Author of the publication

GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IMTM: Invisible Multi-trigger Multimodal Backdoor Attack., , , , and . NLPCC (2), volume 14303 of Lecture Notes in Computer Science, page 533-545. Springer, (2023)PromptAttack: Prompt-Based Attack for Language Models via Gradient Search., , , , , and . NLPCC (1), volume 13551 of Lecture Notes in Computer Science, page 682-693. Springer, (2022)Bayesian Inversion of Frequency-Domain Airborne EM Data With Spatial Correlation Prior Information., , , , , , , and . IEEE Trans. Geosci. Remote. Sens., (2024)A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images., , , , , and . IEEE Trans. Parallel Distributed Syst., 32 (7): 1653-1664 (2021)Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data., , , and . TrustCom, page 277-284. IEEE, (2020)Vulnerability Analysis of Continuous Prompts for Pre-trained Language Models., , , , , and . ICANN (9), volume 14262 of Lecture Notes in Computer Science, page 508-519. Springer, (2023)3-D Inversion of Z-Axis Tipper Electromagnetic Data Using Finite-Element Method With Unstructured Tetrahedral Grids., , , , and . IEEE Trans. Geosci. Remote. Sens., (2022)3-D Time-Domain Airborne EM Inversion for a Topographic Earth., , , , , , , and . IEEE Trans. Geosci. Remote. Sens., (2022)A Rapidly Direct Algorithm of Explicit Fréchet Derivatives for MCSEM in a 3-D TI Formation Using Finite Volume of Coupled Potentials., , , , and . IEEE Access, (2023)Multi-Layer Feature Division Transferable Adversarial Attack., , , , , , and . ICASSP, page 1-5. IEEE, (2023)