Xutan Peng (@pzoom522) 's Twitter Profile
Xutan Peng

@pzoom522

Working @Huawei | PhD @SheffieldNLP | BEng @Beihang1952 | Ex-Interns @AmazonScience @TencentGlobal @SamsungResearch | Melomaniac | 话痨🦆

ID: 961809210349535232

linkhttps://www.xutan.me/ calendar_today09-02-2018 03:49:20

153 Tweet

257 Followers

321 Following

Jingfeng Yang (@jingfengy) 's Twitter Profile Photo

Pay attention to the commercial usage of code generation, and semantic parsing in dialogue systems! Our recent work demonstrates a successful attack to such commercial softwares.

Anti-Malware.Ru (@anti_malware) 's Twitter Profile Photo

Исследователи рассказали о новых кибератаках, в которых злоумышленники используют модель Text-to-SQL для создания вредоносного кода, позволяющего собирать конфиденциальную информацию и проводить DoS-атаки. anti-malware.ru/news/2023-01-1…

The Hacker News (@thehackersnews) 's Twitter Profile Photo

Academics reveal new Text-to-SQL model attacks that could potentially let attackers break into sensitive databases or launch DoS attacks. Read deatils: thehackernews.com/2023/01/new-st… #datasecurity #infosec #cybersecurity #privacy #technology #dataprotection

Information Security Buzz (@info_sec_buzz) 's Twitter Profile Photo

Text-to-SQL Vulnerabilities Allow Data Theft and DoS Attacks rli.to/w1M8I #infosec #cybersecurity #machinelearning #datascience #python #deeplearning #career #tech #computerscience #internetofthings #devopsengineer #careerwoman #datascientist

sam (@zapiklon) 's Twitter Profile Photo

Учёные провели первую в мире кибератаку с использованием искусственного интеллекта securitylab.ru/news/535550.php

Xutan Peng (@pzoom522) 's Twitter Profile Photo

We've updated the preprint - with #vulnerability demonstrations on *four* new commercial applications (namely #ChatGPT, #Text2Sql.ai, AiHelperBot, ToolSKE) in addition to the two targets in our previous version (Baidu UNIT & Ai2Sql)! #NLProc #NLP #cybersecurity

The University of Sheffield (@sheffielduni) 's Twitter Profile Photo

⚡️Our academics have found security vulnerabilities in six commercial AI tools that can lead to poisoning of #ChatGPT (and others’) training data. But how does poisoning an AI tool even work? 🧵 1/5

⚡️Our academics have found security vulnerabilities in six commercial AI tools that can lead to poisoning of #ChatGPT (and others’) training data. But how does poisoning an AI tool even work? 🧵 1/5
Xutan Peng (@pzoom522) 's Twitter Profile Photo

One special citation gained (although not counted by Google Scholar)! Three years after its publication, my early work (doi.org/10.18653/v1/20…) was mentioned by IBM in its brief overview on the entire Text Summarisation field 😂 ibm.com/topics/text-su…

One special citation gained (although not counted by Google Scholar)!

Three years after its publication, my early work (doi.org/10.18653/v1/20…) was mentioned by <a href="/IBM/">IBM</a>  in its brief overview on the entire Text Summarisation field 😂

ibm.com/topics/text-su…