Zobrazeno 1 - 10
of 289
pro vyhledávání: '"Gao, Yansong"'
With the growing applications of Deep Learning (DL), especially recent spectacular achievements of Large Language Models (LLMs) such as ChatGPT and LLaMA, the commercial significance of these remarkable models has soared. However, acquiring well-trai
Externí odkaz:
http://arxiv.org/abs/2411.05051
Autor:
Liu, Shigang, Sabir, Bushra, Jang, Seung Ick, Kansal, Yuval, Gao, Yansong, Moore, Kristen, Abuadbba, Alsharif, Nepal, Surya
Large Language Models (LLMs) have shown remarkable potential in code generation, making them increasingly important in the field. However, the security issues of generated code have not been fully addressed, and the usability of LLMs in code generati
Externí odkaz:
http://arxiv.org/abs/2410.14321
Radio frequency fingerprint identification (RFFI) is becoming increasingly popular, especially in applications with constrained power, such as the Internet of Things (IoT). Due to subtle manufacturing variations, wireless devices have unique radio fr
Externí odkaz:
http://arxiv.org/abs/2410.07591
Autor:
Abuadbba, Alsharif, Rhodes, Nicholas, Moore, Kristen, Sabir, Bushra, Wang, Shuo, Gao, Yansong
Deep learning solutions in critical domains like autonomous vehicles, facial recognition, and sentiment analysis require caution due to the severe consequences of errors. Research shows these models are vulnerable to adversarial attacks, such as data
Externí odkaz:
http://arxiv.org/abs/2407.01260
Autor:
Zhai, Shengfang, Chen, Huanran, Dong, Yinpeng, Li, Jiajun, Shen, Qingni, Gao, Yansong, Su, Hang, Liu, Yang
Text-to-image diffusion models have achieved tremendous success in the field of controllable image generation, while also coming along with issues of privacy leakage and data copyrights. Membership inference arises in these contexts as a potential au
Externí odkaz:
http://arxiv.org/abs/2405.14800
Personal digital data is a critical asset, and governments worldwide have enforced laws and regulations to protect data privacy. Data users have been endowed with the right to be forgotten of their data. In the course of machine learning (ML), the fo
Externí odkaz:
http://arxiv.org/abs/2403.08254
The proliferation of cloud computing has greatly spurred the popularity of outsourced database storage and management, in which the cloud holding outsourced databases can process database queries on demand. Among others, skyline queries play an impor
Externí odkaz:
http://arxiv.org/abs/2310.07148
Autor:
Ma, Hua, Wang, Shang, Gao, Yansong, Zhang, Zhi, Qiu, Huming, Xue, Minhui, Abuadbba, Alsharif, Fu, Anmin, Nepal, Surya, Abbott, Derek
All current backdoor attacks on deep learning (DL) models fall under the category of a vertical class backdoor (VCB) -- class-dependent. In VCB attacks, any sample from a class activates the implanted backdoor when the secret trigger is present. Exis
Externí odkaz:
http://arxiv.org/abs/2310.00542
Autor:
Gao, Yansong, Qiu, Huming, Zhang, Zhi, Wang, Binghui, Ma, Hua, Abuadbba, Alsharif, Xue, Minhui, Fu, Anmin, Nepal, Surya
Deep Neural Network (DNN) models are often deployed in resource-sharing clouds as Machine Learning as a Service (MLaaS) to provide inference services.To steal model architectures that are of valuable intellectual properties, a class of attacks has be
Externí odkaz:
http://arxiv.org/abs/2309.11894
Autor:
Wang, Guohong, Ma, Hua, Gao, Yansong, Abuadbba, Alsharif, Zhang, Zhi, Kang, Wei, Al-Sarawib, Said F., Zhang, Gongxuan, Abbott, Derek
Image camouflage has been utilized to create clean-label poisoned images for implanting backdoor into a DL model. But there exists a crucial limitation that one attack/poisoned image can only fit a single input size of the DL model, which greatly inc
Externí odkaz:
http://arxiv.org/abs/2309.04036