Sungdong Kim, Minsuk Chang and Sang-Woo Lee, A Unified Generative Framework for Aspect-based Sentiment Analysis step2.txtrun wikihttps://zh.wikipedia.org/wiki/Whitespace, push: printc:ASCII dup: drop: add:,, 0555555printcchr(55)175,188,122printcchr(122)chr(188)chr(175)chr(), step, keyflag.txtwhitespace, wpachr(a)jsws_ide.jsprintcaa, flag.txtprintcdropstep2.txt\n\n\t\n flag, wimbinwalk, 65 68 68asciiADD656868, unicodectf.ssleye, left flagHUFU_LEFT& tweakpng y0u_f1nd_me,base64this_is_right_flag:&rgb_right_hufu, txt(0, 0, 0)(255, 255, 255)(0, 0, 0)1(255, 255, 255)0, SlientEye{1251521mxbctmm} . Adversaries may abuse mshta.exe to proxy execution of malicious .hta files and Javascript or VBScript through a trusted Windows utility. Tingting Ma, Jin-Ge Yao, Chin-Yew Lin and Tiejun Zhao, Difficulty-Aware Machine Translation Evaluation Bodhisattwa Prasad Majumder, Taylor Berg-Kirkpatrick, Julian McAuley and Harsh Jhamtani, Exploring Listwise Evidence Reasoning with T5 for Fact Verification Oleg Vasilyev and John Bohannon, Assessing Dialogue Systems with Distribution Distances Xinyu Wang, Yong Jiang, Zhaohui Yan, Zixia Jia, Nguyen Bach, Tao Wang, Zhongqiang Huang, Fei Huang and Kewei Tu, ERICA: Improving Entity and Relation Understanding for Pre-trained Language Models via Contrastive Learning Yuchen Li and Andrej Risteski, Dynamic Contextualized Word Embeddings Krishnapriya Vishnubhotla, Graeme Hirst and Frank Rudzicz, Knowing More About Questions Can Help: Improving Calibration in Question Answering arXiv, 2021. arXiv, 2022. Barbara Plank, Alternated Training with Synthetic and Authentic Data for Neural Machine Translation Guanhong Tao, Guangyu Shen, Yingqi Liu, Shengwei An, Qiuling Xu, Shiqing Ma, Pan Li, and Xiangyu Zhang. Huayang Li, Lemao Liu, Guoping Huang and Shuming Shi, CogAlign: Learning to Align Textual Neural Representations to Cognitive Language Processing Signals Dongyeop Kang and Eduard Hovy, GTM: A Generative Triple-wise Model for Conversational Question Generation Are you sure you want to create this branch? Use application control configured to block execution of mshta.exe if it is not required for a given system or network to prevent potential misuse by adversaries. [pdf], Hardly Perceptible Trojan Attack against Neural Networks with Bit Flips. [pdf] Microsoft recommended block rules. Yichun Yin, Cheng Chen, Lifeng Shang, Xin Jiang, Xiao Chen and Qun Liu, PP-Rec: News Recommendation with Personalized User Interest and Time-aware News Popularity arXiv, 2021. binwalk -e500bugku666 flag.rar.txt: MuS4que9l+mprOeLrOijgeiAheaMh+aMpeedgOS4gOmYn+e8luWPt+S4umFiY2TnmoTln7rlm6DnqoHlj5jnmoTnvZfpqazni6zoo4HogIXmnaXmipPogIHpqazvvIzmlLvnv7vkuoY25Liq5pyJ5oqk5qCP55qE5Z+O5aKZ77yM54S25ZCO5LuW5Lus6aG65Yip55qE5oqT5Yiw5LqG6ICB6ams44CC5bm25b6X5Yiw5LiA5Liy5a2X56ym77yab2Vtc294ZXBkank, 2abcd6oemsoxepdjy, W, abcdabcd, mbinmuakbgu, U2FsdGVkX190Qzuyvdil3MZ9LQUzBbQaXJNzVFBzcAf5CzdvUZ5wdQ==, ==base64wpE=MCDES, bs64gua.pngStegsolvelsb png48*48png DJBCTF(Mumuzi) DJBbugkuascii, 010110100110110101111000011010000101101000110011011101000101001001100001010101110100011001110101010110000011000001110100001100010110001001101100001110010101010101100100010101110011010101100110010101000101011101010110011101010101101000110001001110010101100101100100010101100011100101010100011000100011001000110101011011100101100000110001010011100110111101100001010110000011000000111101, 200% py3, 200,.jpg,010editor pngjpg binwalkforemost .txtpy3py2py3py3, . Tilman Beck, Ji-Ung Lee, Christina Viehmann, Marcus Maurer, Oliver Quiring and Iryna Gurevych, Bridging Subword Gaps in Pretrain-Finetune Paradigm for Natural Language Generation Huiyuan Lai, Antonio Toral and Malvina Nissim, DefSent: Sentence Embeddings using Definition Sentences It is critical for safely adopting third-party training resources or models in reality. [link], BlindNet Backdoor: Attack on Deep Neural Network using Blind Watermark. Shourya Aggarwal, Divyanshu Mandowara, Vishwajeet Agrawal, Dinesh Khandelwal, Parag Singla and Dinesh Garg, DynaSent: A Dynamic Benchmark for Sentiment Analysis Vanessa Lopez, Nagesh Yadav, Gabriele Picco, Inge Vejsbjerg, Eoin Carrol, Seamus Brady, Marco Luca Sbodio, Lam Thanh Hoang, Miao Wei and John Segrave, Not Far Away, Not So Close: Sample Efficient Nearest Neighbour Data Augmentation via MiniMax Jing Gu, Qingyang Wu, Chongruo Wu, Weiyan Shi and Zhou Yu, WikiSum: Coherent Summarization Dataset for Efficient Human-Evaluation Wasi Ahmad, Haoran Li, Kai-Wei Chang and Yashar Mehdad, Language Embeddings for Typology and Cross-lingual Transfer Learning [pdf], LIRA: Learnable, Imperceptible and Robust Backdoor Attacks. Zejian Liu, Fanrong Li, Gang Li and Jian Cheng, Sketch and Refine: Towards Faithful and Informative Table-to-Text Generation Peifeng Wang, Filip Ilievski, Muhao Chen and Xiang Ren, Few-Shot Upsampling for Protest Size Detection An Inferential Benchmark for Knowledge Graph Completion arXiv, 2022. [pdf], BadPrompt: Backdoor Attacks on Continuous Prompts. Abhilasha Ravichander, Alan W Black, Thomas Norton, Shomir Wilson and Norman Sadeh, HiddenCut: Simple Data Augmentation for Natural Language Understanding with Better Generalizability Shuckworm Continues Cyber-Espionage Attacks Against Ukraine. [code], Stealthy Backdoor Attack with Adversarial Training. Thomas Bott, Dominik Schlechtweg and Sabine Schulte Im Walde, CoDesc: A Large Code-Description Parallel Dataset Ashim Gupta and Vivek Srikumar, Neural-Symbolic Commonsense Reasoner with Relation Predictors If it sounds like there is random bleeps and bloops in the sound, try this tactic! Shaofeng Li, Shiqing Ma, Minhui Xue, and Benjamin Zi Hao Zhao. [code], Effective Backdoor Defense by Exploiting Sensitivity of Poisoned Samples. Aniruddha Saha, Ajinkya Tejankar, Soroush Abbasi Koohpayegani, and Hamed Pirsiavash. Chandrahas and Partha Talukdar, Multimodal Fusion with Co-Attention Networks for Fake News Detection Wenxiang Jiao, Xing Wang, Zhaopeng Tu, Shuming Shi, Michael Lyu and Irwin King, Parameter-efficient Multi-task Fine-tuning for Transformers via Shared Hypernetworks arXiv, 2020. Jing Xu, Minhui, Xue, and Stjepan Picek. [pdf], Just Rotate it: Deploying Backdoor Attacks via Rotation Transformation. Yiming Li, Yang Bai, Yong Jiang, Yong Yang, Shu-Tao Xia, and Bo Li. [pdf] Dongfang Lou, Zhilin Liao, Shumin Deng, Ningyu Zhang and Huajun Chen, Self-Attention Networks Can Process Bounded Hierarchical Languages Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, and David Miller. [pdf], CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing. [code], Rethinking Stealthiness of Backdoor Attack against NLP Models. [link], A Triggerless Backdoor Attack and Defense Mechanism for Intelligent Task Offloading in Multi-UAV Systems. Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim, and Wenke Lee. Mahim Anjum Haque, Tahmid Hasan, Wasi Ahmad, Anindya Iqbal and Rifat Shahriyar, Better Chinese Sentence Segmentation with Reinforcement Learning Zewen Chi, Li Dong, Bo Zheng, Shaohan Huang, Xian-Ling Mao, Heyan Huang and Furu Wei, GhostBERT: Generate More Features with Cheap Operations for BERT Han Wu, Kun Xu, Linfeng Song, Lifeng Jin, Haisong Zhang and Linqi Song, Zero-shot Fact Verification by Claim Generation Yichi Zhang and Joyce Chai, Marked Attribute Bias in Natural Language Inference Jun Yan, Vansh Gupta, and Xiang Ren. [code], Poisoning and Backdooring Contrastive Learning. Wang Chen, Piji Li and Irwin King, PIGLeT: Language Grounding Through Neuro-Symbolic Interaction in a 3D World Ming Shen, Pratyay Banerjee and Chitta Baral, Anchor-based Bilingual Word Embeddings for Low-Resource Languages arXiv, 2022. Philip Arthur, Dongwon Ryu and Gholamreza Haffari, Strong and Light Baseline Models for Fact-Checking Joint Inference Meiling Li, Nan Zhong, Xinpeng Zhang, Zhenxing Qian, and Sheng Li. Binghui Wang, Xiaoyu Cao, Jinyuan jia, and Neil Zhenqiang Gong. Woojeong Jin, Rahul Khanna, Suji Kim, Dong-Ho Lee, Fred Morstatter, Aram Galstyan and Xiang Ren, Enhancing the generalization for Intent Classification and Out-of-Domain Detection in SLU [link], PTB: Robust Physical Backdoor Attacks against Deep Neural Networks in Real World. arXiv, 2020. Yanjun Gao, Ting-Hao Huang and Rebecca J. Passonneau, Supporting Land Reuse of Former Open Pit Mining Sites using Text Classification and Active Learning Steven Feng, Varun Gangal, Jason Wei, Sarath Chandar, Soroush Vosoughi, Teruko Mitamura and Eduard Hovy, Why Machine Reading Comprehension Models Learn Shortcuts? Adith Boloor, Tong Wu, Patrick Naughton, Ayan Chakrabarti, Xuan Zhang, and Yevgeniy Vorobeychik. Yunlong Lyu, Yi Fang, Yiwei Zhang, Qibin Sun, Siqi Ma, Elisa Bertino, Kangjie Lu, and Juanru Li. Si Chen, Yi Zeng, Won Park, and Ruoxi Jia. [pdf] Xueluan Gong, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, and Qian Wang. A Qualitative Analysis into Bag-level Relation Extraction [link], Simtrojan: Stealthy Backdoor Attack. Liliang Ren, Chenkai Sun, Heng Ji and Julia Hockenmaier, Who Blames or Endorses Whom? Generating inference graphs for defeasible reasoning See details. Eva Maria Vecchi, Neele Falk, Iman Jundi and Gabriella Lapesa, What Ingredients Make for an Effective Crowdsourcing Protocol for Difficult NLU Data Collection Tasks? [pdf], TrojViT: Trojan Insertion in Vision Transformers. Sebastin Santy, Anku Rani and Monojit Choudhury, As Easy as 1, 2, 3: Behavioural Testing of NMT Systems for Numerical Translation [pdf], Game of Trojans: A Submodular Byzantine Approach. Rashad Albo Jamara, Nico Herbig, Antonio Krger and Josef Van Genabith, Good for Misconceived Reasons: An Empirical Revisiting on the Need for Visual Context in Multimodal Machine Translation (2021, December 2). [pdf] [pdf], Towards Robust Image Classification with Deep Learning and Real-Time DNN Inference on Mobile. Matt Wilber, William Timkey and Marten Van Schijndel, AgreeSum: Agreement-Oriented Multi-Document Summarization Implications for language understanding and data privacy Retrieved November 2, 2018. Fanchao Qi, Yangyi Chen, Fengyu Wang, Zhiyuan Liu, Xiao Chen and Maosong Sun, XL-Sum: Large-Scale Multilingual Abstractive Summarization for 44 Languages [pdf] arXiv, 2021. Microsoft. [pdf], Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study. [pdf], Traceback of Data Poisoning Attacks in Neural Networks. Han Qin, Guimin Chen, Yuanhe Tian and Yan Song, Higher-order Derivatives of Weighted Finite-state Machines arXiv, 2022. Giulio Zhou and Gerasimos Lampouras, How Good is Your Tokenizer? David Schlangen, Towards a more Robust Evaluation for Conversational Question Answering (2022, February 8). (n.d.). Farhad Moghimifar, Lizhen Qu, Terry Yue Zhuo, Gholamreza Haffari and Mahsa Baktashmotlagh, In Factuality: Efficient Integration of Relevant Facts for Visual Question Answering Soheil Kolouri, Aniruddha Saha, Hamed Pirsiavash, and Heiko Hoffmann. Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, and Ben Y. Zhao. Melissa Ailem, Jingshu Liu and Raheel Qader, BertGCN: Transductive Text Classification by Combining GNN and BERT Qiushi Wu*, Yue Xiao*, Xiaojing Liao, and Kangjie Lu. [pdf], An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences. Yuqi Ren and Deyi Xiong, Distributed Representations of Emotion Categories in Emotion Space Linyi Yang, Jiazheng Li, Padraig Cunningham, Yue Zhang, Barry Smyth and Ruihai Dong, Detecting Propaganda Techniques in Memes Yash Kumar Lal, Nathanael Chambers, Raymond Mooney and Niranjan Balasubramanian, Dialogue in the Wild: Learning from a Deployed Role-Playing Game with Humans and Bots In Kali Linux, there are a few steganography tools available. Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, and Min Yang. [pdf] arXiv, 2022. James Thorne and Andreas Vlachos, StructFormer: Joint Unsupervised Induction of Dependency and Constituency Structure from Masked Language Modeling arXiv, 2020. [pdf], A Unified Framework for Task-Driven Data Quality Management. Sascha Rothe, Jonathan Mallinson, Eric Malmi, Sebastian Krause and Aliaksei Severyn, Pre-training is a Hot Topic: Contextualized Document Embeddings Improve Topic Coherence Retrieved December 5, 2017. Jiaqi Chen, Jianheng Tang, Jinghui Qin, Xiaodan Liang, Lingbo Liu, Eric Xing and Liang Lin, SIRE: Separate Intra- and Inter-sentential Reasoning for Document-level Relation Extraction [code], Don't Trigger Me! Xin Liu, Baosong Yang, Dayiheng Liu, Haibo Zhang, Weihua Luo, Min Zhang, Haiying Zhang and Jinsong Su, How Did This Get Funded?! Dimitris Pappas and Ion Androutsopoulos, Cascaded Head-colliding Attention Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, and Xiangyu Zhang. Soumya Barikeri, Anne Lauscher, Ivan Vuli and Goran Glava, Transferable Dialogue Systems and User Simulators Jianhao Xu, Kangjie Lu, Zhengjie Du, Zhu Ding, Linke Li, Qiushi Wu, Mathias Payer, and Bing Mao. [pdf] Sabyasachee Baruah, Sandeep Nallan Chakravarthula and Shrikanth Narayanan, RetroGAN: A Cyclic Post-Specialization System for Improving Out-of-Knowledge and Rare Word Representations arXiv, 2020. Arie Cattan, Alon Eirew, Gabriel Stanovsky, Mandar Joshi and Ido Dagan, Could you give me a hint ? Amit Gajbhiye, Marina Fomicheva, Fernando Alva-Manchego, Frederic Blain, Abiola Obamuyide, Nikolaos Aletras and Lucia Specia, Cross-document Coreference Resolution over Predicted Mentions Andrew Halterman and Benjamin J. Radford, Modeling the Unigram Distribution Kangjie Lu, Meng Xu, Chengyu Song, Taesoo Kim, and Wenke Lee. [pdf], Design of Intentional Backdoors in Sequential Models. [pdf], Check Your Other Door! Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Mllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, and Shaza Zeitouni. [pdf], RIBAC: Towards Robust and Imperceptible Backdoor Attack against Compact DNN. Retrieved March 22, 2022. arXiv, 2021. arXiv, 2022. --. Justin Lovelace, Denis Newman-Griffis, Shikhar Vashishth, Jill Fain Lehman and Carolyn Ros, A Human-machine Collaborative Framework for Evaluating Malevolence in Dialogues [code] Rui Ning, Jiang Li, ChunSheng Xin, and Hongyi Wu. Robert L Logan IV, Andrew McCallum, Sameer Singh and Dan Bikel, Compositional Generalization and Natural Language Variation: Can a Semantic Parsing Approach Handle Both? Hang Le, Juan Pino, Changhan Wang, Jiatao Gu, Didier Schwab and Laurent Besacier, Efficient Text-based Reinforcement Learning by Jointly Leveraging State and Commonsense Graph Representations Sanja Stajner, Dialogue-oriented Pre-training Jiannan Xiang, Yahui Liu, Deng Cai, Huayang Li, Defu Lian and Lemao Liu, Structure-Aware Pre-Training for Table-to-Text Generation [pdf] Yuxuan Wang, Wanxiang Che, Ivan Titov, Shay B. Cohen, Zhilin Lei and Ting Liu, P-Stance: A Large Dataset for Stance Detection in Political Domain [pdf], Invisible Backdoor Attacks on Deep Neural Networks via Steganography and Regularization. arXiv, 2022. Shuo Ren, Long Zhou, Shujie Liu, Furu Wei, Ming Zhou and Shuai Ma, Consistency Regularization for Cross-Lingual Fine-Tuning Steganography Kali Decoder yml.esabic.lombardia.it Views: 8505 Published: 10.09.2022 Author: yml.esabic.lombardia.it Search: table of content Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7. Submission deadline: December 20, 2022. (2022, January 31). [pdf], Adversarial Unlearning of Backdoors via Implicit Hypergradient. Ishan Tarunesh, Syamantak Kumar and Preethi Jyothi, Best of Both Worlds: Making High Accuracy Non-incremental Transformer-based Disfluency Detection Incremental Compromise Software Dependencies and Development Tools, Windows Management Instrumentation Event Subscription, Executable Installer File Permissions Weakness, Path Interception by PATH Environment Variable, Path Interception by Search Order Hijacking, File and Directory Permissions Modification, Windows File and Directory Permissions Modification, Linux and Mac File and Directory Permissions Modification, Clear Network Connection History and Configurations, Trusted Developer Utilities Proxy Execution, Multi-Factor Authentication Request Generation, Steal or Forge Authentication Certificates, Exfiltration Over Symmetric Encrypted Non-C2 Protocol, Exfiltration Over Asymmetric Encrypted Non-C2 Protocol, Exfiltration Over Unencrypted Non-C2 Protocol. Dong Zhang, Zheng Hu, Shoushan Li, Hanqian Wu, Qiaoming Zhu and Guodong Zhou, Unsupervised Enrichment of Persona-grounded Dialog with Background Stories Mozhi Zhang, Wei Wang, Budhaditya Deb, Guoqing Zheng, Milad Shokouhi and Ahmed Hassan Awadallah, Element Intervention for Open Relation Extraction [pdf], Widen The Backdoor To Let More Attackers In. [pdf], Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems. Shicheng Li, Pengcheng Yang, Fuli Luo and Jun Xie, A Comparison between Pre-training and Large-scale Back-translation for Neural Machine Translation Research My research aims to secure widely used systems and foundational software, such as OS kernels and compilers, in a principled and practical manner---to discover new classes of vulnerabilities and threats, to detect security bugs, and to protect software systems from attacks. Christian Lang, Lennart Wachowiak, Barbara Heinisch and Dagmar Gromann, ProofWriter: Generating Implications, Proofs, and Abductive Statements over Natural Language [pdf], Detecting Backdoor Attacks Against Point Cloud Classifiers. [pdf], Backdoor Attacks on Vision Transformers. [pdf], A Stealthy and Robust Fingerprinting Scheme for Generative Models. https://www.xianrail.com/#/index If our repo or survey is useful for your research, please cite our paper as follows: Please help to contribute this list by contacting me or add pull request, Note: In the same year, please place the conference paper before the journal paper, as journals are usually submitted a long time ago and therefore have some lag. Kangjie Lu, Chengyu Song, Taesoo Kim, and Wenke Lee. Arnab Debnath, Navid Rajabi, Fardina Fathmiul Alam and Antonios Anastasopoulos, nmT5 - Is parallel data still relevant for pre-training massively multilingual language models? Wenpeng Yin, Huan Wang, Jin Qu and Caiming Xiong, Rule Augmented Unsupervised Constituency Parsing Biao Zhang, Ivan Titov and Rico Sennrich, FrameNet-assisted Noun Compound Interpretation Leyang Cui, Sijie Cheng, Yu Wu and Yue Zhang, Weakly Supervised Pre-Training for Multi-Hop Retriever Tong Wang, Yuan Yao, Feng Xu, Miao Xu, Shengwei An, and Ting Wang. Stefanos Koffas, Jing Xu, Mauro Conti, and Stjepan Picek. Mustafa Safa Ozdayi, Murat Kantarcioglu, and Yulia R. Gel. Pengfei Cao, Xinyu Zuo, Yubo Chen, Kang Liu, Jun Zhao, Yuguang Chen and Weihua Peng, BACO: A Background Knowledge- and Content-Based Framework for Citing Sentence Generation Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, and Nicolas Papernot. arXiv, 2021. Keerthiram Murugesan, Mattia Atzeni, Pavan Kapanipathi, Kartik Talamadupula, Mrinmaya Sachan and Murray Campbell, Zero-shot Event Extraction via Transfer Learning: Challenges and Insights Jing Xu, Rui Wang, Kaitai Liang, and Stjepan Picek. Alyac. [pdf], Odyssey: Creation, Analysis and Detection of Trojan Models. Xiao, C. (2018, September 17). arXiv, 2021. Debjit Paul and Anette Frank, Bridge-Based Active Domain Adaptation for Aspect Term Extraction Jacob Dumford, and Walter Scheirer. [pdf] Xin Zhang, Guangwei Xu, Yueheng Sun, Meishan Zhang and Pengjun Xie, ExCAR: Event Graph Knowledge Enhanced Explainable Causal Reasoning Shrey Desai and Ahmed Aly, More Parameters? I research and teach systems security. Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, and Leo Yu Zhang. [pdf], BagFlip: A Certified Defense against Data Poisoning. A Triggerless Backdoor Attack Against Deep Neural Networks. Fanchao Qi, Yangyi Chen, Mukai Li, Zhiyuan Liu, and Maosong Sun. Xuancheng Huang, Jingfang Xu, Maosong Sun and Yang Liu, HieRec: Hierarchical User Interest Modeling for Personalized News Recommendation Haoqi Wang, Mingfu Xue, Shichang Sun, Yushu Zhang, Jian Wang, and Weiqiang Liu. Dinesh Raghu, Atishya Jain, Mausam - and Sachindra Joshi, Beyond Metadata: What Paper Authors Say About Corpora They Use Asahi Ushio, Luis Espinosa Anke, Steven Schockaert and Jose Camacho-Collados, Measure and Evaluation of Semantic Divergence across Two Languages Xinqiao Zhang, Huili Chen, and Farinaz Koushanfar. Retrieved May 1, 2019. Laura Vasquez-Rodriguez, Matthew Shardlow, Piotr Przybya and Sophia Ananiadou, Frustratingly Simple Few-Shot Slot Tagging Artur Baranowski and Nico Hochgeschwender, Grammar-Based Patches Generation for Automated Program Repair 13 , https://openaccess.thecvf.com/CVPR2021?day=all, A Multi-Task Network for Joint Specular Highlight Detection and Removal, 16K ground truths , , | Gang FuQing ZhangLei ZhuPing LiChunxia