Picture for Wenbo Jiang

Wenbo Jiang

Stealthy and Robust Backdoor Attack against 3D Point Clouds through Additional Point Features

Add code
Dec 10, 2024
Viaarxiv icon

One Prompt to Verify Your Models: Black-Box Text-to-Image Models Verification via Non-Transferable Adversarial Attacks

Add code
Oct 31, 2024
Viaarxiv icon

Backdoor Attack Against Vision Transformers via Attention Gradient-Based Image Erosion

Add code
Oct 30, 2024
Viaarxiv icon

Backdoor Attacks against Image-to-Image Networks

Add code
Jul 15, 2024
Figure 1 for Backdoor Attacks against Image-to-Image Networks
Figure 2 for Backdoor Attacks against Image-to-Image Networks
Figure 3 for Backdoor Attacks against Image-to-Image Networks
Figure 4 for Backdoor Attacks against Image-to-Image Networks
Viaarxiv icon

DDFAD: Dataset Distillation Framework for Audio Data

Add code
Jul 15, 2024
Figure 1 for DDFAD: Dataset Distillation Framework for Audio Data
Figure 2 for DDFAD: Dataset Distillation Framework for Audio Data
Figure 3 for DDFAD: Dataset Distillation Framework for Audio Data
Figure 4 for DDFAD: Dataset Distillation Framework for Audio Data
Viaarxiv icon

Talk Too Much: Poisoning Large Language Models under Token Limit

Add code
Apr 24, 2024
Viaarxiv icon

Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization

Add code
Feb 15, 2024
Viaarxiv icon