firstbacksecondback
14 Results
Workshop
|
Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models Yuancheng Xu · Jiarui Yao · Manli Shu · Yanchao Sun · Zichu Wu · Ning Yu · Tom Goldstein · Furong Huang |
||
Workshop
|
How to Craft Backdoors with Unlabeled Data Alone? Yifei Wang · Wenhan Ma · Stefanie Jegelka · Yisen Wang |
||
Workshop
|
Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models Yuancheng Xu · Jiarui Yao · Manli Shu · Yanchao Sun · Zichu Wu · Ning Yu · Tom Goldstein · Furong Huang |
||
Workshop
|
Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models Yuancheng Xu · Jiarui Yao · Manli Shu · Yanchao Sun · Zichu Wu · Ning Yu · Tom Goldstein · Furong Huang |
||
Workshop
|
Sat 7:45 |
Unlearning, Privacy, Poisoning & Censorship in LLMs |
|
Poster
|
Wed 1:45 |
Towards Poisoning Fair Representations Tianci Liu · Haoyu Wang · Feijie Wu · Hengtong Zhang · Pan Li · Lu Su · Jing Gao |
|
Poster
|
Wed 7:30 |
Like Oil and Water: Group Robustness Methods and Poisoning Defenses May Be at Odds Michael-Andrei Panaitescu-Liess · Yigitcan Kaya · Sicheng Zhu · Furong Huang · Tudor Dumitras |
|
Poster
|
Wed 1:45 |
Sharpness-Aware Data Poisoning Attack Pengfei He · Han Xu · Jie Ren · Yingqian Cui · Shenglai Zeng · Hui Liu · Charu Aggarwal · Jiliang Tang |
|
Poster
|
Wed 7:30 |
Demystifying Poisoning Backdoor Attacks from a Statistical Perspective Ganghua Wang · Xun Xian · Ashish Kundu · Jayanth Srinivasa · Xuan Bi · Mingyi Hong · Jie Ding |
|
Poster
|
Tue 1:45 |
Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection Jiawei Liang · Siyuan Liang · Aishan Liu · Xiaojun Jia · Junhao Kuang · Xiaochun Cao |
|
Poster
|
Wed 1:45 |
Universal Jailbreak Backdoors from Poisoned Human Feedback Javier Rando · Florian Tramer |
|
Poster
|
Thu 1:45 |
Backdoor Federated Learning by Poisoning Backdoor-Critical Layers Haomin Zhuang · Mingxian Yu · Hao Wang · Yang Hua · Jian Li · Xu Yuan |