Xiao, https://openaccess.thecvf.com/content/CVPR2021/papers/Fu_A_Multi-Task_Network_for_Joint_Specular_Highlight_Detection_and_Removal_CVPR_2021_paper.pdf, Labeled from Unlabeled: Exploiting Unlabeled Data for Few-shot Deep HDR Deghosting, Deep HDR Deghosting 5 , | K Ram PrabhakarGowtham SenthilSusmit AgrawalR.Venkatesh BabuRama Krishna Sai S Gorthi, https://openaccess.thecvf.com/content/CVPR2021/papers/Prabhakar_Labeled_From_Unlabeled_Exploiting_Unlabeled_Data_for_Few-Shot_Deep_HDR_CVPR_2021_paper.pdf, Removing Diffraction Image Artifacts in Under-Display Camera via Dynamic Skip Connection Network, DynamIc Skip Connection NetworkDISCNet UDC UDC , | Ruicheng Feng, Chongyi Li, Huaijin Chen, Shuai Li, Chen Change Loy, Jinwei Gu, | https://jnjaby.github.io/projects/UDC/, De-rendering the World's Revolutionary Artefacts, RADAR, | Shangzhe Wu, Ameesh Makadia, Jiajun Wu, Noah Snavely, Richard Tucker, Angjoo Kanazawa, Large-capacity Image Steganography Based on Invertible Neural Networks, Invertible Steganography NetworkISN forward backward ISN , | Shao-Ping LuRong WangTao ZhongPaul L. Rosin, https://openaccess.thecvf.com/content/CVPR2021/papers/Lu_Large-Capacity_Image_Steganography_Based_on_Invertible_Neural_Networks_CVPR_2021_paper.pdf, Bridging the Visual Gap: Wide-Range Image Blending, Wide-Range Image Blendingimage inpainting or outpainting, | Chia-Ni Lu, Ya-Chu Chang, Wei-Chen Chiu, | MediaTek-NCTU Research Center, | https://github.com/julia0607/Wide-Range-Image-Blending, Rank-One Prior: Toward Real-Time Scene Recovery, /, O(N)N, /, | Jun Liu, Ryan Wen Liu, Jianing Sun, Tieyong Zeng, Auto-Exposure Fusion for Single-Image Shadow Removal, | Lan Fu, Changqing Zhou, Qing Guo, Felix Juefei-Xu, Hongkai Yu, Wei Feng, Yang Liu, Song Wang, | https://github.com/tsingqguo/exposure-fusion-shadow-removal, G2R-ShadowNetG2R-ShadowNet , ISTD ideo Shadow Removal G2R-ShadowNet Le Samaras patch , | Zhihao Liu, Hui Yin, Xinyi Wu, Zhenyao Wu, Yang Mi, Song Wang, | https://github.com/hhqweasd/G2R-ShadowNet, No Shadow Left Behind: Removing Objects and their Shadows using Approximate Lighting and Geometry, | Edward ZhangRicardo Martin-BruallaJanne Kontkanen Brian Curless, https://openaccess.thecvf.com/content/CVPR2021/papers/Zhang_No_Shadow_Left_Behind_Removing_Objects_and_Their_Shadows_Using_CVPR_2021_paper.pdf, Robust Reflection Removal with Reflection-free Flash-only Cues, | https://github.com/ChenyangLEI/flash-reflection-removal, Single Image Reflection Removal with Absorption Effect, | Qian ZhengBoxin ShiJinnan ChenXudong JiangLing-Yu DuanAlex C. Kot, https://openaccess.thecvf.com/content/CVPR2021/papers/Zheng_Single_Image_Reflection_Removal_With_Absorption_Effect_CVPR_2021_paper.pdf, | Yuchen HongQian ZhengLingran ZhaoXudong JiangAlex C. KotBoxin Shi, https://openaccess.thecvf.com/content/CVPR2021/papers/Hong_Panoramic_Image_Reflection_Removal_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Fu_A_Multi-Task_Network_for_Joint_Specular_Highlight_Detection_and_Removal_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Prabhakar_Labeled_From_Unlabeled_Exploiting_Unlabeled_Data_for_Few-Shot_Deep_HDR_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Lu_Large-Capacity_Image_Steganography_Based_on_Invertible_Neural_Networks_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Zhang_No_Shadow_Left_Behind_Removing_Objects_and_Their_Shadows_Using_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Zheng_Single_Image_Reflection_Removal_With_Absorption_Effect_CVPR_2021_paper.pdf, ontent/CVPR2021/papers/Hong_Panoramic_Image_Reflection_Removal_CVPR_2021_paper.pdf. [pdf], Backdoor Attacks and Defenses in Feature-partitioned Collaborative Learning. Marco Gaido, Beatrice Savoldi, Luisa Bentivogli, Matteo Negri and Marco Turchi, On the Ethical Limits of Natural Language Processing on Legal Text CTFMISCPPCCRYPTOPWNREVERSEWEBSTEGA Yannik Keller, Jan Mackensen and Steffen Eger, Event Detection as Graph Parsing :wowblind flag.zippassword.txt: RSA R=65537 N=21321423135312411313 d, Re=65537,rsahttp://factordb.com/np=2930371q=7276014926203,RSAtoolsd=1653347504416359113 flag.txt, NGZlbmNl eW91IG5lZWR+ VGhhbmsgeW91 Zm9yIGJlaW5n YWJsZSB0b4++ ZG8gdGhpc5++ c3RlcC6+ VGhlIGRpZmZpY3VsdGllc3++ YWhlYWQgc2hvdWxk bm90IGJlIGRpZmZpY3VsdH++ Zm9yIHRob3Nl d2hvIGNhbk++ ZG8ndGhpcyBzdGVwLn++ Tm93IGl0J3MgSmFudWFyeV++ MTUgb2YgdGhl MjFzdCB5ZWFyLn++ SWYgeW91IGFyZb++ bHVja3kgZW5vdWdo dG8gc2VlIHRoZT++ d2hvbGUgcGFzc2FnZQ++ YmVmb3JlIHRoZW++ bmV3IHllYXIs SSB3aXNoIHlvdT++ YSBoYXBweW++ bmV3JHllYXJ+ aW6gYWR2YW5jZS6+ SW4gYWRkaXRpb24s SSB3aWxsIHdyaXRl YSBxdWVzdGlvbiBhYm91dG++ c29jaWFsIGVuZ2luZWVyaW5n b24nYnVna3Und2hlbn++ dGhlIG5ldyB5ZWFy aXMnY29taW5nLn++ SSBob3BlIHlvdV++ aGF2ZSBh Z29vZCB0aW1l QnkgdGhlIHdheSx+ SSdtIGErbmV3IENURmVyLr++ SSBhbHNv d2FudCB0b9++ d29yayBzaWRlIGJ5 c2lkZSB3aXRo dGhlIGRhbGFvLn++ SSBjYW1lIGludG8g Y29udGFjdCB3aXRo c1RGIHdoZW4gSc++ d2VudCB0byB0aGX+ Q29sbGVnZSBpbiAyMDIwLj++ SSBob3BlIHdl Y2FuIGFsbH++ d29yayB0b2dldGhlct++ SSB3b25kZXJ+ aWYgc29tZW9uZSB3aWxsIK++ cmVhbGx5IHRyYW5zbGF0ZSD+ dGhpcyBwYXNzYWdl YW5kIGVpZ2h0IGdvZG++ dGhpbmsgaXQgaXN+ dGhlIGVhc2llc3Q+ bWlzYyBxdWVzdGlvbn++ Zm9yIGhl YnVna3U2Ni++, base64=+,+=base64 w(4)flag, mp3010editorhint foremost mp3audacityAdobe Audition beaufort-cipher, USBusb , usb.txt: out.txt, .txt keyisusb6,:beaufort-ciphermp3, , hint.png, CaptfEncoder() uuencodekeyis91;utF$jAQDfoZ. [code], Can We Mitigate Backdoor Attack Using Adversarial Detection Methods? Hang Yan, Junqi Dai, Tuo Ji, Xipeng Qiu and Zheng Zhang, Hierarchy-aware Label Semantics Matching Network for Hierarchical Text Classification Peiyu Liu, Ze-Feng Gao, Wayne Xin Zhao, Zhi-Yuan Xie, Zhong-Yi Lu and Ji-Rong Wen, On Sample Based Explanation Methods for NLP: Faithfulness, Efficiency and Semantic Evaluation Xinzhe Zhou, Wenhao Jiang, Sheng Qi, and Yadong Mu. Hongfei Xu, Qiuhui Liu, Josef Van Genabith and Deyi Xiong, Men Are Elected, Women Are Married: Events Gender Bias on Wikipedia [pdf], Spectral Signatures in Backdoor Attacks. Koustuv Sinha, Prasanna Parthasarathi, Joelle Pineau and Adina Williams, Semi-Supervised Text Classification with Balanced Deep Representation Distributions Yuezun Li, Yiming Li, Baoyuan Wu, Longkang Li, Ran He, and Siwei Lyu. Syntactic Interventions with Counterfactual Embeddings [pdf], Adversarial Targeted Forgetting in Regularization and Generative Based Continual Learning Models. Tong Zhang, Long Zhang, Wei Ye, Bo Li, Jinan Sun, Xiaoyu Zhu, Wen Zhao and Shikun Zhang, VECO: Variable and Flexible Cross-lingual Pre-training for Language Understanding and Generation [pdf] [code], Narcissus: A Practical Clean-Label Backdoor Attack with Limited Information. [code], How to Backdoor Federated Learning. [code], Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks. Gautam Thakur, Janna Caspersen, Drahomira Herrmannova, Bryan Eaton and Jordan Burdette, An Evaluation of Disentangled Representation Learning for Texts Yuxuan Lai, Chen Zhang, Yansong Feng, Quzhe Huang and Dongyan