Instruction tuning for large language models: A survey S Zhang, L Dong, X Li, S Zhang, X Sun, S Wang, J Li, R Hu, T Zhang, ... arXiv preprint arXiv:2308.10792, 2023 | 440 | 2023 |
Jailbreaking chatgpt via prompt engineering: An empirical study Y Liu, G Deng, Z Xu, Y Li, Y Zheng, Y Zhang, L Zhao, T Zhang, K Wang, ... arXiv preprint arXiv:2305.13860, 2023 | 353 | 2023 |
Model inversion attacks against collaborative inference Z He, T Zhang, RB Lee Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 329 | 2019 |
Cloudradar: A real-time side-channel attack detection system in clouds T Zhang, Y Zhang, RB Lee Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 314 | 2016 |
Gpt-ner: Named entity recognition via large language models S Wang, X Sun, X Li, R Ouyang, F Wu, T Zhang, J Li, G Wang arXiv preprint arXiv:2304.10428, 2023 | 284 | 2023 |
MASTERKEY: Automated Jailbreaking of Large Language Model Chatbots G Deng, Y Liu, Y Li, K Wang, Y Zhang, Z Li, H Wang, T Zhang, Y Liu The Network and Distributed System Security Symposium (NDSS), 2024 | 278* | 2024 |
Adversarial attacks against network intrusion detection in IoT systems H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu IEEE Internet of Things Journal 8 (13), 10327-10335, 2021 | 276 | 2021 |
Prompt Injection attack against LLM-integrated Applications Y Liu, G Deng, Y Li, K Wang, Z Wang, X Wang, T Zhang, Y Liu, H Wang, ... arXiv preprint arXiv:2306.05499, 2023 | 231 | 2023 |
Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 224* | 2021 |
Machine learning based DDoS attack detection from source side in cloud Z He, T Zhang, RB Lee 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing …, 2017 | 215 | 2017 |
Text Classification via Large Language Models X Sun, X Li, J Li, F Wu, S Guo, T Zhang, G Wang Findings of Conference on Empirical Methods in Natural Language Processing …, 2023 | 166 | 2023 |
Stealthy and efficient adversarial attacks against deep reinforcement learning J Sun, T Zhang, X Xie, L Ma, Y Zheng, K Chen, Y Liu Proceedings of the AAAI Conference on Artificial Intelligence 34 (04), 5883-5891, 2020 | 133 | 2020 |
Characterization and prediction of deep learning workloads in large-scale gpu datacenters Q Hu, P Sun, S Yan, Y Wen, T Zhang Proceedings of the International Conference for High Performance Computing …, 2021 | 127 | 2021 |
Sensitive-sample fingerprinting of deep neural networks Z He, T Zhang, R Lee Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2019 | 125* | 2019 |
Badpre: Task-agnostic backdoor attacks to pre-trained nlp foundation models K Chen, Y Meng, X Sun, S Guo, T Zhang, J Li, C Fan International Conference on Learning Representations (ICLR), 2022 | 107 | 2022 |
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography X Lou, T Zhang, J Jiang, Y Zhang ACM Computing Surveys (CSUR) 54 (6), 1-37, 2021 | 105 | 2021 |
Privacy-preserving machine learning through data obfuscation T Zhang, Z He, RB Lee arXiv preprint arXiv:1807.01860, 2018 | 103 | 2018 |
Attacking and protecting data privacy in edge–cloud collaborative inference systems Z He, T Zhang, RB Lee IEEE Internet of Things Journal 8 (12), 9706-9716, 2021 | 99 | 2021 |
New models of cache architectures characterizing information leakage from cache side channels T Zhang, RB Lee Proceedings of the 30th annual computer security applications conference, 96-105, 2014 | 87* | 2014 |
Iron: Private inference on transformers M Hao, H Li, H Chen, P Xing, G Xu, T Zhang Advances in neural information processing systems 35, 15718-15731, 2022 | 85 | 2022 |