Alert button
Picture for Sizhe Chen

Sizhe Chen

Alert button

Jatmo: Prompt Injection Defense by Task-Specific Finetuning

Add code
Bookmark button
Alert button
Jan 08, 2024
Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David Wagner

Viaarxiv icon

Can LLMs Follow Simple Rules?

Add code
Bookmark button
Alert button
Nov 06, 2023
Norman Mu, Sarah Chen, Zifan Wang, Sizhe Chen, David Karamardian, Lulwa Aljeraisy, Dan Hendrycks, David Wagner

Viaarxiv icon

Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective

Add code
Bookmark button
Alert button
Feb 23, 2023
Zhengbao He, Tao Li, Sizhe Chen, Xiaolin Huang

Figure 1 for Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective
Figure 2 for Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective
Figure 3 for Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective
Figure 4 for Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective
Viaarxiv icon

Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors

Add code
Bookmark button
Alert button
Nov 22, 2022
Sizhe Chen, Geng Yuan, Xinwen Cheng, Yifan Gong, Minghai Qin, Yanzhi Wang, Xiaolin Huang

Figure 1 for Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors
Figure 2 for Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors
Figure 3 for Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors
Figure 4 for Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors
Viaarxiv icon

Unifying Gradients to Improve Real-world Robustness for Deep Networks

Add code
Bookmark button
Alert button
Aug 12, 2022
Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang

Figure 1 for Unifying Gradients to Improve Real-world Robustness for Deep Networks
Figure 2 for Unifying Gradients to Improve Real-world Robustness for Deep Networks
Figure 3 for Unifying Gradients to Improve Real-world Robustness for Deep Networks
Figure 4 for Unifying Gradients to Improve Real-world Robustness for Deep Networks
Viaarxiv icon

One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks

Add code
Bookmark button
Alert button
May 24, 2022
Shutong Wu, Sizhe Chen, Cihang Xie, Xiaolin Huang

Figure 1 for One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
Figure 2 for One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
Figure 3 for One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
Figure 4 for One-Pixel Shortcut: on the Learning Preference of Deep Neural Networks
Viaarxiv icon

Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks

Add code
Bookmark button
Alert button
May 24, 2022
Sizhe Chen, Zhehao Huang, Qinghua Tao, Yingwen Wu, Cihang Xie, Xiaolin Huang

Figure 1 for Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Figure 2 for Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Figure 3 for Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Figure 4 for Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks
Viaarxiv icon

Subspace Adversarial Training

Add code
Bookmark button
Alert button
Nov 24, 2021
Tao Li, Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang

Figure 1 for Subspace Adversarial Training
Figure 2 for Subspace Adversarial Training
Figure 3 for Subspace Adversarial Training
Figure 4 for Subspace Adversarial Training
Viaarxiv icon

Dominant Patterns: Critical Features Hidden in Deep Neural Networks

Add code
Bookmark button
Alert button
May 31, 2021
Zhixing Ye, Shaofei Qin, Sizhe Chen, Xiaolin Huang

Figure 1 for Dominant Patterns: Critical Features Hidden in Deep Neural Networks
Figure 2 for Dominant Patterns: Critical Features Hidden in Deep Neural Networks
Figure 3 for Dominant Patterns: Critical Features Hidden in Deep Neural Networks
Figure 4 for Dominant Patterns: Critical Features Hidden in Deep Neural Networks
Viaarxiv icon