Picture for Shouling Ji

Shouling Ji

How ChatGPT is Solving Vulnerability Management Problem

Add code
Nov 11, 2023
Figure 1 for How ChatGPT is Solving Vulnerability Management Problem
Figure 2 for How ChatGPT is Solving Vulnerability Management Problem
Figure 3 for How ChatGPT is Solving Vulnerability Management Problem
Figure 4 for How ChatGPT is Solving Vulnerability Management Problem
Viaarxiv icon

Facial Data Minimization: Shallow Model as Your Privacy Filter

Add code
Oct 24, 2023
Figure 1 for Facial Data Minimization: Shallow Model as Your Privacy Filter
Figure 2 for Facial Data Minimization: Shallow Model as Your Privacy Filter
Figure 3 for Facial Data Minimization: Shallow Model as Your Privacy Filter
Figure 4 for Facial Data Minimization: Shallow Model as Your Privacy Filter
Viaarxiv icon

CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code

Add code
Oct 24, 2023
Viaarxiv icon

F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns

Add code
Oct 23, 2023
Figure 1 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 2 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 3 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 4 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Viaarxiv icon

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks

Add code
Sep 23, 2023
Figure 1 for Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Figure 2 for Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Figure 3 for Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Figure 4 for Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Viaarxiv icon

Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting

Add code
Sep 06, 2023
Viaarxiv icon

ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning

Add code
Sep 06, 2023
Figure 1 for ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
Figure 2 for ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
Figure 3 for ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
Figure 4 for ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning
Viaarxiv icon

Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization

Add code
May 18, 2023
Figure 1 for Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization
Figure 2 for Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization
Figure 3 for Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization
Figure 4 for Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization
Viaarxiv icon

On the Security Risks of Knowledge Graph Reasoning

Add code
May 03, 2023
Figure 1 for On the Security Risks of Knowledge Graph Reasoning
Figure 2 for On the Security Risks of Knowledge Graph Reasoning
Figure 3 for On the Security Risks of Knowledge Graph Reasoning
Figure 4 for On the Security Risks of Knowledge Graph Reasoning
Viaarxiv icon

Deep Intellectual Property: A Survey

Add code
Apr 28, 2023
Viaarxiv icon