Picture for Hai Jin

Hai Jin

How to Select Pre-Trained Code Models for Reuse? A Learning Perspective

Add code
Jan 07, 2025
Figure 1 for How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
Figure 2 for How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
Figure 3 for How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
Figure 4 for How to Select Pre-Trained Code Models for Reuse? A Learning Perspective
Viaarxiv icon

NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors

Add code
Dec 22, 2024
Viaarxiv icon

Hyperbolic Hypergraph Neural Networks for Multi-Relational Knowledge Hypergraph Representation

Add code
Dec 11, 2024
Viaarxiv icon

Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need

Add code
Oct 04, 2024
Viaarxiv icon

DarkSAM: Fooling Segment Anything Model to Segment Nothing

Add code
Sep 26, 2024
Figure 1 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 2 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 3 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Figure 4 for DarkSAM: Fooling Segment Anything Model to Segment Nothing
Viaarxiv icon

ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification

Add code
Jun 25, 2024
Viaarxiv icon

Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning

Add code
Jun 06, 2024
Figure 1 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 2 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 3 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Figure 4 for Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
Viaarxiv icon

No Free Lunch Theorem for Privacy-Preserving LLM Inference

Add code
May 31, 2024
Figure 1 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Figure 2 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Figure 3 for No Free Lunch Theorem for Privacy-Preserving LLM Inference
Viaarxiv icon

Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

Add code
Apr 26, 2024
Viaarxiv icon

Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

Add code
Apr 24, 2024
Figure 1 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 2 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 3 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Figure 4 for Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation
Viaarxiv icon