Picture for Adams Wai-Kin Kong

Adams Wai-Kin Kong

Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances

Add code
Oct 24, 2024
Figure 1 for Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Figure 2 for Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Figure 3 for Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Figure 4 for Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Viaarxiv icon

Benchmarking Cross-Domain Audio-Visual Deception Detection

Add code
May 11, 2024
Viaarxiv icon

Improving Concept Alignment in Vision-Language Concept Bottleneck Models

Add code
May 03, 2024
Viaarxiv icon

MACE: Mass Concept Erasure in Diffusion Models

Add code
Mar 10, 2024
Viaarxiv icon

TF-ICON: Diffusion-Based Training-Free Cross-Domain Image Composition

Add code
Jul 25, 2023
Viaarxiv icon

A Practical Upper Bound for the Worst-Case Attribution Deviations

Add code
Mar 01, 2023
Figure 1 for A Practical Upper Bound for the Worst-Case Attribution Deviations
Figure 2 for A Practical Upper Bound for the Worst-Case Attribution Deviations
Figure 3 for A Practical Upper Bound for the Worst-Case Attribution Deviations
Figure 4 for A Practical Upper Bound for the Worst-Case Attribution Deviations
Viaarxiv icon

Flexible-modal Deception Detection with Audio-Visual Adapter

Add code
Feb 11, 2023
Viaarxiv icon

Portmanteauing Features for Scene Text Recognition

Add code
Nov 09, 2022
Figure 1 for Portmanteauing Features for Scene Text Recognition
Figure 2 for Portmanteauing Features for Scene Text Recognition
Figure 3 for Portmanteauing Features for Scene Text Recognition
Figure 4 for Portmanteauing Features for Scene Text Recognition
Viaarxiv icon

Transferable Adversarial Attack based on Integrated Gradients

Add code
May 26, 2022
Figure 1 for Transferable Adversarial Attack based on Integrated Gradients
Figure 2 for Transferable Adversarial Attack based on Integrated Gradients
Figure 3 for Transferable Adversarial Attack based on Integrated Gradients
Figure 4 for Transferable Adversarial Attack based on Integrated Gradients
Viaarxiv icon

Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection

Add code
May 15, 2022
Figure 1 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 2 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 3 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 4 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Viaarxiv icon