Follow
Zeyang Sha
Zeyang Sha
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Z Sha, Z Li, N Yu, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
97*2022
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Z Sha, X He, N Yu, M Backes, Y Zhang
IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2022
272022
Fine-tuning is all you need to mitigate backdoor attacks
Z Sha, X He, P Berrang, M Humbert, Y Zhang
arXiv preprint arXiv:2212.09067, 2022
192022
Prompt stealing attacks against large language models
Z Sha, Y Zhang
arXiv preprint arXiv:2402.12959, 2024
92024
Conversation Reconstruction Attack Against GPT Models
J Chu, Z Sha, M Backes, Y Zhang
arXiv preprint arXiv:2402.02987, 2024
32024
Comprehensive assessment of toxicity in ChatGPT
B Zhang, X Shen, WM Si, Z Sha, Z Chen, A Salem, Y Shen, M Backes, ...
arXiv preprint arXiv:2311.14685, 2023
32023
From visual prompt learning to zero-shot transfer: Mapping is all you need
Z Yang, Z Sha, M Backes, Y Zhang
arXiv preprint arXiv:2303.05266, 2023
32023
Games and Beyond: Analyzing the Bullet Chats of Esports Livestreaming
Y Jiang, X Shen, R Wen, Z Sha, J Chu, Y Liu, M Backes, Y Zhang
Proceedings of the International AAAI Conference on Web and Social Media 18 …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–8