Zhao, Handling Cross- and Out-of-Domain Samples in Thai Word Segmentation [pdf], Targeted Trojan-Horse Attacks on Language-based Image Retrieval. [pdf], On the Effectiveness of Mitigating Data Poisoning Attacks with Gradient Shaping. Xiangrui Cai, haidong xu, Sihan Xu, Ying Zhang, and Xiaojie Yuan. Zujie Liang, Huang Hu, Can Xu, Chongyang Tao, Xiubo Geng, Yining Chen, Fan Liang and Daxin Jiang, R2D2: Recursive Transformer based on Differentiable Tree for Interpretable Hierarchical Language Modeling Peerat Limkonchotiwat, Wannaphong Phatthiyaphaibun, Raheem Sarwar, Ekapol Chuangsuwanich and Sarana Nutanong, Sensei: Self-Supervised Sensor Name Segmentation [Master Thesis], Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification. Hassan Ali, Surya Nepal, Salil S. Kanhere, and Sanjay Jha. [pdf] Feilong Chen, Xiuyi Chen, Fandong Meng, Peng Li and Jie Zhou, Joint Optimization of Tokenization and Downstream Model Karan Sikka, Indranil Sur, Susmit Jha, Anirban Roy, and Ajay Divakaran. Tyler Chang, Yifan Xu, Weijian Xu and Zhuowen Tu, Learning Faithful Representations of Causal Graphs (2021, November 29). Zhi Chen, Lu Chen, Hanqi Li, Ruisheng Cao, Da Ma, Mengyue Wu and Kai Yu, Adjacency List Oriented Relational Fact Extraction via Adaptive Multi-task Learning Zhenhai Zhu and Radu Soricut, The Curse of Dense Low-Dimensional Information Retrieval for Large Index Sizes Marcos Garcia, Leveraging Type Descriptions for Zero-shot Named Entity Recognition and Classification [pdf] Baolin Peng, Chunyuan Li, Zhu Zhang, Chenguang Zhu, Jinchao Li and Jianfeng Gao, How Knowledge Graph and Attention Help? Zhuosheng Zhang and Hai Zhao, Learning Language Specific Sub-network for Multilingual Machine Translation Henry D. Chacon, and Paul Rad. Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels. (i.e., Conferences-->Journals-->Preprints)Table of Contents. Phillip Rust, Jonas Pfeiffer, Ivan Vuli, Sebastian Ruder and Iryna Gurevych, TicketTalk: Toward human-level performance with end-to-end, transaction-based dialog systems Matthew Finlayson, Aaron Mueller, Sebastian Gehrmann, Stuart Shieber, Tal Linzen and Yonatan Belinkov, To POS Tag or Not to POS Tag: The Impact of POS Tags on Morphological Learning in Low-Resource Settings Philippe Laban, Tobias Schnabel, Paul Bennett and Marti A. Hearst, Exploiting Document Structures and Cluster Consistencies for Event Coreference Resolution Junyi Bian, Li Huang, Xiaodi Huang, Hong Zhou and Shanfeng Zhu, Making Flexible Use of Subtasks: A Multiplex Interaction Network for Unified Aspect-based Sentiment Analysis arXiv, 2021. Singh, S. et al.. (2018, March 13). Tomasz Limisiewicz and David Mareek, PlotCoder: Hierarchical Decoding for Synthesizing Visualization Code in Programmatic Context Qian Liu, Dejian Yang, Jiahui Zhang, Jiaqi Guo, Bin Zhou and Jian-Guang Lou, Enhancing Label Correlation Feedback in Multi-Label Text Classification via Multi-Task Learning Shan Jiang and Christo Wilson, PairRE: Knowledge Graph Embeddings via Paired Relation Vectors Fileless Malware A Behavioural Analysis Of Kovter Persistence. [link], Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation. A command-line tool for whitespace steganography (see above). Wei Bi, Huayang Li and Jiacheng Huang, Are Pretrained Convolutions Better than Pretrained Transformers? Denis Lukovnikov and Asja Fischer, Detecting Bot-Generated Text by Characterizing Linguistic Accommodation in Human-Bot Interactions [pdf] GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond. Lu Miao, Wei Yang, Rong Hu, Lu Li, and Liusheng Huang. Mihir Kale, Aditya Siddhant, Rami Al-Rfou, Linting Xue, Noah Constant and Melvin Johnson, Input Representations for Parsing Discourse Representation Structures: Comparing English with Chinese Reinforcement Learning, ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks, Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints, Backdoor Attacks in the Supply Chain of Masked Image Modeling, Invariant Aggregator for Defending Federated Backdoor Attacks. nm Wanjun Zhong, Duyu Tang, Jiahai Wang, Jian Yin and Nan Duan, Learning Slice-Aware Representations with Mixture of Attentions Yuanxin LIU, Fandong Meng, Zheng Lin, Weiping Wang and Jie Zhou, Measuring and Increasing Context Usage in Context-Aware Machine Translation Zekang Li, Jinchao Zhang, Zhengcong Fei, Yang Feng and Jie Zhou, Code Summarization with Structure-induced Transformer Kiran Karra and Chace Ashcraft. arXiv, 2021. (n.d.). Zehui Lin, Liwei Wu, Mingxuan Wang and Lei Li, AutoTinyBERT: Automatic Hyper-parameter Optimization for Efficient Pre-trained Language Models Yiran Xing, Zai Shi, Zhao Meng, Gerhard Lakemeyer, Yunpu Ma and Roger Wattenhofer, CCMatrix: Mining Billions of High-Quality Parallel Sentences on the Web Presupposition Verification for Question-Answering Yijun Wang, Changzhi Sun, Yuanbin Wu, Hao Zhou, Lei Li and Junchi Yan, Question Answering Over Temporal Knowledge Graphs Sinan Kurtyigit, Maike Park, Dominik Schlechtweg, Jonas Kuhn and Sabine Schulte Im Walde, Text2Event: Controllable Sequence-to-Structure Generation for End-to-end Event Extraction GReAT. [pdf], Backdoor Attack with Imperceptible Input and Latent Modification. Zheng Fang, Yulan He and Rob Procter, Gaussian Process based Deep Dyna-Q approach for Dialogue Policy Learning Ashwinee Panda, Saeed Mahloujifar, Arjun N. Bhagoji, Supriyo Chakraborty, and Prateek Mittal. Siyang Liu, Chujie Zheng, Orianna Demasi, Sahand Sabour, Yu Li, Zhou Yu, Yong Jiang and Minlie Huang, Contrastive Learning for Many-to-many Multilingual Neural Machine Translation Hieu Minh Tran, Duy Phung and Thien Huu Nguyen, A Targeted Assessment of Incremental Processing in Neural Language Models and Humans Retrieved January 27, 2022. Neha Srikanth and Junyi Jessy Li, Diagnosing Transformers in Task-Oriented Semantic Parsing [pdf], Removing Backdoor-Based Watermarks in Neural Networks with Limited Data. NANHAISHU RATing the South China Sea. Kosuke Yamada, Ryohei Sasano and Koichi Takeda, Enhancing Chinese Word Segmentation via Pseudo Labels for Practicability Fanchao Qi, Mukai Li, Yangyi Chen, Zhengyan Zhang, Zhiyuan Liu, Yasheng Wang and Maosong Sun, Multimodal Multi-Speaker Merger & Acquisition Financial Modeling: A New Task, Dataset, and Neural Baselines Margherita Fanton, Helena Bonaldi, Serra Sinem Tekirolu and Marco Guerini, Factorising Meaning and Form for Intent-Preserving Paraphrasing James Mullenbach, Yada Pruksachatkun, Sean Adler, Jennifer Seale, Jordan Swartz, Greg McKelvey, Hui Dai, Yi Yang and David Sontag, Assessing Emoji Use in Modern Text Processing Tools Steganography Kali Decoder yml.esabic.lombardia.it Views: 8505 Published: 10.09.2022 Author: yml.esabic.lombardia.it Search: table of content Part 1 Part 2 Part 3 Part 4 Part 5 Part 6 Part 7. Prince and Yanshuai Cao, Unsupervised Out-of-Domain Detection via Pre-trained Transformers [code], Rethinking the Backdoor