Alert button
Picture for Zeyang Sha

Zeyang Sha

Alert button

Prompt Stealing Attacks Against Large Language Models

Add code
Bookmark button
Alert button
Feb 20, 2024
Zeyang Sha, Yang Zhang

Viaarxiv icon

Conversation Reconstruction Attack Against GPT Models

Add code
Bookmark button
Alert button
Feb 05, 2024
Junjie Chu, Zeyang Sha, Michael Backes, Yang Zhang

Viaarxiv icon

From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need

Add code
Bookmark button
Alert button
Mar 09, 2023
Ziqing Yang, Zeyang Sha, Michael Backes, Yang Zhang

Figure 1 for From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need
Figure 2 for From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need
Figure 3 for From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need
Figure 4 for From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need
Viaarxiv icon

Fine-Tuning Is All You Need to Mitigate Backdoor Attacks

Add code
Bookmark button
Alert button
Dec 18, 2022
Zeyang Sha, Xinlei He, Pascal Berrang, Mathias Humbert, Yang Zhang

Figure 1 for Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Figure 2 for Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Figure 3 for Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Figure 4 for Fine-Tuning Is All You Need to Mitigate Backdoor Attacks
Viaarxiv icon

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models

Add code
Bookmark button
Alert button
Oct 13, 2022
Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang

Figure 1 for DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Figure 2 for DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Figure 3 for DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Figure 4 for DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Viaarxiv icon

Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders

Add code
Bookmark button
Alert button
Jan 19, 2022
Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang

Figure 1 for Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Figure 2 for Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Figure 3 for Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Figure 4 for Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Viaarxiv icon