Your code secret belongs to me: neural code completion tools can memorize hard-coded credentials
Neural Code Completion Tools (NCCTs) have reshaped the field of software engineering,
which are built upon the language modeling technique and can accurately suggest …
which are built upon the language modeling technique and can accurately suggest …
Blurred-dilated method for adversarial attacks
Deep neural networks (DNNs) are vulnerable to adversarial attacks, which lead to incorrect
predictions. In black-box settings, transfer attacks can be conveniently used to generate …
predictions. In black-box settings, transfer attacks can be conveniently used to generate …
Improving the Adversarial Transferability of Vision Transformers with Virtual Dense Connection
With the great achievement of vision transformers (ViTs), transformer-based approaches
have become the new paradigm for solving various computer vision tasks. However, recent …
have become the new paradigm for solving various computer vision tasks. However, recent …
Improving Transferable Targeted Adversarial Attacks with Model Self-Enhancement
Various transfer attack methods have been proposed to evaluate the robustness of deep
neural networks (DNNs). Although manifesting remarkable performance in generating …
neural networks (DNNs). Although manifesting remarkable performance in generating …
Curvature-Invariant Adversarial Attacks for 3D Point Clouds
Imperceptibility is one of the crucial requirements for adversarial examples. Previous
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …
adversarial attacks on 3D point cloud recognition suffer from noticeable outliers, resulting in …
GanTextKnockoff: stealing text sentiment analysis model functionality using synthetic data
Today, black-box machine learning models are often subject to extraction attacks that aim to
retrieve their internal information. Black-box model extraction attacks are typically conducted …
retrieve their internal information. Black-box model extraction attacks are typically conducted …