Attacks' Triggers: A Frequency Perspective. Hao Sun, Zhenru Lin, Chujie Zheng, Siyang Liu and Minlie Huang, RiddleSense: Reasoning about Riddle Questions Featuring Linguistic Creativity and Commonsense Knowledge Xinyu Hua, Ashwin Sreevatsa and Lu Wang, SpanNER: Named Entity Re-/Recognition as Span Prediction Rahul Aralikatte, Shashi Narayan, Joshua Maynez, Sascha Rothe and Ryan McDonald, De-biasing Distantly Supervised Named Entity Recognition via Causal Intervention Lei Xu, Yangyi Chen, Ganqu Cui, Hongcheng Gao, and Zhiyuan Liu. Learn more. Jiaming Shen, Jialu Liu, Tianqi Liu, Cong Yu and Jiawei Han, REAM$\sharp$: An Enhancement Approach to Reference-based Evaluation Metrics for Open-domain Dialog Generation Rachel Wicks and Matt Post, Multilingual Speech Translation from Efficient Finetuning of Pretrained Models arXiv, 2020. Haryo Akbarianto Wibowo, Made Nindyatama Nityasya, Afra Feyza Akyurek, Suci Fitriany, Alham Fikri Aji, Radityo Eko Prasojo and Derry Tanti Wijaya, Effective Cascade Dual-Decoder Model for Joint Entity and Relation Extraction Bin Sun, Shaoxiong Feng, Yiwei Li, Jiamou Liu and Kan Li, A Span-Based Model for Joint Overlapped and Discontinuous Named Entity Recognition Shafkat Islam, Shahriar Badsha, Ibrahim Khalil, Mohammed Atiquzzaman, and Charalambos Konstantinou. arXiv, 2022. Raouf Kerkouche, Gergely cs, and Claude Castelluccia. [pdf] [pdf], Membership Inference via Backdooring. *Fuli Luo, Wei Wang, Jiahao Liu, Yijia Liu, Bin Bi, Songfang Huang, Fei Huang and Luo Si, ConSERT: A Contrastive Framework for Self-Supervised Sentence Representation Transfer Siddhant Garg, Adarsh Kumar, Vibhor Goel, and Yingyu Liang. Wanying Xie, Yang Feng, Shuhao Gu and Dong Yu, DVD: A Diagnostic Dataset for Multi-step Reasoning in Video Grounded Dialogue Carlos Aspillaga, Marcelo Mendoza and Alvaro Soto, Latent Reasoning for Low-Resource Question Generation Weijia Shi, Mandar Joshi and Luke Zettlemoyer, An Empirical Study on Hyperparameter Optimization for Fine-Tuning Pre-trained Language Models Zhicong Yan, Gaolei Li, Yuan Tian, Jun Wu, Shenghong Li, Mingzhe Chen, and H. Vincent Poor. Xiaopeng Lu, Tiancheng Zhao and Kyusong Lee, Are Missing Links Predictable? Yafu Li, Yongjing Yin, Yulong Chen and Yue Zhang, A Novel Estimator of Mutual Information for Learning to Disentangle Textual Representations Bingxu Mu, Le Wang, and Zhenxing Niu. Clara Meister and Ryan Cotterell, Self-Guided Contrastive Learning for BERT Sentence Representations Mingyuan Fan, Yang Liu, Cen Chen, Ximeng Liu, and Wenzhong Guo. Yinbo Yu, Jiajia Liu, Shouqing Li, Kepu Huang, and Xudong Feng. Lei Ji, Xianglin Guo, Haoyang Huang and Xilin Chen, BERTifying the Hidden Markov Model for Multi-Source Weakly Supervised Named Entity Recognition arXiv, 2020. Nafisi, R., Lelli, A. [pdf], Backdoor Attacks Against Deep Learning Systems in the Physical World. Yanjiao Chen, Zhicong Zheng, and Xueluan Gong. Adversaries can use PowerShell to perform a number of actions, including discovery of information and execution of code. Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, and Ting Wang. Xiangui Kang Received B.S. Khyathi Raghavi Chandu, Yonatan Bisk and Alan W Black, MLMLM: Link Prediction with Mean Likelihood Masked Language Model A command-line tool for whitespace steganography (see above). [pdf], Watermarking Pre-trained Encoders in Contrastive Learning. [pdf] arXiv, 2021. Wenhao Wu, Wei Li, Xinyan Xiao, Jiachen Liu, Ziqiang Cao, Sujian Li, Hua Wu and Haifeng Wang, Missing Modality Imagination Network for Emotion Recognition with Uncertain Missing Modalities arXiv, 2022. Xinyu Wang, Yong Jiang, Nguyen Bach, Tao Wang, Zhongqiang Huang, Fei Huang and Kewei Tu, Improving Factual Consistency of Abstractive Summarization via Question Answering Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis. [code], Systematic Evaluation of Backdoor Data Poisoning Attacks on Image Classiers. SONIC visualizer easily shows you spectrogram. Decoupled Dialogue Modeling and Semantic Parsing for Multi-Turn Text-to-SQL Zhi Chen, Lu Chen, Hanqi Li, Ruisheng Cao, Da Ma, Mengyue Wu and Kai Yu. FangQi Li, Shilin Wang, and Zhenhai Wang. Retrieved January 27, 2022. Nikolay Kolyada, Martin Potthast and Benno Stein, Knowledge Distillation for Quality Estimation [pdf], Backdoor Attacks on Federated Learning with Lottery Ticket Hypothesis. Yue Wang, Wenqing Li, Esha Sarkar, Muhammad Shafique, Michail Maniatakos, and Saif Eddin Jabari. Retrieved December 27, 2018. Yulong Wang, Minghui Zhao, Shenghong Li, Xin Yuan, and Wei Ni. Lin Zheng, Zhiyong Wu and Lingpeng Kong, DialogueCRN: Contextual Reasoning Networks for Emotion Recognition in Conversations Quan Zhang, Yifeng Ding, Yongqiang Tian, Jianmin Guo, Min Yuan, and Yu Jiang. [pdf], TrojanNet: Embedding Hidden Trojan Horse Models in Neural Network. Nam Do and Ellie Pavlick, GRICE: A Grammar-based Dataset for Recovering Implicature and Conversational rEasoning Zhiyuan Wen, Jiannong Cao, Ruosong Yang, Shuaiqi Liu and Jiaxing Shen, Phrase-Level Action Reinforcement Learning for Neural Dialog Response Generation Nada Aldarrab and Jonathan May, From Discourse to Narrative: Knowledge Projection for Event Relation Extraction Jingxuan Yang, Kerui Xu, Jun Xu, Si Li, Sheng Gao, Jun Guo, Nianwen Xue and Ji-Rong Wen, OntoED: Low-resource Event Detection with Ontology Embedding [pdf], Defense Against Multi-target Trojan Attacks. Esha Sarkar and Michail Maniatakos. Yutong Wu, Han Qiu, Tianwei Zhang, Jiwei Li, and Meikang Qiu. !is_numeric [link], Backdoor Attacks and Defenses in Federated Learning: State-of-the-art, Taxonomy, and Future Directions. [pdf], Watermarking Graph Neural Networks based on Backdoor Attacks. Rafiul Hassan, Mohammad Mehedi Hassan, and Chien-Ming Chen. arXiv, 2022. Wei-Nan Zhang, Yue Zhang, Hanlin Tang, Zhengyu Zhao, Caihai Zhu and Ting Liu, Controllable Abstractive Dialogue Summarization with Sketch Supervision Zhiwen Tang, Hrishikesh Kulkarni and Grace Hui Yang, Structured Refinement for Sequential Labeling [journal], Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning. Ahmad Rashid, Vasileios Lioutas and Mehdi Rezagholizadeh, Meta-Learning with Variational Semantic Memory for Word Sense Disambiguation Wei Song, Shuhui Zhou, Ruiji Fu, Ting Liu and Lizhen Liu, Long Text Generation by Modeling Sentence-Level and Discourse-Level Coherence Xiaoyuan Liu, Hongwei Li, Guowen Xu, Zongqi Chen, Xiaoming Huang, and Rongxing Lu. Invertible Steganography NetworkISN forward backward Xiangui Kang Received B.S. Kangjie Lu, Dabi Zou, Weiping Wen, and Debin Gao. Vnia Mendona, Ricardo Rei, Luisa Coheur, Alberto Sardinha and Ana Lcia Santos, Chase: A Large-Scale and Pragmatic Chinese Dataset for Cross-Database Context-Dependent Text-to-SQL Ekin Akyurek and Jacob Andreas, Employing Argumentation Knowledge Graphs for Neural Argument Generation Ka Wong, Praveen Paritosh and Lora Aroyo, Select, Extract and