Picture for Jiakai Wang

Jiakai Wang

DynamicPAE: Generating Scene-Aware Physical Adversarial Examples in Real-Time

Add code
Dec 11, 2024
Viaarxiv icon

BiDM: Pushing the Limit of Quantization for Diffusion Models

Add code
Dec 08, 2024
Viaarxiv icon

Behavior Backdoor for Deep Learning Models

Add code
Dec 02, 2024
Viaarxiv icon

MTU-Bench: A Multi-granularity Tool-Use Benchmark for Large Language Models

Add code
Oct 15, 2024
Figure 1 for MTU-Bench: A Multi-granularity Tool-Use Benchmark for Large Language Models
Figure 2 for MTU-Bench: A Multi-granularity Tool-Use Benchmark for Large Language Models
Figure 3 for MTU-Bench: A Multi-granularity Tool-Use Benchmark for Large Language Models
Figure 4 for MTU-Bench: A Multi-granularity Tool-Use Benchmark for Large Language Models
Viaarxiv icon

Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation

Add code
Sep 08, 2024
Figure 1 for Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation
Figure 2 for Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation
Figure 3 for Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation
Figure 4 for Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation
Viaarxiv icon

Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology

Add code
Aug 27, 2024
Figure 1 for Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology
Figure 2 for Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology
Figure 3 for Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology
Figure 4 for Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology
Viaarxiv icon

Compromising Embodied Agents with Contextual Backdoor Attacks

Add code
Aug 06, 2024
Figure 1 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 2 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 3 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 4 for Compromising Embodied Agents with Contextual Backdoor Attacks
Viaarxiv icon

DDK: Distilling Domain Knowledge for Efficient Large Language Models

Add code
Jul 23, 2024
Figure 1 for DDK: Distilling Domain Knowledge for Efficient Large Language Models
Figure 2 for DDK: Distilling Domain Knowledge for Efficient Large Language Models
Figure 3 for DDK: Distilling Domain Knowledge for Efficient Large Language Models
Figure 4 for DDK: Distilling Domain Knowledge for Efficient Large Language Models
Viaarxiv icon

R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models

Add code
Jun 04, 2024
Figure 1 for R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models
Figure 2 for R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models
Figure 3 for R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models
Figure 4 for R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models
Viaarxiv icon

D-CPT Law: Domain-specific Continual Pre-Training Scaling Law for Large Language Models

Add code
Jun 03, 2024
Viaarxiv icon