Alert button
Picture for Qinglong Wang

Qinglong Wang

Alert button

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution

Add code
Bookmark button
Alert button
Sep 25, 2023
Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren

Figure 1 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 2 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 3 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 4 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Viaarxiv icon

Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata

Add code
Bookmark button
Alert button
Nov 12, 2019
Qinglong Wang, Kaixuan Zhang, Xue Liu, C. Lee Giles

Figure 1 for Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata
Figure 2 for Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata
Figure 3 for Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata
Figure 4 for Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata
Viaarxiv icon

Shapley Homology: Topological Analysis of Sample Influence for Neural Networks

Add code
Bookmark button
Alert button
Oct 15, 2019
Kaixuan Zhang, Qinglong Wang, Xue Liu, C. Lee Giles

Figure 1 for Shapley Homology: Topological Analysis of Sample Influence for Neural Networks
Figure 2 for Shapley Homology: Topological Analysis of Sample Influence for Neural Networks
Figure 3 for Shapley Homology: Topological Analysis of Sample Influence for Neural Networks
Figure 4 for Shapley Homology: Topological Analysis of Sample Influence for Neural Networks
Viaarxiv icon

Verification of Recurrent Neural Networks Through Rule Extraction

Add code
Bookmark button
Alert button
Nov 14, 2018
Qinglong Wang, Kaixuan Zhang, Xue Liu, C. Lee Giles

Figure 1 for Verification of Recurrent Neural Networks Through Rule Extraction
Figure 2 for Verification of Recurrent Neural Networks Through Rule Extraction
Figure 3 for Verification of Recurrent Neural Networks Through Rule Extraction
Figure 4 for Verification of Recurrent Neural Networks Through Rule Extraction
Viaarxiv icon

Energy Spatio-Temporal Pattern Prediction for Electric Vehicle Networks

Add code
Bookmark button
Alert button
Feb 14, 2018
Qinglong Wang

Figure 1 for Energy Spatio-Temporal Pattern Prediction for Electric Vehicle Networks
Figure 2 for Energy Spatio-Temporal Pattern Prediction for Electric Vehicle Networks
Figure 3 for Energy Spatio-Temporal Pattern Prediction for Electric Vehicle Networks
Figure 4 for Energy Spatio-Temporal Pattern Prediction for Electric Vehicle Networks
Viaarxiv icon

A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity

Add code
Bookmark button
Alert button
Jan 16, 2018
Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles

Figure 1 for A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity
Figure 2 for A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity
Figure 3 for A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity
Figure 4 for A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity
Viaarxiv icon

An Empirical Evaluation of Rule Extraction from Recurrent Neural Networks

Add code
Bookmark button
Alert button
Nov 28, 2017
Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles

Viaarxiv icon

Learning Adversary-Resistant Deep Neural Networks

Add code
Bookmark button
Alert button
Aug 19, 2017
Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles

Figure 1 for Learning Adversary-Resistant Deep Neural Networks
Figure 2 for Learning Adversary-Resistant Deep Neural Networks
Figure 3 for Learning Adversary-Resistant Deep Neural Networks
Figure 4 for Learning Adversary-Resistant Deep Neural Networks
Viaarxiv icon

Adversary Resistant Deep Neural Networks with an Application to Malware Detection

Add code
Bookmark button
Alert button
Apr 27, 2017
Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, C. Lee Giles, Xue Liu

Figure 1 for Adversary Resistant Deep Neural Networks with an Application to Malware Detection
Figure 2 for Adversary Resistant Deep Neural Networks with an Application to Malware Detection
Figure 3 for Adversary Resistant Deep Neural Networks with an Application to Malware Detection
Figure 4 for Adversary Resistant Deep Neural Networks with an Application to Malware Detection
Viaarxiv icon

Using Non-invertible Data Transformations to Build Adversarial-Robust Neural Networks

Add code
Bookmark button
Alert button
Dec 13, 2016
Qinglong Wang, Wenbo Guo, Alexander G. Ororbia II, Xinyu Xing, Lin Lin, C. Lee Giles, Xue Liu, Peng Liu, Gang Xiong

Figure 1 for Using Non-invertible Data Transformations to Build Adversarial-Robust Neural Networks
Figure 2 for Using Non-invertible Data Transformations to Build Adversarial-Robust Neural Networks
Figure 3 for Using Non-invertible Data Transformations to Build Adversarial-Robust Neural Networks
Figure 4 for Using Non-invertible Data Transformations to Build Adversarial-Robust Neural Networks
Viaarxiv icon