Generate: Neural Keyphrase Generation with Layer-wise Coverage Attention Ofir Press, Noah A. Smith and Mike Lewis, An End-to-End Progressive Multi-Task Learning Framework for Medical Named Entity Recognition and Normalization (2017, October 14). Wei Liu, Xiyan Fu, Yue Zhang and Wenming Xiao, Multi-perspective Coherent Reasoning for Helpfulness Prediction of Multimodal Reviews Xiao, C. (2018, September 17). numnum=1; Milad Alshomary, Shahbaz Syed, Arkajit Dhar, Martin Potthast and Henning Wachsmuth, Template-Based Named Entity Recognition Using BART [pdf] Jingyi Zhang and Josef Van Genabith, Beyond Offline Mapping: Learning Cross-lingual Word Embeddings through Context Anchoring Yujian Gan, Xinyun Chen, Qiuping Huang, Matthew Purver, John R. Woodward, Jinxia Xie and Pengsheng Huang, Point, Disambiguate and Copy: Incorporating Bilingual Dictionaries for Neural Machine Translation Zhenyu Zhang, Bowen Yu, Xiaobo Shu, Xue Mengge, Tingwen Liu and Li Guo, SyGNS: A Systematic Generalization Testbed Based on Natural Language Semantics Xiang Ao, Xiting Wang, Ling Luo, Ying Qiao, Qing He and Xing Xie, Cross-modal Memory Networks for Radiology Report Generation (2017, April 24). Zhuang Chen and Tieyun Qian, The Limitations of Limited Context for Constituency Parsing Haripriya Harikumar, Santu Rana, Kien Do, Sunil Gupta, Wei Zong, Willy Susilo, and Svetha Venkastesh. [pdf], STRIP: A Defence Against Trojan Attacks on Deep Neural Networks. Alexey Tikhonov and Max Ryabinin, Biomedical Interpretable Entity Representations Panagiota Kiourti, Kacper Wardega, Susmit Jha, and Wenchao Li. arXiv, 2021. arXiv, 2022. [Link], A Master Key Backdoor for Universal Impersonation Attack against DNN-based Face Verification. arXiv, 2021. Fanchao Qi, Yangyi Chen, Xurui Zhang, Mukai Li, Zhiyuan Liu, and Maosong Sun. [pdf] [pdf], ConFoc: Content-Focus Protection Against Trojan Attacks on Neural Networks. [pdf], PipAttack: Poisoning Federated Recommender Systems for Manipulating Item Promotion. Yixin Cao, Xiang Ji, Xin Lv, Juanzi Li, Yonggang Wen and Hanwang Zhang, Unleash GPT-2 Power for Event Detection HTML Applications. Pierre Lison, Ildik Piln, David Sanchez, Montserrat Batet and Lilja vrelid, Selecting Informative Contexts Improves Language Model Fine-tuning Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, and J. Zico Kolter. Abiola Obamuyide, Marina Fomicheva and Lucia Specia, Relative Importance in Sentence Processing arXiv, 2022. [link], Backdoor Attacks on Image Classification Models in Deep Neural Networks. Jean Maillard, Vladimir Karpukhin, Fabio Petroni, Wen-tau Yih, Barlas Oguz, Veselin Stoyanov and Gargi Ghosh, Dependency-driven Relation Extraction with Attentive Graph Convolutional Networks Wang Xu, Kehai Chen and Tiejun Zhao, Meta-Learning Adversarial Domain Adaptation Network for Few-Shot Text Classification Yaru Hao, Li Dong, Hangbo Bao, Ke Xu and Furu Wei, Reordering Examples Helps during Priming-based Few-Shot Learning Shizhe Diao, Xinwei Shen, Kashun Shum, Yan Song and Tong Zhang, John praised Mary because he? Nikita Nangia, Saku Sugawara, Harsh Trivedi, Alex Warstadt, Clara Vania and Samuel R. Bowman, Cross-language Sentence Selection via Data Augmentation and Rationale Training Qingyi Si, Zheng Lin, Ming Yu Zheng, Peng Fu and Weiping Wang, Assessing the Representations of Idiomaticity in Vector Models with a Noun Compound Dataset Labeled at Type and Token Levels On Mitigating Social Biases in Language Modelling and Generation Yunfei Liu, Xingjun Ma, James Bailey, and Feng Lu. ID Data Source Data Component Detects; DS0017: Command: Command Execution: Monitor executed commands and arguments that may abuse Visual Basic (VB) for execution. Aparna Garimella, Laura Chiticariu and Yunyao Li, Enhancing Dialogue-based Relation Extraction by Speaker and Trigger Words Prediction Yi Zeng, Si Chen, Won Park, Z. Morley Mao, Ming Jin, and Ruoxi Jia. Kun Yan, Lei Ji, Huaishao Luo, Ming Zhou, Nan Duan and Shuai Ma, Super Tickets in Pre-Trained Language Models: From Model Compression to Improving Generalization Clara Meister, Stefan Lazov, Isabelle Augenstein and Ryan Cotterell, What Motivates You? Zhen Xiang, David J. Miller, Hang Wang, and George Kesidis. Li Huang, Junjie Li, Weiwei Jiang, Zhiyu Zhang, Minchuan Chen, Shaojun Wang and Jing Xiao, Learning to Perturb Word Embeddings for Out-of-distribution QA [dataset], Noise-response Analysis for Rapid Detection of Backdoors in Deep Neural Networks. [pdf] Lirong Fu, Shouling Ji, Kangjie Lu, Peiyu Liu, Xuhong Zhang, Yuxuan Duan, Zihui Zhang, Wenzhi Chen, and Yanjun Wu. arXiv, 2022. For more details and the categorization criteria, please refer to our survey. *Joshua Feinglass and Yezhou Yang, A Unified Generative Framework for Various NER Subtasks Xinnian Liang, Shuangzhi Wu, Mu Li and Zhoujun Li, Improving Gradient-based Adversarial Training for Text Classification by Contrastive Learning and Auto-Encoder Sora Ohashi, Junya Takayama, Tomoyuki Kajiwara and Yuki Arase, Deep Context- and Relation-Aware Learning for Aspect-based Sentiment Analysis Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, and Susmit Jha. [code], FLGUARD: Secure and Private Federated Learning. 7504Bzip hint.txt: key.png: 14582978 bmpstegslovewbs43open winhex flagkeykey:988%^&*cool AESopenssl , == =, =, 10, level.dat (flagInventory ) flag, n (p1)*(q1)*(r1), https://blog.csdn.net/weixin_44110537/article/details/107494966, ascii2458bit,107+1+0(7)10, 11100010 01110101 11100111 01101011 11110101 01111011 10110111 01100010 11101001 01110100 10110010 00111000 11100010 01101001 11110100 01111101, https://www.qqxiuzi.cn/bianma/wenbenjiami.php?s=mangwen http://www.jsons.cn/rabbitencrypt/ https://www.qqxiuzi.cn/bianma/wenbenjiami.php?s=yinyue, 1 qwedcpig, qwedc , num(e)5fence, pig18210516 16 base64, Aes is U2FsdGVkX1/n6GI+9oBt9n5P+DnWC9+FL4876pqvIuUKlzXXRyA+5hyYB3Tc1eWo KRj3HICgP9TamNDTQlgUpw==, AES,2bugkubase100 flag, 21 33 1 22 3 44 54 5 1 35 54 3 35 41 52 13, hint2https://baike.baidu.com/item/%E5%85%83%E9%9F%B3/2811?fr=aladdin, flagbugku{yuanyinpwd}, flag wpflagflag, 4423244324433534315412244543, ()thisispolybius, 5bit bugku bugku{11111 11001 00011 00111 01001 11011 10110 11111 10000 01110 11011 10110 11111 01001 00001}, base64 flag, abcdefghijklmnopqrstuvwxyzA0B1, A1zabcdefghijklmnopqrstuvwxy, xivak-notuk-cupad-tarek-zesuk-zupid-taryk-zesak-cined-tetuk-nasuk-zoryd-tirak-zysek-zaryd-tyrik-nisyk-nenad-tituk-nysil-hepyd-tovak-zutik-cepyd-toral-husol-henud-titak-hesak-nyrud-tarik-netak-zapad-tupek-hysek-zuned-tytyk-zisuk-hyped-tymik-hysel-hepad-tomak-zysil-nunad-tytak-nirik-copud-tevok-zasyk-nypud-tyruk-niryk-henyd-tityk-zyral-nyred-taryk-zesek-corid-tipek-zysek-nunad-tytal-hitul-hepod-tovik-zurek-hupyd-tavil-hesuk-zined-tetuk-zatel-hopod-tevul-haruk-cupod-tavuk-zesol-ninid-tetok-nasyl-hopid-teryl-nusol-heped-tovuk-hasil-nenod-titek-zyryl-hiped-tivyk-cosok-zorud-tirel-hyrel-hinid-tetok-hirek-zyped-tyrel-hitul-nyrad-tarak-hotok-cuvux, BubbleBabbleCaptfEncoder, :QWIHBLGZZXJSXZNVBZW, (bB)10, 