Picture for Huming Qiu

Huming Qiu

Safe Text-to-Image Generation: Simply Sanitize the Prompt Embedding

Add code
Nov 15, 2024
Viaarxiv icon

BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting

Add code
Dec 08, 2023
Viaarxiv icon

Weighted Contrastive Hashing

Add code
Sep 28, 2022
Figure 1 for Weighted Contrastive Hashing
Figure 2 for Weighted Contrastive Hashing
Figure 3 for Weighted Contrastive Hashing
Figure 4 for Weighted Contrastive Hashing
Viaarxiv icon

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

Add code
Apr 13, 2022
Figure 1 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 2 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 3 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 4 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Viaarxiv icon

Quantization Backdoors to Deep Learning Models

Add code
Aug 20, 2021
Figure 1 for Quantization Backdoors to Deep Learning Models
Figure 2 for Quantization Backdoors to Deep Learning Models
Figure 3 for Quantization Backdoors to Deep Learning Models
Figure 4 for Quantization Backdoors to Deep Learning Models
Viaarxiv icon

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

Add code
May 11, 2021
Figure 1 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 2 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 3 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 4 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Viaarxiv icon