Alert button
Picture for Xinyu Xing

Xinyu Xing

Alert button

Assessing Prompt Injection Risks in 200+ Custom GPTs

Add code
Bookmark button
Alert button
Nov 20, 2023
Jiahao Yu, Yuhang Wu, Dong Shu, Mingyu Jin, Xinyu Xing

Viaarxiv icon

GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts

Add code
Bookmark button
Alert button
Sep 19, 2023
Jiahao Yu, Xingwei Lin, Xinyu Xing

Figure 1 for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts
Figure 2 for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts
Figure 3 for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts
Figure 4 for GPTFUZZER : Red Teaming Large Language Models with Auto-Generated Jailbreak Prompts
Viaarxiv icon

BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning

Add code
Bookmark button
Alert button
May 07, 2021
Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, Dawn Song

Figure 1 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 2 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 3 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Figure 4 for BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
Viaarxiv icon

Robust saliency maps with decoy-enhanced saliency score

Add code
Bookmark button
Alert button
Feb 03, 2020
Yang Lu, Wenbo Guo, Xinyu Xing, William Stafford Noble

Figure 1 for Robust saliency maps with decoy-enhanced saliency score
Figure 2 for Robust saliency maps with decoy-enhanced saliency score
Figure 3 for Robust saliency maps with decoy-enhanced saliency score
Figure 4 for Robust saliency maps with decoy-enhanced saliency score
Viaarxiv icon

TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems

Add code
Bookmark button
Alert button
Aug 08, 2019
Wenbo Guo, Lun Wang, Xinyu Xing, Min Du, Dawn Song

Figure 1 for TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Figure 2 for TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Figure 3 for TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Figure 4 for TABOR: A Highly Accurate Approach to Inspecting and Restoring Trojan Backdoors in AI Systems
Viaarxiv icon

Explaining Deep Learning Models - A Bayesian Non-parametric Approach

Add code
Bookmark button
Alert button
Nov 07, 2018
Wenbo Guo, Sui Huang, Yunzhe Tao, Xinyu Xing, Lin Lin

Figure 1 for Explaining Deep Learning Models - A Bayesian Non-parametric Approach
Figure 2 for Explaining Deep Learning Models - A Bayesian Non-parametric Approach
Figure 3 for Explaining Deep Learning Models - A Bayesian Non-parametric Approach
Figure 4 for Explaining Deep Learning Models - A Bayesian Non-parametric Approach
Viaarxiv icon

A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity

Add code
Bookmark button
Alert button
Jan 16, 2018
Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles

Figure 1 for A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity
Figure 2 for A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity
Figure 3 for A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity
Figure 4 for A Comparison of Rule Extraction for Different Recurrent Neural Network Models and Grammatical Complexity
Viaarxiv icon

An Empirical Evaluation of Rule Extraction from Recurrent Neural Networks

Add code
Bookmark button
Alert button
Nov 28, 2017
Qinglong Wang, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles

Viaarxiv icon

Learning Adversary-Resistant Deep Neural Networks

Add code
Bookmark button
Alert button
Aug 19, 2017
Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee Giles

Figure 1 for Learning Adversary-Resistant Deep Neural Networks
Figure 2 for Learning Adversary-Resistant Deep Neural Networks
Figure 3 for Learning Adversary-Resistant Deep Neural Networks
Figure 4 for Learning Adversary-Resistant Deep Neural Networks
Viaarxiv icon