Alert button
Picture for Shiqing Ma

Shiqing Ma

Alert button

LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

Add code
Bookmark button
Alert button
Mar 25, 2024
Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang

Figure 1 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 2 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 3 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 4 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Viaarxiv icon

SoK: Challenges and Opportunities in Federated Unlearning

Add code
Bookmark button
Alert button
Mar 04, 2024
Hyejun Jeong, Shiqing Ma, Amir Houmansadr

Figure 1 for SoK: Challenges and Opportunities in Federated Unlearning
Figure 2 for SoK: Challenges and Opportunities in Federated Unlearning
Figure 3 for SoK: Challenges and Opportunities in Federated Unlearning
Figure 4 for SoK: Challenges and Opportunities in Federated Unlearning
Viaarxiv icon

Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia

Add code
Bookmark button
Alert button
Feb 08, 2024
Guangyu Shen, Siyuan Cheng, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Lu Yan, Zhuo Zhang, Shiqing Ma, Xiangyu Zhang

Viaarxiv icon

DREAM: Debugging and Repairing AutoML Pipelines

Add code
Bookmark button
Alert button
Dec 31, 2023
Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen

Viaarxiv icon

Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift

Add code
Bookmark button
Alert button
Nov 27, 2023
Shengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang

Viaarxiv icon

How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models

Add code
Bookmark button
Alert button
Jul 06, 2023
Zhenting Wang, Chen Chen, Yuchen Liu, Lingjuan Lyu, Dimitris Metaxas, Shiqing Ma

Figure 1 for How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models
Figure 2 for How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models
Figure 3 for How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models
Figure 4 for How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models
Viaarxiv icon

Alteration-free and Model-agnostic Origin Attribution of Generated Images

Add code
Bookmark button
Alert button
May 29, 2023
Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma

Figure 1 for Alteration-free and Model-agnostic Origin Attribution of Generated Images
Figure 2 for Alteration-free and Model-agnostic Origin Attribution of Generated Images
Figure 3 for Alteration-free and Model-agnostic Origin Attribution of Generated Images
Figure 4 for Alteration-free and Model-agnostic Origin Attribution of Generated Images
Viaarxiv icon

NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models

Add code
Bookmark button
Alert button
May 28, 2023
Kai Mei, Zheng Li, Zhenting Wang, Yang Zhang, Shiqing Ma

Figure 1 for NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
Figure 2 for NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
Figure 3 for NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
Figure 4 for NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
Viaarxiv icon

CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement

Add code
Bookmark button
Alert button
Apr 09, 2023
Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang

Figure 1 for CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Figure 2 for CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Figure 3 for CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Figure 4 for CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Viaarxiv icon

UNICORN: A Unified Backdoor Trigger Inversion Framework

Add code
Bookmark button
Alert button
Apr 05, 2023
Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma

Figure 1 for UNICORN: A Unified Backdoor Trigger Inversion Framework
Figure 2 for UNICORN: A Unified Backdoor Trigger Inversion Framework
Figure 3 for UNICORN: A Unified Backdoor Trigger Inversion Framework
Figure 4 for UNICORN: A Unified Backdoor Trigger Inversion Framework
Viaarxiv icon