Picture for Lu Pang

Lu Pang

Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations

Add code
Oct 16, 2024
Figure 1 for Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Figure 2 for Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Figure 3 for Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Figure 4 for Long-Tailed Backdoor Attack Using Dynamic Data Augmentation Operations
Viaarxiv icon

Backdooring Vision-Language Models with Out-Of-Distribution Data

Add code
Oct 02, 2024
Viaarxiv icon

TrojVLM: Backdoor Attack Against Vision Language Models

Add code
Sep 28, 2024
Figure 1 for TrojVLM: Backdoor Attack Against Vision Language Models
Figure 2 for TrojVLM: Backdoor Attack Against Vision Language Models
Figure 3 for TrojVLM: Backdoor Attack Against Vision Language Models
Figure 4 for TrojVLM: Backdoor Attack Against Vision Language Models
Viaarxiv icon

Task-Agnostic Detector for Insertion-Based Backdoor Attacks

Add code
Mar 25, 2024
Viaarxiv icon

Attention-Enhancing Backdoor Attacks Against BERT-based Models

Add code
Oct 25, 2023
Viaarxiv icon

Mask and Restore: Blind Backdoor Defense at Test Time with Masked Autoencoder

Add code
Mar 27, 2023
Viaarxiv icon

Backdoor Cleansing with Unlabeled Data

Add code
Nov 23, 2022
Viaarxiv icon

Cooperative Multi-Agent Policy Gradients with Sub-optimal Demonstration

Add code
Dec 05, 2018
Figure 1 for Cooperative Multi-Agent Policy Gradients with Sub-optimal Demonstration
Figure 2 for Cooperative Multi-Agent Policy Gradients with Sub-optimal Demonstration
Figure 3 for Cooperative Multi-Agent Policy Gradients with Sub-optimal Demonstration
Figure 4 for Cooperative Multi-Agent Policy Gradients with Sub-optimal Demonstration
Viaarxiv icon