Picture for Adams Wai-Kin Kong

Adams Wai-Kin Kong

Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances

Add code
Oct 24, 2024
Figure 1 for Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Figure 2 for Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Figure 3 for Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Figure 4 for Robust Watermarking Using Generative Priors Against Image Editing: From Benchmarking to Advances
Viaarxiv icon

Benchmarking Cross-Domain Audio-Visual Deception Detection

Add code
May 11, 2024
Viaarxiv icon

Improving Concept Alignment in Vision-Language Concept Bottleneck Models

Add code
May 03, 2024
Viaarxiv icon

MACE: Mass Concept Erasure in Diffusion Models

Add code
Mar 10, 2024
Viaarxiv icon

TF-ICON: Diffusion-Based Training-Free Cross-Domain Image Composition

Add code
Jul 25, 2023
Viaarxiv icon

A Practical Upper Bound for the Worst-Case Attribution Deviations

Add code
Mar 01, 2023
Viaarxiv icon

Flexible-modal Deception Detection with Audio-Visual Adapter

Add code
Feb 11, 2023
Viaarxiv icon

Portmanteauing Features for Scene Text Recognition

Add code
Nov 09, 2022
Viaarxiv icon

Transferable Adversarial Attack based on Integrated Gradients

Add code
May 26, 2022
Figure 1 for Transferable Adversarial Attack based on Integrated Gradients
Figure 2 for Transferable Adversarial Attack based on Integrated Gradients
Figure 3 for Transferable Adversarial Attack based on Integrated Gradients
Figure 4 for Transferable Adversarial Attack based on Integrated Gradients
Viaarxiv icon

Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection

Add code
May 15, 2022
Figure 1 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 2 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 3 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Figure 4 for Exploiting the Relationship Between Kendall's Rank Correlation and Cosine Similarity for Attribution Protection
Viaarxiv icon