Picture for Xinyu Xing

Xinyu Xing

Soft-Label Integration for Robust Toxicity Classification

Add code
Oct 18, 2024
Viaarxiv icon

UTF:Undertrained Tokens as Fingerprints A Novel Approach to LLM Identification

Add code
Oct 16, 2024
Viaarxiv icon

BlockFound: Customized blockchain foundation model for anomaly detection

Add code
Oct 14, 2024
Viaarxiv icon

Enhancing Jailbreak Attack Against Large Language Models through Silent Tokens

Add code
May 31, 2024
Viaarxiv icon

RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation

Add code
May 05, 2024
Viaarxiv icon

Assessing Prompt Injection Risks in 200+ Custom GPTs

Add code
Nov 20, 2023
Viaarxiv icon

GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts

Add code
Sep 19, 2023
Viaarxiv icon

BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning

Add code
May 07, 2021
Figure 1 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 2 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 3 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 4 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Viaarxiv icon

Robust saliency maps with decoy-enhanced saliency score

Add code
Feb 03, 2020
Figure 1 for Robust saliency maps with decoy-enhanced saliency score
Figure 2 for Robust saliency maps with decoy-enhanced saliency score
Figure 3 for Robust saliency maps with decoy-enhanced saliency score
Figure 4 for Robust saliency maps with decoy-enhanced saliency score
Viaarxiv icon

TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems

Add code
Aug 08, 2019
Figure 1 for TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Figure 2 for TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Figure 3 for TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Figure 4 for TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Viaarxiv icon