Picture for Shengjie Xu

Shengjie Xu

Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation

Add code
Dec 20, 2024
Figure 1 for Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation
Figure 2 for Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation
Figure 3 for Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation
Figure 4 for Watertox: The Art of Simplicity in Universal Attacks A Cross-Model Framework for Robust Adversarial Generation
Viaarxiv icon

Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code

Add code
Dec 03, 2024
Figure 1 for Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
Figure 2 for Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
Figure 3 for Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
Figure 4 for Impact of Data Snooping on Deep Learning Models for Locating Vulnerabilities in Lifted Code
Viaarxiv icon

Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code

Add code
Sep 26, 2024
Figure 1 for Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Figure 2 for Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Figure 3 for Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Figure 4 for Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
Viaarxiv icon

Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code

Add code
May 31, 2024
Figure 1 for Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
Figure 2 for Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
Figure 3 for Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
Figure 4 for Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code
Viaarxiv icon

The Study of Complex Human Locomotion Behaviors: From Crawling to Walking

Add code
Nov 12, 2022
Figure 1 for The Study of Complex Human Locomotion Behaviors: From Crawling to Walking
Figure 2 for The Study of Complex Human Locomotion Behaviors: From Crawling to Walking
Figure 3 for The Study of Complex Human Locomotion Behaviors: From Crawling to Walking
Figure 4 for The Study of Complex Human Locomotion Behaviors: From Crawling to Walking
Viaarxiv icon