Alert button
Picture for Yuwen Pu

Yuwen Pu

Alert button

SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems

Add code
Bookmark button
Alert button
Feb 06, 2024
Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, Shouling Ji

Viaarxiv icon

The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness

Add code
Bookmark button
Alert button
Jan 25, 2024
Mengyao Du, Miao Zhang, Yuwen Pu, Kai Xu, Shouling Ji, Quanjun Yin

Viaarxiv icon

MEAOD: Model Extraction Attack against Object Detectors

Add code
Bookmark button
Alert button
Dec 22, 2023
Zeyu Li, Chenghui Shi, Yuwen Pu, Xuhong Zhang, Yu Li, Jinbao Li, Shouling Ji

Viaarxiv icon

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention

Add code
Bookmark button
Alert button
Nov 30, 2023
Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang

Viaarxiv icon

Facial Data Minimization: Shallow Model as Your Privacy Filter

Add code
Bookmark button
Alert button
Oct 24, 2023
Yuwen Pu, Jiahao Chen, Jiayu Pan, Hao li, Diqun Yan, Xuhong Zhang, Shouling Ji

Viaarxiv icon

TextDefense: Adversarial Text Detection based on Word Importance Entropy

Add code
Bookmark button
Alert button
Feb 12, 2023
Lujia Shen, Xuhong Zhang, Shouling Ji, Yuwen Pu, Chunpeng Ge, Xing Yang, Yanghe Feng

Figure 1 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 2 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 3 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Figure 4 for TextDefense: Adversarial Text Detection based on Word Importance Entropy
Viaarxiv icon

All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning

Add code
Bookmark button
Alert button
Dec 01, 2022
Pengyu Qiu, Xuhong Zhang, Shouling Ji, Yuwen Pu, Ting Wang

Figure 1 for All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Figure 2 for All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Figure 3 for All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Figure 4 for All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
Viaarxiv icon

Hijack Vertical Federated Learning Models with Adversarial Embedding

Add code
Bookmark button
Alert button
Dec 01, 2022
Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang

Figure 1 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 2 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 3 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Figure 4 for Hijack Vertical Federated Learning Models with Adversarial Embedding
Viaarxiv icon

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution

Add code
Bookmark button
Alert button
Sep 05, 2022
Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang

Figure 1 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 2 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 3 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Figure 4 for "Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution
Viaarxiv icon