Alert button
Picture for Siyue Wang

Siyue Wang

Alert button

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

Mar 02, 2024
Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li

Figure 1 for AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks
Figure 2 for AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks
Figure 3 for AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks
Figure 4 for AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks
Viaarxiv icon

Detection and Recovery Against Deep Neural Network Fault Injection Attacks Based on Contrastive Learning

Jan 30, 2024
Chenan Wang, Pu Zhao, Siyue Wang, Xue Lin

Viaarxiv icon

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage

Mar 27, 2023
Ruyi Ding, Cheng Gongye, Siyue Wang, Aidong Ding, Yunsi Fei

Figure 1 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 2 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 3 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 4 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Viaarxiv icon

MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge

Oct 26, 2021
Geng Yuan, Xiaolong Ma, Wei Niu, Zhengang Li, Zhenglun Kong, Ning Liu, Yifan Gong, Zheng Zhan, Chaoyang He, Qing Jin, Siyue Wang, Minghai Qin, Bin Ren, Yanzhi Wang, Sijia Liu, Xue Lin

Figure 1 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 2 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 3 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 4 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Viaarxiv icon

High-Robustness, Low-Transferability Fingerprinting of Neural Networks

May 14, 2021
Siyue Wang, Xiao Wang, Pin-Yu Chen, Pu Zhao, Xue Lin

Figure 1 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 2 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 3 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 4 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Viaarxiv icon

AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks

Feb 19, 2020
Xiao Wang, Siyue Wang, Pin-Yu Chen, Xue Lin, Peter Chin

Figure 1 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 2 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 3 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 4 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Viaarxiv icon

RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition

Feb 19, 2020
Peiyan Dong, Siyue Wang, Wei Niu, Chengming Zhang, Sheng Lin, Zhengang Li, Yifan Gong, Bin Ren, Xue Lin, Yanzhi Wang, Dingwen Tao

Figure 1 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 2 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 3 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 4 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Viaarxiv icon

Block Switching: A Stochastic Approach for Deep Learning Security

Feb 18, 2020
Xiao Wang, Siyue Wang, Pin-Yu Chen, Xue Lin, Peter Chin

Figure 1 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 2 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 3 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 4 for Block Switching: A Stochastic Approach for Deep Learning Security
Viaarxiv icon

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Feb 18, 2020
Pu Zhao, Pin-Yu Chen, Siyue Wang, Xue Lin

Figure 1 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 2 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 3 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 4 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Viaarxiv icon

Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses

Aug 20, 2019
Xiao Wang, Siyue Wang, Pin-Yu Chen, Yanzhi Wang, Brian Kulis, Xue Lin, Peter Chin

Figure 1 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 2 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 3 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Figure 4 for Protecting Neural Networks with Hierarchical Random Switching: Towards Better Robustness-Accuracy Trade-off for Stochastic Defenses
Viaarxiv icon