Picture for Hai Huang

Hai Huang

Query-Based and Unnoticeable Graph Injection Attack from Neighborhood Perspective

Add code
Feb 04, 2025
Viaarxiv icon

Boosting Graph Robustness Against Backdoor Attacks: An Over-Similarity Perspective

Add code
Feb 03, 2025
Viaarxiv icon

Semantic Residual for Multimodal Unified Discrete Representation

Add code
Dec 26, 2024
Viaarxiv icon

Evaluating and Enhancing LLMs for Multi-turn Text-to-SQL with Multiple Question Types

Add code
Dec 21, 2024
Viaarxiv icon

Adversarial Score identity Distillation: Rapidly Surpassing the Teacher in One Step

Add code
Oct 19, 2024
Figure 1 for Adversarial Score identity Distillation: Rapidly Surpassing the Teacher in One Step
Figure 2 for Adversarial Score identity Distillation: Rapidly Surpassing the Teacher in One Step
Figure 3 for Adversarial Score identity Distillation: Rapidly Surpassing the Teacher in One Step
Figure 4 for Adversarial Score identity Distillation: Rapidly Surpassing the Teacher in One Step
Viaarxiv icon

ALLoRA: Adaptive Learning Rate Mitigates LoRA Fatal Flaws

Add code
Oct 13, 2024
Figure 1 for ALLoRA: Adaptive Learning Rate Mitigates LoRA Fatal Flaws
Figure 2 for ALLoRA: Adaptive Learning Rate Mitigates LoRA Fatal Flaws
Figure 3 for ALLoRA: Adaptive Learning Rate Mitigates LoRA Fatal Flaws
Figure 4 for ALLoRA: Adaptive Learning Rate Mitigates LoRA Fatal Flaws
Viaarxiv icon

ACE: A Generative Cross-Modal Retrieval Framework with Coarse-To-Fine Semantic Modeling

Add code
Jun 25, 2024
Figure 1 for ACE: A Generative Cross-Modal Retrieval Framework with Coarse-To-Fine Semantic Modeling
Figure 2 for ACE: A Generative Cross-Modal Retrieval Framework with Coarse-To-Fine Semantic Modeling
Figure 3 for ACE: A Generative Cross-Modal Retrieval Framework with Coarse-To-Fine Semantic Modeling
Figure 4 for ACE: A Generative Cross-Modal Retrieval Framework with Coarse-To-Fine Semantic Modeling
Viaarxiv icon

ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial Attacks

Add code
Jun 07, 2024
Figure 1 for ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial Attacks
Figure 2 for ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial Attacks
Figure 3 for ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial Attacks
Figure 4 for ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial Attacks
Viaarxiv icon

Long and Short Guidance in Score identity Distillation for One-Step Text-to-Image Generation

Add code
Jun 03, 2024
Figure 1 for Long and Short Guidance in Score identity Distillation for One-Step Text-to-Image Generation
Figure 2 for Long and Short Guidance in Score identity Distillation for One-Step Text-to-Image Generation
Figure 3 for Long and Short Guidance in Score identity Distillation for One-Step Text-to-Image Generation
Figure 4 for Long and Short Guidance in Score identity Distillation for One-Step Text-to-Image Generation
Viaarxiv icon

ControlSpeech: Towards Simultaneous Zero-shot Speaker Cloning and Zero-shot Language Style Control With Decoupled Codec

Add code
Jun 03, 2024
Viaarxiv icon