Follow
Zeyang Sha
Zeyang Sha
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Z Sha, Z Li, N Yu, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
122*2022
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Z Sha, X He, N Yu, M Backes, Y Zhang
IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2022
302022
Fine-tuning is all you need to mitigate backdoor attacks
Z Sha, X He, P Berrang, M Humbert, Y Zhang
arXiv preprint arXiv:2212.09067, 2022
222022
Prompt stealing attacks against large language models
Z Sha, Y Zhang
arXiv preprint arXiv:2402.12959, 2024
122024
Comprehensive assessment of toxicity in ChatGPT
B Zhang, X Shen, WM Si, Z Sha, Z Chen, A Salem, Y Shen, M Backes, ...
arXiv preprint arXiv:2311.14685, 2023
42023
From visual prompt learning to zero-shot transfer: Mapping is all you need
Z Yang, Z Sha, M Backes, Y Zhang
arXiv preprint arXiv:2303.05266, 2023
42023
Conversation Reconstruction Attack Against GPT Models
J Chu, Z Sha, M Backes, Y Zhang
arXiv preprint arXiv:2402.02987, 2024
32024
ZeroFake: Zero-Shot Detection of Fake Images Generated and Edited by Text-to-Image Generation Models
Z Sha, Y Tan, M Li, M Backes, Y Zhang
CISPA, 2024
2024
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models
J Chu, Z Sha, M Backes, Y Zhang
CISPA, 2024
2024
Games and Beyond: Analyzing the Bullet Chats of Esports Livestreaming
Y Jiang, X Shen, R Wen, Z Sha, J Chu, Y Liu, M Backes, Y Zhang
Proceedings of the International AAAI Conference on Web and Social Media 18 …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–10