Picture for Hanxun Huang

Hanxun Huang

Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks

Add code
Nov 20, 2024
Viaarxiv icon

Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models

Add code
Oct 25, 2024
Figure 1 for Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Figure 2 for Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Figure 3 for Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Figure 4 for Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Viaarxiv icon

BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models

Add code
Aug 23, 2024
Viaarxiv icon

Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers

Add code
Aug 03, 2024
Figure 1 for Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Figure 2 for Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Figure 3 for Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Figure 4 for Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Viaarxiv icon

Multi-Trigger Backdoor Attacks: More Triggers, More Threats

Add code
Jan 27, 2024
Viaarxiv icon

LDReg: Local Dimensionality Regularized Self-Supervised Learning

Add code
Jan 19, 2024
Viaarxiv icon

Distilling Cognitive Backdoor Patterns within an Image

Add code
Jan 26, 2023
Viaarxiv icon

Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks

Add code
Oct 21, 2021
Figure 1 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 2 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 3 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 4 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Viaarxiv icon

Unlearnable Examples: Making Personal Data Unexploitable

Add code
Jan 13, 2021
Figure 1 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 2 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 3 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 4 for Unlearnable Examples: Making Personal Data Unexploitable
Viaarxiv icon

Neural Architecture Search via Combinatorial Multi-Armed Bandit

Add code
Jan 01, 2021
Figure 1 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 2 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 3 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 4 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Viaarxiv icon