Picture for Hai Jin

Hai Jin

Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need

Add code
Oct 04, 2024
Viaarxiv icon

DarkSAM: Fooling Segment Anything Model to Segment Nothing

Add code
Sep 26, 2024
Figure 1 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 2 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 3 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 4 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Viaarxiv icon

ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification

Add code
Jun 25, 2024
Viaarxiv icon

Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning

Add code
Jun 06, 2024
Figure 1 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 2 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 3 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 4 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Viaarxiv icon

No Free Lunch Theorem for Privacy-Preserving LLM Inference

Add code
May 31, 2024
Figure 1 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Figure 2 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Figure 3 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Viaarxiv icon

Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

Add code
Apr 26, 2024
Viaarxiv icon

Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

Add code
Apr 24, 2024
Figure 1 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 2 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 3 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 4 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Viaarxiv icon

Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach

Add code
Apr 22, 2024
Viaarxiv icon

Harnessing the Power of Large Language Model for Uncertainty Aware Graph Processing

Add code
Apr 12, 2024
Viaarxiv icon

Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback

Add code
Apr 02, 2024
Figure 1 for Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback
Figure 2 for Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback
Figure 3 for Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback
Figure 4 for Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback
Viaarxiv icon