Xiangyu Zhang
Purdue University
H-index: 64
North America-United States
Top articles of Xiangyu Zhang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Threat Behavior Textual Search by Attention Graph Isomorphism | Chanwoo Bae Guanhong Tao Zhuo Zhang Xiangyu Zhang | 2024/3 | |
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking | arXiv preprint arXiv:2402.11842 | Zian Su Xiangzhe Xu Ziyang Huang Zhuo Zhang Yapeng Ye | 2024/2/19 |
ODSCAN: Backdoor Scanning for Object Detection Models | Siyuan Cheng Guangyu Shen Guanhong Tao Kaiyuan Zhang Zhuo Zhang | 2024/2/1 | |
ParDiff: Practical Static Differential Analysis of Network Protocol Parsers | MINGWEI ZHENG QINGKAI SHI XUWEI LIU XIANGZHE XU LE YU | 2024 | |
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning | arXiv preprint arXiv:2403.17188 | Siyuan Cheng Guanhong Tao Yingqi Liu Guangyu Shen Shengwei An | 2024/3/25 |
FuzzInMem: Fuzzing Programs via In-memory Structures | Xuwei Liu Wei You Yapeng Ye Zhuo Zhang Jianjun Huang | 2024/3/6 | |
Pelican: Exploiting backdoors of naturally trained deep learning models in binary code analysis | Zhuo Zhang Guanhong Tao Guangyu Shen Shengwei An Qiuling Xu | 2023 | |
Adversarial training of self-supervised monocular depth estimation against physical-world attacks | Zhiyuan Cheng James Liang Guanhong Tao Dongfang Liu Xiangyu Zhang | 2023/1/31 | |
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes | Shengwei An Yuan Yao Qiuling Xu Shiqing Ma Guanhong Tao | 2023/5/21 | |
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP | arXiv preprint arXiv:2308.02122 | Lu Yan Zhuo Zhang Guanhong Tao Kaiyuan Zhang Xuan Chen | 2023/8/4 |
: Detoxing Deep Learning Dataset | Lu Yan Siyuan Cheng Guangyu Shen Guanhong Tao Xuan Chen | 2023/10/28 | |
Make Them Spill the Beans! Coercive Knowledge Extraction from (Production) LLMs | arXiv preprint arXiv:2312.04782 | Zhuo Zhang Guangyu Shen Guanhong Tao Siyuan Cheng Xiangyu Zhang | 2023/12/8 |
Hard-label black-box universal adversarial patch attack | Guanhong Tao Shengwei An Siyuan Cheng Guangyu Shen Xiangyu Zhang | 2023 | |
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense | arXiv preprint arXiv:2301.06241 | Siyuan Cheng Guanhong Tao Yingqi Liu Shengwei An Xiangzhe Xu | 2023/1/16 |
Extracting Protocol Format as State Machine via Controlled Static Loop Analysis | Qingkai Shi Xiangzhe Xu Xiangyu Zhang | 2023 | |
Distribution preserving backdoor attack in self-supervised learning | Guanhong Tao Zhenting Wang Shiwei Feng Guangyu Shen Shiqing Ma | 2023/10/17 | |
NodeRT: Detecting Races in Node. js Applications Practically | Jingyao Zhou Lei Xu Gongzheng Lu Weifeng Zhang Xiangyu Zhang | 2023/7/12 | |
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift | Proceedings of the AAAI Conference on Artificial Intelligence | Shengwei An Sheng-Yen Chou Kaiyuan Zhang Qiuling Xu Guanhong Tao | 2024/3/24 |
Detecting Backdoors in Pre-trained Encoders | Shiwei Feng Guanhong Tao Siyuan Cheng Guangyu Shen Xiangzhe Xu | 2023 | |
Your exploit is mine: Instantly synthesizing counterattack smart contract | Zhuo Zhang Zhiqiang Lin Marcelo Morales Xiangyu Zhang Kaiyuan Zhang | 2023 |