Picture for Jordan Vice

Jordan Vice

Exploring Bias in over 100 Text-to-Image Generative Models

Add code
Mar 11, 2025
Viaarxiv icon

Skip Mamba Diffusion for Monocular 3D Semantic Scene Completion

Add code
Jan 13, 2025
Viaarxiv icon

On the Fairness, Diversity and Reliability of Text-to-Image Generative Models

Add code
Nov 21, 2024
Figure 1 for On the Fairness, Diversity and Reliability of Text-to-Image Generative Models
Figure 2 for On the Fairness, Diversity and Reliability of Text-to-Image Generative Models
Figure 3 for On the Fairness, Diversity and Reliability of Text-to-Image Generative Models
Figure 4 for On the Fairness, Diversity and Reliability of Text-to-Image Generative Models
Viaarxiv icon

Safety Without Semantic Disruptions: Editing-free Safe Image Generation via Context-preserving Dual Latent Reconstruction

Add code
Nov 21, 2024
Figure 1 for Safety Without Semantic Disruptions: Editing-free Safe Image Generation via Context-preserving Dual Latent Reconstruction
Figure 2 for Safety Without Semantic Disruptions: Editing-free Safe Image Generation via Context-preserving Dual Latent Reconstruction
Figure 3 for Safety Without Semantic Disruptions: Editing-free Safe Image Generation via Context-preserving Dual Latent Reconstruction
Figure 4 for Safety Without Semantic Disruptions: Editing-free Safe Image Generation via Context-preserving Dual Latent Reconstruction
Viaarxiv icon

Artificial intelligence techniques in inherited retinal diseases: A review

Add code
Oct 10, 2024
Viaarxiv icon

Severity Controlled Text-to-Image Generative Model Bias Manipulation

Add code
Apr 03, 2024
Viaarxiv icon

Quantifying Bias in Text-to-Image Generative Models

Add code
Dec 20, 2023
Viaarxiv icon

BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models

Add code
Jul 31, 2023
Figure 1 for BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models
Figure 2 for BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models
Figure 3 for BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models
Figure 4 for BAGM: A Backdoor Attack for Manipulating Text-to-Image Generative Models
Viaarxiv icon