Alert button
Picture for Shangxi Wu

Shangxi Wu

Alert button

Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark

Add code
Bookmark button
Alert button
May 17, 2023
Wenjun Peng, Jingwei Yi, Fangzhao Wu, Shangxi Wu, Bin Zhu, Lingjuan Lyu, Binxing Jiao, Tong Xu, Guangzhong Sun, Xing Xie

Figure 1 for Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark
Figure 2 for Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark
Figure 3 for Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark
Figure 4 for Are You Copying My Model? Protecting the Copyright of Large Language Models for EaaS via Backdoor Watermark
Viaarxiv icon

Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias

Add code
Bookmark button
Alert button
Mar 01, 2023
Shangxi Wu, Qiuyang He, Fangzhao Wu, Jitao Sang, Yaowei Wang, Changsheng Xu

Figure 1 for Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias
Figure 2 for Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias
Figure 3 for Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias
Figure 4 for Backdoor for Debias: Mitigating Model Bias with Backdoor Attack-based Artificial Bias
Viaarxiv icon

Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias

Add code
Bookmark button
Alert button
Feb 18, 2022
Shangxi Wu, Qiuyang He, Yi Zhang, Jitao Sang

Figure 1 for Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias
Figure 2 for Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias
Figure 3 for Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias
Figure 4 for Debiasing Backdoor Attack: A Benign Application of Backdoor Attack in Eliminating Data Bias
Viaarxiv icon

An Experimental Study of Semantic Continuity for Deep Learning Models

Add code
Bookmark button
Alert button
Nov 19, 2020
Shangxi Wu, Jitao Sang, Xian Zhao, Lizhang Chen

Figure 1 for An Experimental Study of Semantic Continuity for Deep Learning Models
Figure 2 for An Experimental Study of Semantic Continuity for Deep Learning Models
Figure 3 for An Experimental Study of Semantic Continuity for Deep Learning Models
Figure 4 for An Experimental Study of Semantic Continuity for Deep Learning Models
Viaarxiv icon

Adaptive Adversarial Logits Pairing

Add code
Bookmark button
Alert button
May 25, 2020
Shangxi Wu, Jitao Sang, Kaiyuan Xu, Guanhua Zheng, Changsheng Xu

Figure 1 for Adaptive Adversarial Logits Pairing
Figure 2 for Adaptive Adversarial Logits Pairing
Figure 3 for Adaptive Adversarial Logits Pairing
Figure 4 for Adaptive Adversarial Logits Pairing
Viaarxiv icon

Butterfly detection and classification based on integrated YOLO algorithm

Add code
Bookmark button
Alert button
Jan 02, 2020
Bohan Liang, Shangxi Wu, Kaiyuan Xu, Jingyu Hao

Figure 1 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 2 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 3 for Butterfly detection and classification based on integrated YOLO algorithm
Figure 4 for Butterfly detection and classification based on integrated YOLO algorithm
Viaarxiv icon

blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness

Add code
Bookmark button
Alert button
Apr 22, 2019
Jiaming Zhang, Jitao Sang, Kaiyuan Xu, Shangxi Wu, Yongli Hu, Yanfeng Sun, Jian Yu

Figure 1 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 2 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 3 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Figure 4 for blessing in disguise: Designing Robust Turing Test by Employing Algorithm Unrobustness
Viaarxiv icon

Attention, Please! Adversarial Defense via Attention Rectification and Preservation

Add code
Bookmark button
Alert button
Nov 24, 2018
Shangxi Wu, Jitao Sang, Kaiyuan Xu, Jiaming Zhang, Yanfeng Sun, Liping Jing, Jian Yu

Figure 1 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 2 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 3 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Figure 4 for Attention, Please! Adversarial Defense via Attention Rectification and Preservation
Viaarxiv icon