Search Results for author: Zongru Wu

Found 4 papers, 0 papers with code

TrojanRAG: Retrieval-Augmented Generation Can Be Backdoor Driver in Large Language Models

no code implementations22 May 2024 Pengzhou Cheng, Yidong Ding, Tianjie Ju, Zongru Wu, Wei Du, Ping Yi, Zhuosheng Zhang, Gongshen Liu

To improve the recall of the RAG for the target contexts, we introduce a knowledge graph to construct structured data to achieve hard matching at a fine-grained level.

Backdoor Attack Contrastive Learning +1

MKF-ADS: Multi-Knowledge Fusion Based Self-supervised Anomaly Detection System for Control Area Network

no code implementations7 Mar 2024 Pengzhou Cheng, Zongru Wu, Gongshen Liu

The STcAM with fine-pruning uses one-dimensional convolution (Conv1D) to extract spatial features and subsequently utilizes the Bidirectional Long Short Term Memory (Bi-LSTM) to extract the temporal features, where the attention mechanism will focus on the important time steps.

Intrusion Detection Knowledge Distillation +2

SynGhost: Imperceptible and Universal Task-agnostic Backdoor Attack in Pre-trained Language Models

no code implementations29 Feb 2024 Pengzhou Cheng, Wei Du, Zongru Wu, Fengwei Zhang, Libo Chen, Gongshen Liu

Specifically, $\mathtt{SynGhost}$ hostilely manipulates clean samples through different syntactic and then maps the backdoor to representation space without disturbing the primitive representation.

Contrastive Learning Natural Language Understanding

Acquiring Clean Language Models from Backdoor Poisoned Datasets by Downscaling Frequency Space

no code implementations19 Feb 2024 Zongru Wu, Zhuosheng Zhang, Pengzhou Cheng, Gongshen Liu

In this paper, we investigate the learning mechanisms of backdoor LMs in the frequency space by Fourier analysis.

Cannot find the paper you are looking for? You can Submit a new open access paper.