no code implementations • 25 Mar 2024 • Weimin Lyu, Xiao Lin, Songzhu Zheng, Lu Pang, Haibin Ling, Susmit Jha, Chao Chen
Textual backdoor attacks pose significant security threats.
no code implementations • 23 Oct 2023 • Weimin Lyu, Songzhu Zheng, Lu Pang, Haibin Ling, Chao Chen
Recent studies have revealed that \textit{Backdoor Attacks} can threaten the safety of natural language processing (NLP) models.
1 code implementation • 27 Mar 2023 • Tao Sun, Lu Pang, Chao Chen, Haibin Ling
It detects possible triggers in the token space using image structural similarity and label consistency between the test image and MAE restorations.
1 code implementation • CVPR 2023 • Lu Pang, Tao Sun, Haibin Ling, Chao Chen
In experiments, we show that our method, trained without labels, is on-par with state-of-the-art defense methods trained using labels.
no code implementations • CVPR 2016 • Hongye Liu, Yonghong Tian, Yaowei Yang, Lu Pang, Tiejun Huang
To further facilitate the future research on this problem, we also present a carefully-organized large-scale image database "VehicleID", which includes multiple images of the same vehicle captured by different real-world cameras in a city.