no code implementations • 18 May 2024 • Biao Yi, Sishuo Chen, Yiming Li, Tong Li, Baolei Zhang, Zheli Liu
Backdoor attacks pose an increasingly severe security threat to Deep Neural Networks (DNNs) during their development stage.
no code implementations • 8 Mar 2022 • Tianyu Yang, Hanzhou Wu, Biao Yi, Guorui Feng, Xinpeng Zhang
In this paper, we propose a novel LS method to modify a given text by pivoting it between two different languages and embed secret data by applying a GLS-like information encoding strategy.
no code implementations • 26 Jul 2021 • Biao Yi, Hanzhou Wu, Guorui Feng, Xinpeng Zhang
Such kind of difference can be naturally captured by the language model used for generating stego texts.