Search Results for author: Huaming Chen

Found 14 papers, 7 papers with code

Large Language Models Based Fuzzing Techniques: A Survey

1 code implementation1 Feb 2024 Linghan Huang, Peizhou Zhao, Huaming Chen, Lei Ma

In the modern era where software plays a pivotal role, software security and vulnerability analysis have become essential for software development.

Benchmarking Transferable Adversarial Attacks

1 code implementation1 Feb 2024 Zhibo Jin, Jiayu Zhang, Zhiyu Zhu, Huaming Chen

The robustness of deep learning models against adversarial attacks remains a pivotal concern.

Adversarial Attack Benchmarking +2

GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model

1 code implementation11 Jan 2024 Zhiyu Zhu, Huaming Chen, Xinyi Wang, Jiayu Zhang, Zhibo Jin, Kim-Kwang Raymond Choo, Jun Shen, Dong Yuan

With the functional and characteristic similarity analysis, we introduce a novel gradient editing (GE) mechanism and verify its feasibility in generating transferable samples on various models.

Adversarial Attack

FairCompass: Operationalising Fairness in Machine Learning

no code implementations27 Dec 2023 Jessica Liu, Huaming Chen, Jun Shen, Kim-Kwang Raymond Choo

As artificial intelligence (AI) increasingly becomes an integral part of our societal and individual activities, there is a growing imperative to develop responsible AI solutions.

Fairness Subgroup Discovery

MFABA: A More Faithful and Accelerated Boundary-based Attribution Method for Deep Neural Networks

1 code implementation21 Dec 2023 Zhiyu Zhu, Huaming Chen, Jiayu Zhang, Xinyi Wang, Zhibo Jin, Minhui Xue, Dongxiao Zhu, Kim-Kwang Raymond Choo

To better understand the output of deep neural networks (DNN), attribution based methods have been an important approach for model interpretability, which assign a score for each input dimension to indicate its importance towards the model outcome.

Code Ownership in Open-Source AI Software Security

1 code implementation18 Dec 2023 Jiawen Wen, Dong Yuan, Lei Ma, Huaming Chen

As open-source AI software projects become an integral component in the AI software development, it is critical to develop a novel methods to ensure and measure the security of the open-source projects for developers.

Benchmarking

DANAA: Towards transferable attacks with double adversarial neuron attribution

1 code implementation16 Oct 2023 Zhibo Jin, Zhiyu Zhu, Xinyi Wang, Jiayu Zhang, Jun Shen, Huaming Chen

While deep neural networks have excellent results in many fields, they are susceptible to interference from attacking samples resulting in erroneous judgments.

Feature Importance

Look Before You Leap: An Exploratory Study of Uncertainty Measurement for Large Language Models

no code implementations16 Jul 2023 Yuheng Huang, Jiayang Song, Zhijie Wang, Shengming Zhao, Huaming Chen, Felix Juefei-Xu, Lei Ma

In particular, we experiment with twelve uncertainty estimation methods and four LLMs on four prominent natural language processing (NLP) tasks to investigate to what extent uncertainty estimation techniques could help characterize the prediction risks of LLMs.

Code Generation Hallucination +1

Handling Heavy Occlusion in Dense Crowd Tracking by Focusing on the Heads

no code implementations16 Apr 2023 Yu Zhang, Huaming Chen, Wei Bao, Zhongzheng Lai, Zao Zhang, Dong Yuan

Being able to identify and track all the pedestrians in the dense crowd scene with computer vision approaches is a typical challenge in this field, also known as the Multiple Object Tracking (MOT) challenge.

Multiple Object Tracking object-detection +1

Data Hiding with Deep Learning: A Survey Unifying Digital Watermarking and Steganography

no code implementations20 Jul 2021 Zihan Wang, Olivia Byrnes, Hu Wang, Ruoxi Sun, Congbo Ma, Huaming Chen, Qi Wu, Minhui Xue

The advancement of secure communication and identity verification fields has significantly increased through the use of deep learning techniques for data hiding.

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

1 code implementation18 Jul 2021 Triet H. M. Le, Huaming Chen, M. Ali Babar

Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems.

Cannot find the paper you are looking for? You can Submit a new open access paper.