人工智能安全实验室·上海交通大学
人工智能安全实验室·上海交通大学
在读研究生
近期事件
科研成果
联系我们
浅色
深色
自动
Conference
Speaker-Adaptive Lipreading via Spatio-Temporal Information Learning
Lipreading has been rapidly developed recently with the help of large-scale datasets and big models. Despite the significant progress …
何怡
,
杨磊
,
王晗亦
,
王士林
PDF
Data-Free Watermark for Deep Neural Networks by Truncated Adversarial Distillation
Model watermarking secures ownership verification and copyright protection of deep neural networks. In the black-box scenario, …
闫超博
,
李方圻
,
王士林
PDF
Revisiting the Information Capacity of Neural Network Watermarks: Upper Bound Estimation and Beyond
To trace the copyright of deep neural networks, an owner can embed its identity information into its model as a watermark. The capacity …
李方圻
,
赵皓东
,
杜巍
,
王士林
PDF
DOI
NWS: Natural Textual Backdoor Attacks via Word Substitution
Backdoor attacks pose a serious security threat for natural language processing (NLP). Backdoored NLP models perform normally on clean …
杜巍
,
袁童鑫
,
赵皓东
,
刘功申
PDF
SDPSAT: Syntactic Dependency Parsing Structure-Guided Semi-Autoregressive Machine Translation
The advent of non-autoregressive machine translation (NAT) accelerates the decoding superior to autoregressive machine translation (AT) …
陈欣然
,
赵彧然
,
郭建铭
,
段苏峰
,
刘功申
PDF
Cite
DOI
Is Continuous Prompt a Combination of Discrete Prompts? Towards a Novel View for Interpreting Continuous Prompts
The broad adoption of continuous prompts has brought state-of-the-art results on a diverse array of downstream natural language …
鞠天杰
,
王晗亦
,
赵皓东
,
刘功申
PDF
Cite
DOI
Measure and Countermeasure of the Capsulation Attack against Backdoor-based Deep Neural Network Watermarks
Backdoor-based watermarking schemes were proposed to protect the intellectual property of deep neural networks under the black-box …
李方圻
,
王士林
PDF
DOI
FedPrompt: Communication-Efficient and Privacy-Preserving Prompt Tuning in Federated Learning
Federated learning (FL) has enabled global model training on decentralized data in a privacy-preserving way. However, for tasks that …
赵皓东
,
杜巍
,
李方圻
,
李珮玄
,
刘功申
PDF
DOI
Content-Insensitive Dynamic Lip Feature Extraction for Visual Speaker Authentication against Deepfake Attacks
Recent research has shown that lip-based speaker authenti- cation system can achieve good authentication performance. However, with …
郭子豪
,
王士林
PDF
DOI
An Auto-Encoder Based Method for Camera Fingerprint Compression
Camera fingerprint links a picture to its camera sensor, which is widely applied in sensor device identification, social network …
张凯旋
,
刘子涵
,
胡嘉尚
,
王士林
PDF
DOI
«
»
Cite
×