Search Results for author: Zhuohang Li

Found 14 papers, 4 papers with code

PhaseEvo: Towards Unified In-Context Prompt Optimization for Large Language Models

no code implementations17 Feb 2024 Wendi Cui, Jiaxin Zhang, Zhuohang Li, Hao Sun, Damien Lopez, Kamalika Das, Bradley Malin, Sricharan Kumar

Crafting an ideal prompt for Large Language Models (LLMs) is a challenging task that demands significant resources and expert human input.

Computational Efficiency In-Context Learning

Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks?

no code implementations14 Feb 2024 Andrew Lowy, Zhuohang Li, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang

In practical applications, such a worst-case guarantee may be overkill: practical attackers may lack exact knowledge of (nearly all of) the private data, and our data set might be easier to defend, in some sense, than the worst-case data set.

Inference Attack Membership Inference Attack

Transferable Learned Image Compression-Resistant Adversarial Perturbations

no code implementations6 Jan 2024 Yang Sui, Zhuohang Li, Ding Ding, Xiang Pan, Xiaozhong Xu, Shan Liu, Zhenzhong Chen

Adversarial attacks can readily disrupt the image classification system, revealing the vulnerability of DNN-based recognition tasks.

Adversarial Attack Autonomous Driving +4

DCR-Consistency: Divide-Conquer-Reasoning for Consistency Evaluation and Improvement of Large Language Models

1 code implementation4 Jan 2024 Wendi Cui, Jiaxin Zhang, Zhuohang Li, Lopez Damien, Kamalika Das, Bradley Malin, Sricharan Kumar

Evaluating the quality and variability of text generated by Large Language Models (LLMs) poses a significant, yet unresolved research challenge.

Hallucination Sentence

Reconstruction Distortion of Learned Image Compression with Imperceptible Perturbations

no code implementations1 Jun 2023 Yang Sui, Zhuohang Li, Ding Ding, Xiang Pan, Xiaozhong Xu, Shan Liu, Zhenzhong Chen

Learned Image Compression (LIC) has recently become the trending technique for image transmission due to its notable performance.

Image Compression Image Reconstruction

RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense

no code implementations11 Apr 2023 Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu

In this paper, we seek to reconcile utility and privacy in FL by proposing a user-configurable privacy defense, RecUP-FL, that can better focus on the user-specified sensitive attributes while obtaining significant improvements in utility over traditional defenses.

Adversarial Attack Attribute +4

Speech Privacy Leakage from Shared Gradients in Distributed Learning

no code implementations21 Feb 2023 Zhuohang Li, Jiaxin Zhang, Jian Liu

Distributed machine learning paradigms, such as federated learning, have been recently adopted in many privacy-critical applications for speech analysis.

Federated Learning Keyword Spotting

Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage

1 code implementation CVPR 2022 Zhuohang Li, Jiaxin Zhang, Luyang Liu, Jian Liu

Federated Learning (FL) framework brings privacy benefits to distributed learning systems by allowing multiple clients to participate in a learning task under the coordination of a central server without exchanging their private data.

Bayesian Optimization Federated Learning

Byzantine-robust Federated Learning through Spatial-temporal Analysis of Local Model Updates

no code implementations3 Jul 2021 Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu

Federated Learning (FL) enables multiple distributed clients (e. g., mobile devices) to collaboratively train a centralized model while keeping the training data locally on the client.

Federated Learning

Enabling Fast and Universal Audio Adversarial Attack Using Generative Model

no code implementations26 Apr 2020 Yi Xie, Zhuohang Li, Cong Shi, Jian Liu, Yingying Chen, Bo Yuan

These idealized assumptions, however, makes the existing audio adversarial attacks mostly impossible to be launched in a timely fashion in practice (e. g., playing unnoticeable adversarial perturbations along with user's streaming input).

Adversarial Attack

Real-time, Universal, and Robust Adversarial Attacks Against Speaker Recognition Systems

no code implementations4 Mar 2020 Yi Xie, Cong Shi, Zhuohang Li, Jian Liu, Yingying Chen, Bo Yuan

As the popularity of voice user interface (VUI) exploded in recent years, speaker recognition system has emerged as an important medium of identifying a speaker in many security-required applications and services.

Adversarial Attack Room Impulse Response (RIR) +1

Cannot find the paper you are looking for? You can Submit a new open access paper.