Picture for Jiawang Bai

Jiawang Bai

Refer to the report for detailed contributions

HunyuanVideo: A Systematic Framework For Large Video Generative Models

Add code
Dec 03, 2024
Viaarxiv icon

Parameter-Efficient and Memory-Efficient Tuning for Vision Transformer: A Disentangled Approach

Add code
Jul 09, 2024
Figure 1 for Parameter-Efficient and Memory-Efficient Tuning for Vision Transformer: A Disentangled Approach
Figure 2 for Parameter-Efficient and Memory-Efficient Tuning for Vision Transformer: A Disentangled Approach
Figure 3 for Parameter-Efficient and Memory-Efficient Tuning for Vision Transformer: A Disentangled Approach
Figure 4 for Parameter-Efficient and Memory-Efficient Tuning for Vision Transformer: A Disentangled Approach
Viaarxiv icon

Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers

Add code
May 17, 2024
Viaarxiv icon

Adversarial Robustness for Visual Grounding of Multimodal Large Language Models

Add code
May 16, 2024
Figure 1 for Adversarial Robustness for Visual Grounding of Multimodal Large Language Models
Figure 2 for Adversarial Robustness for Visual Grounding of Multimodal Large Language Models
Figure 3 for Adversarial Robustness for Visual Grounding of Multimodal Large Language Models
Viaarxiv icon

Beyond Sole Strength: Customized Ensembles for Generalized Vision-Language Models

Add code
Nov 28, 2023
Viaarxiv icon

BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP

Add code
Nov 26, 2023
Viaarxiv icon

GraphAdapter: Tuning Vision-Language Models With Dual Knowledge Graph

Add code
Sep 24, 2023
Viaarxiv icon

A Dive into SAM Prior in Image Restoration

Add code
May 23, 2023
Viaarxiv icon

Can SAM Boost Video Super-Resolution?

Add code
May 12, 2023
Viaarxiv icon

Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval

Add code
Mar 22, 2023
Figure 1 for Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Figure 2 for Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Figure 3 for Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Figure 4 for Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval
Viaarxiv icon