Generative adversarial networks: A survey toward private and secure applications

Z Cai, Z Xiong, H Xu, P Wang, W Li, Y Pan - ACM Computing Surveys …, 2021 - dl.acm.org
Generative Adversarial Networks (GANs) have promoted a variety of applications in
computer vision and natural language processing, among others, due to its generative …

Deep learning for text style transfer: A survey

D Jin, Z Jin, Z Hu, O Vechtomova… - Computational …, 2022 - direct.mit.edu
Text style transfer is an important task in natural language generation, which aims to control
certain attributes in the generated text, such as politeness, emotion, humor, and many …

Reformulating unsupervised style transfer as paraphrase generation

K Krishna, J Wieting, M Iyyer - arXiv preprint arXiv:2010.05700, 2020 - arxiv.org
Modern NLP defines the task of style transfer as modifying the style of a given sentence
without appreciably changing its semantics, which implies that the outputs of style transfer …

Dp-forward: Fine-tuning and inference on language models with differential privacy in forward pass

M Du, X Yue, SSM Chow, T Wang, C Huang… - Proceedings of the 2023 …, 2023 - dl.acm.org
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-
propagation, safeguarding training data from privacy leakage, particularly membership …

Idsgan: Generative adversarial networks for attack generation against intrusion detection

Z Lin, Y Shi, Z Xue - Pacific-asia conference on knowledge discovery and …, 2022 - Springer
As an essential tool in security, the intrusion detection system bears the responsibility of the
defense to network attacks performed by malicious traffic. Nowadays, with the help of …

Hidden trigger backdoor attack on {NLP} models via linguistic style manipulation

X Pan, M Zhang, B Sheng, J Zhu, M Yang - 31st USENIX Security …, 2022 - usenix.org
The vulnerability of deep neural networks (DNN) to backdoor (trojan) attacks is extensively
studied for the image domain. In a backdoor attack, a DNN is modified to exhibit expected …

Information leakage in embedding models

C Song, A Raghunathan - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Embeddings are functions that map raw input data to low-dimensional vector
representations, while preserving important semantic information about the inputs. Pre …

Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

Privacy risks of general-purpose language models

X Pan, M Zhang, S Ji, M Yang - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Recently, a new paradigm of building general-purpose language models (eg, Google's Bert
and OpenAI's GPT-2) in Natural Language Processing (NLP) for text feature extraction, a …

Adversarial watermarking transformer: Towards tracing text provenance with data hiding

S Abdelnabi, M Fritz - 2021 IEEE Symposium on Security and …, 2021 - ieeexplore.ieee.org
Recent advances in natural language generation have introduced powerful language
models with high-quality output text. However, this raises concerns about the potential …