Picture for Hai Jin

Hai Jin

NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors

Add code
Dec 22, 2024
Viaarxiv icon

Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need

Add code
Oct 04, 2024
Viaarxiv icon

DarkSAM: Fooling Segment Anything Model to Segment Nothing

Add code
Sep 26, 2024
Figure 1 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 2 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 3 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 4 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Viaarxiv icon

ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification

Add code
Jun 25, 2024
Viaarxiv icon

Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning

Add code
Jun 06, 2024
Figure 1 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 2 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 3 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 4 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Viaarxiv icon

No Free Lunch Theorem for Privacy-Preserving LLM Inference

Add code
May 31, 2024
Figure 1 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Figure 2 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Figure 3 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Viaarxiv icon

Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

Add code
Apr 26, 2024
Viaarxiv icon

Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

Add code
Apr 24, 2024
Figure 1 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 2 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 3 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 4 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Viaarxiv icon

Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach

Add code
Apr 22, 2024
Viaarxiv icon

Harnessing the Power of Large Language Model for Uncertainty Aware Graph Processing

Add code
Apr 12, 2024
Figure 1 for Harnessing the Power of Large Language Model for Uncertainty Aware Graph Processing
Figure 2 for Harnessing the Power of Large Language Model for Uncertainty Aware Graph Processing
Figure 3 for Harnessing the Power of Large Language Model for Uncertainty Aware Graph Processing
Figure 4 for Harnessing the Power of Large Language Model for Uncertainty Aware Graph Processing
Viaarxiv icon