Your code secret belongs to me: neural code completion tools can memorize hard-coded credentials

Y Huang, Y Li, W Wu, J Zhang, MR Lyu - Proceedings of the ACM on …, 2024 - dl.acm.org
Neural Code Completion Tools (NCCTs) have reshaped the field of software engineering,
which are built upon the language modeling technique and can accurately suggest …

Blurred-dilated method for adversarial attacks

Y Deng, W Wu, J Zhang… - Advances in Neural …, 2023 - proceedings.neurips.cc
Deep neural networks (DNNs) are vulnerable to adversarial attacks, which lead to incorrect
predictions. In black-box settings, transfer attacks can be conveniently used to generate …

Improving the Adversarial Transferability of Vision Transformers with Virtual Dense Connection

J Zhang, Y Huang, Z Xu, W Wu, MR Lyu - Proceedings of the AAAI …, 2024 - ojs.aaai.org
With the great achievement of vision transformers (ViTs), transformer-based approaches
have become the new paradigm for solving various computer vision tasks. However, recent …

Improving Transferable Targeted Adversarial Attacks with Model Self-Enhancement

H Wu, G Ou, W Wu, Z Zheng - Proceedings of the IEEE/CVF …, 2024 - openaccess.thecvf.com
Various transfer attack methods have been proposed to evaluate the robustness of deep
neural networks (DNNs). Although manifesting remarkable performance in generating …

Curvature-Invariant Adversarial Attacks for 3D Point Clouds

J Zhang, W Gu, Y Huang, Z Jiang, W Wu… - Proceedings of the AAAI …, 2024 - ojs.aaai.org
Imperceptibility is one of the crucial requirements for adversarial examples. Previous
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …

GanTextKnockoff: stealing text sentiment analysis model functionality using synthetic data

C Pham, TN Hoang, CT Tran, VB Do - JMST's Section on Computer …, 2024 - online.jmst.info
Today, black-box machine learning models are often subject to extraction attacks that aim to
retrieve their internal information. Black-box model extraction attacks are typically conducted …