no code implementations • 22 Aug 2023 • Zhenzhe Gao, Zhaoxia Yin, Hongjian Zhan, Heng Yin, Yue Lu
Fragile watermarking is a technique used to identify tampering in AI models.
1 code implementation • 4 Aug 2023 • Jiawei Chen, Xiao Yang, Heng Yin, Mingzhi Ma, Bihui Chen, Jianteng Peng, Yandong Guo, Zhaoxia Yin, Hang Su
Ensuring the reliability of face recognition systems against presentation attacks necessitates the deployment of face anti-spoofing techniques.
no code implementations • 11 Jun 2023 • Jie Hu, Qian Zhang, Heng Yin
Large language models (LLM) pre-trained with an enormous amount of natural language corpus have proved to be effective for understanding the implicit format syntax and generating format-conforming inputs.
no code implementations • 13 May 2023 • Zhaoxia Yin, Heng Yin, Hang Su, Xinpeng Zhang, Zhenzhe Gao
Our method has some advantages: (1) the iterative update of samples is done in a decision-based black-box manner, relying solely on the predicted probability distribution of the target model, which reduces the risk of exposure to adversarial attacks, (2) the small-amplitude multiple iterations approach allows the fragile samples to perform well visually, with a PSNR of 55 dB in TinyImageNet compared to the original samples, (3) even with changes in the overall parameters of the model of magnitude 1e-4, the fragile samples can detect such changes, and (4) the method is independent of the specific model structure and dataset.
no code implementations • 23 Mar 2023 • Hanyao Huang, Ou Zheng, Dongdong Wang, Jiayi Yin, Zijin Wang, Shengxuan Ding, Heng Yin, Chuan Xu, Renjie Yang, Qian Zheng, Bing Shi
Overall, LLMs have the potential to revolutionize dental diagnosis and treatment, which indicates a promising avenue for clinical application and research in dentistry.
no code implementations • 16 Aug 2022 • Zhaoxia Yin, Heng Yin, Xinpeng Zhang
In the process of watermarking, we train a generative model with the specific loss function and secret key to generate triggers that are sensitive to the fine-tuning of the target classifier.
1 code implementation • 21 Jan 2021 • Xuezixiang Li, Qu Yu, Heng Yin
Deep learning has demonstrated its strengths in numerous binary analysis tasks, including function boundary detection, binary code search, function prototype inference, value set analysis, etc.
no code implementations • 1 Dec 2020 • Heng Yin, Hengwei Zhang, Jindong Wang, Ruiyu Dou
However, the success rate of adversarial attacks can be further improved in black-box environments.
3 code implementations • 6 Mar 2020 • Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin
However, it is well-known that machine learning models are vulnerable to adversarial examples (AEs).
Cryptography and Security
1 code implementation • 22 Aug 2017 • Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song, Dawn Song
The problem of cross-platform binary code similarity detection aims at detecting whether two binary functions coming from different platforms are similar or not.