Alert button
Picture for Zhaohan Xi

Zhaohan Xi

Alert button

On the Difficulty of Defending Contrastive Learning against Backdoor Attacks

Add code
Bookmark button
Alert button
Dec 14, 2023
Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang

Viaarxiv icon

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks

Add code
Bookmark button
Alert button
Sep 23, 2023
Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang

Figure 1 for Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Figure 2 for Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Figure 3 for Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Figure 4 for Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Viaarxiv icon

On the Security Risks of Knowledge Graph Reasoning

Add code
Bookmark button
Alert button
May 03, 2023
Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang

Figure 1 for On the Security Risks of Knowledge Graph Reasoning
Figure 2 for On the Security Risks of Knowledge Graph Reasoning
Figure 3 for On the Security Risks of Knowledge Graph Reasoning
Figure 4 for On the Security Risks of Knowledge Graph Reasoning
Viaarxiv icon

Demystifying Self-supervised Trojan Attacks

Add code
Bookmark button
Alert button
Oct 13, 2022
Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang

Figure 1 for Demystifying Self-supervised Trojan Attacks
Figure 2 for Demystifying Self-supervised Trojan Attacks
Figure 3 for Demystifying Self-supervised Trojan Attacks
Figure 4 for Demystifying Self-supervised Trojan Attacks
Viaarxiv icon

Reasoning over Multi-view Knowledge Graphs

Add code
Bookmark button
Alert button
Sep 27, 2022
Zhaohan Xi, Ren Pang, Changjiang Li, Tianyu Du, Shouling Ji, Fenglong Ma, Ting Wang

Figure 1 for Reasoning over Multi-view Knowledge Graphs
Figure 2 for Reasoning over Multi-view Knowledge Graphs
Figure 3 for Reasoning over Multi-view Knowledge Graphs
Figure 4 for Reasoning over Multi-view Knowledge Graphs
Viaarxiv icon

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

Add code
Bookmark button
Alert button
Feb 22, 2022
Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang

Figure 1 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 2 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 3 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 4 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Viaarxiv icon

On the Security Risks of AutoML

Add code
Bookmark button
Alert button
Oct 12, 2021
Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang

Figure 1 for On the Security Risks of AutoML
Figure 2 for On the Security Risks of AutoML
Figure 3 for On the Security Risks of AutoML
Figure 4 for On the Security Risks of AutoML
Viaarxiv icon

TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask)

Add code
Bookmark button
Alert button
Dec 22, 2020
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Ting Wang

Figure 1 for TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask)
Figure 2 for TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask)
Figure 3 for TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask)
Figure 4 for TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask)
Viaarxiv icon

Graph Backdoor

Add code
Bookmark button
Alert button
Jun 23, 2020
Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang

Figure 1 for Graph Backdoor
Figure 2 for Graph Backdoor
Figure 3 for Graph Backdoor
Figure 4 for Graph Backdoor
Viaarxiv icon