Picture for Shouling Ji

Shouling Ji

All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning

Add code
Dec 01, 2022
Viaarxiv icon

Hijack Vertical Federated Learning Models with Adversarial Embedding

Add code
Dec 01, 2022
Viaarxiv icon

Demystifying Self-supervised Trojan Attacks

Add code
Oct 13, 2022
Figure 1 for Demystifying Self-supervised Trojan Attacks
Figure 2 for Demystifying Self-supervised Trojan Attacks
Figure 3 for Demystifying Self-supervised Trojan Attacks
Figure 4 for Demystifying Self-supervised Trojan Attacks
Viaarxiv icon

Reasoning over Multi-view Knowledge Graphs

Add code
Sep 27, 2022
Figure 1 for Reasoning over Multi-view Knowledge Graphs
Figure 2 for Reasoning over Multi-view Knowledge Graphs
Figure 3 for Reasoning over Multi-view Knowledge Graphs
Figure 4 for Reasoning over Multi-view Knowledge Graphs
Viaarxiv icon

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution

Add code
Sep 05, 2022
Figure 1 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 2 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 3 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 4 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Viaarxiv icon

VeriFi: Towards Verifiable Federated Unlearning

Add code
May 25, 2022
Figure 1 for VeriFi: Towards Verifiable Federated Unlearning
Figure 2 for VeriFi: Towards Verifiable Federated Unlearning
Figure 3 for VeriFi: Towards Verifiable Federated Unlearning
Figure 4 for VeriFi: Towards Verifiable Federated Unlearning
Viaarxiv icon

Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning

Add code
May 21, 2022
Figure 1 for Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning
Figure 2 for Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning
Figure 3 for Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning
Figure 4 for Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning
Viaarxiv icon

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings

Add code
Apr 07, 2022
Figure 1 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 2 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 3 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 4 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Viaarxiv icon

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It

Add code
Mar 13, 2022
Figure 1 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 2 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 3 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 4 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Viaarxiv icon

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

Add code
Feb 22, 2022
Figure 1 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 2 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 3 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 4 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Viaarxiv icon