Zeyang Sha
Zeyang Sha
CISPA Helmholtz Center for Information Security
Verified email at - Homepage
Cited by
Cited by
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Z Sha, Z Li, N Yu, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Z Sha, X He, N Yu, M Backes, Y Zhang
IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2022
Fine-tuning is all you need to mitigate backdoor attacks
Z Sha, X He, P Berrang, M Humbert, Y Zhang
arXiv preprint arXiv:2212.09067, 2022
From visual prompt learning to zero-shot transfer: Mapping is all you need
Z Yang, Z Sha, M Backes, Y Zhang
arXiv preprint arXiv:2303.05266, 2023
Prompt Stealing Attacks Against Large Language Models
Z Sha, Y Zhang
arXiv preprint arXiv:2402.12959, 2024
Conversation Reconstruction Attack Against GPT Models
J Chu, Z Sha, M Backes, Y Zhang
arXiv preprint arXiv:2402.02987, 2024
Comprehensive Assessment of Toxicity in ChatGPT
B Zhang, X Shen, WM Si, Z Sha, Z Chen, A Salem, Y Shen, M Backes, ...
arXiv preprint arXiv:2311.14685, 2023
The system can't perform the operation now. Try again later.
Articles 1–7