Picture for Guanhong Tao

Guanhong Tao

Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage

Add code
Nov 22, 2024
Figure 1 for Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Figure 2 for Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Figure 3 for Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Figure 4 for Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Viaarxiv icon

UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening

Add code
Jul 16, 2024
Viaarxiv icon

Threat Behavior Textual Search by Attention Graph Isomorphism

Add code
Apr 18, 2024
Viaarxiv icon

LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

Add code
Mar 25, 2024
Figure 1 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 2 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 3 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 4 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Viaarxiv icon

Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia

Add code
Feb 08, 2024
Viaarxiv icon

Make Them Spill the Beans! Coercive Knowledge Extraction from LLMs

Add code
Dec 08, 2023
Viaarxiv icon

Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift

Add code
Nov 27, 2023
Viaarxiv icon

ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP

Add code
Aug 04, 2023
Viaarxiv icon

Backdooring Neural Code Search

Add code
Jun 12, 2023
Viaarxiv icon

Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving

Add code
Apr 28, 2023
Figure 1 for Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Figure 2 for Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Figure 3 for Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Figure 4 for Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving
Viaarxiv icon