Author of the publication

Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.

, , , , and . USENIX Security Symposium, page 3611-3628. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a hydraulic driven Camellia cultivation machine with replaceable working arms., , , , and . URAI, page 903-906. IEEE, (2017)MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting., , , and . KDD, page 1327-1336. ACM, (2022)Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks., , , , , and . USENIX Security Symposium, page 2939-2956. USENIX Association, (2023)Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning., , , , and . AAAI, page 3791-3800. AAAI Press, (2020)SlowBERT: Slow-down Attacks on Input-adaptive Multi-exit BERT., , , and . ACL (Findings), page 9992-10007. Association for Computational Linguistics, (2023)Theoretical Analysis of Image-to-Image Translation with Adversarial Learning., , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 4003-4012. PMLR, (2018)BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting., , , , and . CoRR, (2023)Modeling Extreme Events in Time Series Prediction., , , , and . KDD, page 1114-1122. ACM, (2019)Study on measure and pairing algorithm of servo valve nozzles., , , and . URAI, page 632-636. IEEE, (2016)Towards Backdoor Attack on Deep Learning based Time Series Classification., , , , , , and . ICDE, page 1274-1287. IEEE, (2022)