated Graph Detection

Add code
Bookmark button
Alert button
Jun 13, 2023
Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang

Figure 1 for Generated Graph Detection
Figure 2 for Generated Graph Detection
Figure 3 for Generated Graph Detection
Figure 4 for Generated Graph Detection
Viaarxiv icon

Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis

Add code
Bookmark button
Alert button
Jun 13, 2023
Yihan Ma, Zhengyu Zhao, Xinlei He, Zheng Li, Michael Backes, Yang Zhang

Figure 1 for Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Figure 2 for Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Figure 3 for Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Figure 4 for Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis
Viaarxiv icon