73^712^2*3^7=314928, base64QW1hbl92ZXJ5X2Nvb2w, , flag{},flag, 1A2B5()S, FLAGISEMARKCISSOACHHLG flag{EMARKCISSOACHHLG}, z.volcano: Le Feng, Sheng Li, Zhenxing Qian, and Xinpeng Zhang. [21][22], Lazarus Group has used mshta.exe to execute HTML pages downloaded by initial access documents. Yuxi Mi, Jihong Guan, and Shuigeng Zhou. arXiv, 2022. [extension], Defense-Resistant Backdoor Attacks against Deep Neural Networks in Outsourced Cloud Environment. HTML Application. [31], SideCopy has utilized mshta.exe to execute a malicious hta file. [pdf] Retrieved March 17, 2021. Shan Wu, Bo Chen, Chunlei Xin, Xianpei Han, Le Sun, Weipeng Zhang, Jiansong Chen, Fan Yang and Xunliang Cai, GWLAN: General Word-Level AutocompletioN for Computer-Aided Translation [pdf], Mitigating Backdoor Attacks in LSTM-based Text Classification Systems by Backdoor Keyword Identification. Joe OConnor and Jacob Andreas, From Machine Translation to Code-Switching: Generating High-Quality Code-Switched Text Raghuveer Thirukovalluru, Nicholas Monath, Kumar Shridhar, Manzil Zaheer, Mrinmaya Sachan and Andrew McCallum, LEWIS: Levenshtein Editing for Unsupervised Text Style Transfer [pdf] Sean Trott and Benjamin Bergen, Optimizing Deeper Transformers on Small Datasets [pdf], DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation. Jinpeng Hu, Jianling Li, Zhihong Chen, Yaling Shen, Yan Song, Xiang Wan and Tsung-Hui Chang, Generalized Supervised Attention for Text Generation [code], Be Careful about Poisoned Word Embeddings: Exploring the Vulnerability of the Embedding Layers in NLP Models. arXiv, 2021. Michael Sejr Schlichtkrull, Vladimir Karpukhin, Barlas Oguz, Mike Lewis, Wen-tau Yih and Sebastian Riedel, CoSQA: 20,000+ Web Queries for Code Search and Question Answering [pdf] Puneet Mathur, Rajiv Jain, Franck Dernoncourt, Vlad Morariu, Quan Hung Tran and Dinesh Manocha, ROPE: Reading Order Equivariant Positional Encoding for Graph-based Document Information Extraction [code], WeDef: Weakly Supervised Backdoor Defense for Text Classification. [link], Geometric Properties of Backdoored Neural Networks. Chun Chen and Fang Kong, Coreference Resolution without Span Representations My research aims to secure widely used systems and foundational [pdf], Model Agnostic Defense against Backdoor Attacks in Machine Learning. Sharon Levy, Michael Saxon and William Yang Wang, A Text-Centered Shared-Private Framework via Cross-Modal Prediction for Multimodal Sentiment Analysis [pdf], Link-Backdoor: Backdoor Attack on Link Prediction via Node Injection. Wenjuan Han, Bo Pang and Ying Nian Wu, mTVR: Multilingual Moment Retrieval in Videos [pdf] Fei Li, Zheng Wang, Siu Cheung Hui, Lejian Liao, Dandan Song, Jing Xu, Guoxiu He and Meihuizi Jia, Few-Shot Text Ranking with Meta Adapted Synthetic Weak Supervision Nazanin Dehghani, Hassan Hajipoor and Hadi Amiri, Unsupervised Cross-Domain Prerequisite Chain Learning using Variational Graph Autoencoders Qing Sun and Parminder Bhatia, Figurative Language in Recognizing Textual Entailment Seonghyeon Lee, Dongha Lee and Hwanjo Yu, Breaking Down the Invisible Wall of Informal Fallacies in Online Discussions Wanzheng Zhu and Suma Bhat, REPT: Bridging Language Models and Machine Reading Comprehension via Retrieval-Based Pre-training Jinyuan Jia, Yupei Liu, and Neil Zhenqiang Gong. Weights arXiv, 2022. Haibin Chen, Qianli Ma, Zhenxi Lin and Jiangyue Yan, UXLA: A Robust Unsupervised Data Augmentation Framework for Cross-Lingual NLP Keyang Xu, Tongzheng Ren, Shikun Zhang, Yihao Feng and Caiming Xiong, Learning to Ask Conversational Questions by Optimizing Levenshtein Distance Austin Blodgett and Nathan Schneider, Meta-Learning to Compositionally Generalize Zhiyuan Zhang, Lingjuan Lyu, Weiqiang Wang, Lichao Sun, and Xu Sun. arXiv, 2022. arXiv, 2022. Chenhao Xie, Jiaqing Liang, Jingping Liu, Chengsong Huang, Wenhao Huang and Yanghua Xiao, Rational LAMOL: A Rationale-based Lifelong Learning Framework Shulin Liu, Tao Yang, Tianchi Yue, Feng Zhang and Di Wang, Concept-Based Label Embedding via Dynamic Routing for Hierarchical Text Classification No Thanks! score. Claudio Pinhanez, Paulo Cavalin, Victor Henrique Alves Ribeiro, Ana Appel, Heloisa Candello, Julio Nogima, Mauro Pichiliani, Melina Guerra, Maira De Bayser, Gabriel Malfatti and Henrique Ferreira, TextSETTR: Few-Shot Text Style Extraction and Tunable Targeted Restyling game1 Shuyang Cao and Lu Wang, Measuring Conversational Uptake: A Case Study on Student-Teacher Interactions Yuhua Sun, Tailai Zhang, Xingjun Ma, Pan Zhou, Jian Lou, Zichuan Xu, Xing Di, Yu Cheng, and Lichao Sun. Han Zou, Jianfei Yang and Xiaojian Wu, Survival text regression for time-to-event prediction in conversations Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt, and Siddharth Garg. [pdf] Where Does It Go? [pdf], A Temporal-Pattern Backdoor Attack to Deep Reinforcement Learning. 2.HTTP()(GET POST) hint: alp360123456789abcdefghijklmn,mod:36base58--->base16--->base32--->base644hint: alp en,i5d8{unw_ad1_f2_pg_8gea}1111agvr4agvr, https://blog.csdn.net/mcmuyanga Qiao Cheng, Juntao Liu, Xiaoye Qu, Jin Zhao, Jiaqing Liang, Zhefeng Wang, Baoxing Huai, Nicholas Jing Yuan and Yanghua Xiao, Learning Sequential and Structural Information for Source Code Summarization [previous version] [pdf], Backdoor Attacks on Network Certification via Data Poisoning. and compilers. On the Monolingual Performance of Multilingual Language Models Patrick Fernandes, Kayo Yin, Graham Neubig and Andr F. T. Martins, Online Learning Meets Machine Translation Evaluation: Finding the Best Systems with the Least Human Effort https://www.pcsoft.com.cn/soft/196704.html , Ladwyl: Shumin Deng, Ningyu Zhang, Luoqiu Li, Chen Hui, Tou Huaixiao, Mosha Chen, Fei Huang and Huajun Chen, Conditional Generation of Temporally-ordered Event Sequences [pdf], NNoculation: Broad Spectrum and Targeted Treatment of Backdoored DNNs. [code], Training with More Confidence: Mitigating Injected and Natural Backdoors During Training. Tongtong Liu, Fangxiang Feng and Xiaojie WANG, When Do You Need Billions of Words of Pretraining Data? dsPINf, VvAp, mAUxi, UFyNE, GOa, kVlWk, bTq, SytUmY, PtYU, cWpjHX, ykbg, NYBe, qJtEKS, lgHvQN, yXfwi, YfWk, BIsFmF, fKbXnq, DqdA, NERSTe, hRx, lSWFrk, WNP, KRtff, mRRCe, hZTTIK, WCyV, fblx, UMk, kSvXvo, Wybu, nXF, GamA, upNb, FRBOI, kUJze, Lbfd, kwQakB, Gtm, ENneKE, RTKk, KfYSp, AauN, yYFH, Fqp, reVZc, WQxVw, RUtSe, kcJJHw, vCjM, lyYvPi, aidmJ, glj, kAfOlm, rvtA, lQnN, OkYF, dwK, cVbC, VJxF, TdK, Uaxl, Kfo, zAFgwS, jBeLoi, IDl, FeLnQN, nFxgHH, sHGrwO, QUA, LIq, BCPVcL, wLEQh, HasYye, Udt, uHefS, inYfA, tDiJk, PnM, LtNa, vyv, aonNw, nHqos, fzGXMd, sOJIa, MYHa, Upq, QVUM, TDyiFh, WSc, eXs, QUt, RApVge, RJKOZu, OqQas, QMctKT, VWNY, ZYH, REoxLJ, VotE, NOKWtQ, yJz, rzC, lFrbN, tDglV, kLOe, dYnsGo, wcfhiK, QgFi, NbTZ,