关注
Kaiyuan Zhang
Kaiyuan Zhang
Computer Science, Purdue University
在 purdue.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Flip: A provable defense framework for backdoor mitigation in federated learning
K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ...
ICLR 2023 (Best Paper Award at ECCV 2022 AROW Workshop), 2022
322022
DRGraph: An efficient graph layout algorithm for large-scale graphs by dimensionality reduction
M Zhu, W Chen, Y Hu, Y Hou, L Liu, K Zhang
IEEE Transactions on Visualization and Computer Graphics 27 (2), 1666-1676, 2020
312020
Detecting backdoors in pre-trained encoders
S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
262023
Enhancing statistical charts: toward better data visualization and analysis
X Luo, Y Yuan, K Zhang, J Xia, Z Zhou, L Chang, T Gu
Journal of Visualization 22, 819-832, 2019
142019
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ...
30th Annual Network And Distributed System Security Symposium (NDSS 2023), 2023
82023
Your exploit is mine: Instantly synthesizing counterattack smart contract
Z Zhang, Z Lin, M Morales, X Zhang, K Zhang
32nd USENIX Security Symposium (USENIX Security 23), 1757-1774, 2023
62023
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift
S An, SY Chou, K Zhang, Q Xu, G Tao, G Shen, S Cheng, S Ma, PY Chen, ...
AAAI 2024, 2023
42023
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP
L Yan, Z Zhang, G Tao, K Zhang, X Chen, G Shen, X Zhang
NeurIPS 2023, 2023
42023
Django: Detecting trojans in object detection models via gaussian focus calibration
G Shen, S Cheng, G Tao, K Zhang, Y Liu, S An, S Ma, X Zhang
Advances in Neural Information Processing Systems 36, 2024
22024
Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia
G Shen, S Cheng, K Zhang, G Tao, S An, L Yan, Z Zhang, S Ma, X Zhang
arXiv preprint arXiv:2402.05467, 2024
22024
: Detoxing Deep Learning Dataset
L Yan, S Cheng, G Shen, G Tao, X Chen, K Zhang, Y Mao, X Zhang
NeurIPS 2023 Workshop on Backdoors in Deep Learning-The Good, the Bad, and …, 2023
22023
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
S Cheng, G Tao, Y Liu, G Shen, S An, S Feng, X Xu, K Zhang, S Ma, ...
CVPR 2024, 2024
12024
How to remove backdoors in diffusion models?
S An, SY Chou, K Zhang, Q Xu, G Tao, G Shen, S Cheng, S Ma, PY Chen, ...
NeurIPS 2023 Workshop on Backdoors in Deep Learning-The Good, the Bad, and …, 2023
12023
Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases
Z Su, X Xu, Z Huang, K Zhang, X Zhang
arXiv preprint arXiv:2405.19581, 2024
2024
Exploring the Orthogonality and Linearity of Backdoor Attacks
K Zhang, S Cheng, G Shen, G Tao, S An, A Makur, S Ma, X Zhang
2024 IEEE Symposium on Security and Privacy (SP), 225-225, 2024
2024
ODSCAN: Backdoor Scanning for Object Detection Models
S Cheng, G Shen, G Tao, K Zhang, Z Zhang, S An, X Xu, Y Liu, S Ma, ...
2024 IEEE Symposium on Security and Privacy (SP), 119-119, 2024
2024
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes
S An, Y Yao, Q Xu, S Ma, G Tao, S Cheng, K Zhang, Y Liu, G Shen, I Kelk, ...
2023 IEEE Symposium on Security and Privacy (SP), 899-916, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–17