Search Results for author: Sen Chen

Found 13 papers, 4 papers with code

A Comprehensive Empirical Study of Bugs in Open-Source Federated Learning Frameworks

no code implementations9 Aug 2023 Weijie Shao, Yuyang Gao, Fu Song, Sen Chen, Lingling Fan, JingZhu He

Federated learning (FL) is a distributed machine learning (ML) paradigm, allowing multiple clients to collaboratively train shared machine learning (ML) models without exposing clients' data privacy.

Federated Learning

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems

no code implementations7 Jun 2022 Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Recent work has illuminated the vulnerability of speaker recognition systems (SRSs) against adversarial attacks, raising significant security concerns in deploying SRSs.

Adversarial Attack Speaker Recognition

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition

1 code implementation7 Jun 2022 Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang

According to the characteristic of SRSs, we present 22 diverse transformations and thoroughly evaluate them using 7 recent promising adversarial attacks (4 white-box and 3 black-box) on speaker recognition.

Speaker Recognition speech-recognition +1

Talking Head Generation with Audio and Speech Related Facial Action Units

no code implementations19 Oct 2021 Sen Chen, Zhilei Liu, Jiaxing Liu, Zhengxiang Yan, Longbiao Wang

Quantitative and qualitative experiments demonstrate that our method outperforms existing methods in both image quality and lip-sync accuracy.

Talking Head Generation

SEC4SR: A Security Analysis Platform for Speaker Recognition

1 code implementation4 Sep 2021 Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

To bridge this gap, we present SEC4SR, the first platform enabling researchers to systematically and comprehensively evaluate adversarial attacks and defenses in SR. SEC4SR incorporates 4 white-box and 2 black-box attacks, 24 defenses including our novel feature-level transformations.

Speaker Recognition

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation

1 code implementation24 Apr 2020 Bozhi Wu, Sen Chen, Cuiyun Gao, Lingling Fan, Yang Liu, Weiping Wen, Michael R. Lyu

In this paper, to fill this gap, we propose a novel and interpretable ML-based approach (named XMal) to classify malware with high accuracy and explain the classification result meanwhile.

Android Malware Detection Classification +2

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

no code implementations15 Apr 2020 Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu

To launch attacks in the white- and grey-box scenarios, we also propose a sample-based collision attack to gain the knowledge of the target classifier.

CORE: Automating Review Recommendation for Code Changes

no code implementations20 Dec 2019 JingKai Siow, Cuiyun Gao, Lingling Fan, Sen Chen, Yang Liu

The hinge of accurate code review suggestion is to learn good representations for both code changes and reviews.

ATOM: Commit Message Generation Based on Abstract Syntax Tree and Hybrid Ranking

no code implementations6 Dec 2019 Shangqing Liu, Cuiyun Gao, Sen Chen, Lun Yiu Nie, Yang Liu

Moreover, although generation models have the advantages of synthesizing commit messages for new code changes, they are not easy to bridge the semantic gap between code and natural languages which could be mitigated by retrieval models.

Software Engineering

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

1 code implementation3 Nov 2019 Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu

In this paper, we conduct the first comprehensive and systematic study of the adversarial attacks on SR systems (SRSs) to understand their security weakness in the practical blackbox setting.

Adversarial Attack Speaker Recognition +2

An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms

no code implementations15 Sep 2019 Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, Xiaohong Li

However, the differences in architecture designs and implementations of existing frameworks and platforms bring new challenges for DL software development and deployment.

Adversarial Attack Adversarial Robustness +1

Secure Deep Learning Engineering: A Software Quality Assurance Perspective

no code implementations10 Oct 2018 Lei Ma, Felix Juefei-Xu, Minhui Xue, Qiang Hu, Sen Chen, Bo Li, Yang Liu, Jianjun Zhao, Jianxiong Yin, Simon See

Over the past decades, deep learning (DL) systems have achieved tremendous success and gained great popularity in various applications, such as intelligent machines, image processing, speech processing, and medical diagnostics.

Cannot find the paper you are looking for? You can Submit a new open access paper.