Picture for Xiaolu Hou

Xiaolu Hou

Make Shuffling Great Again: A Side-Channel Resistant Fisher-Yates Algorithm for Protecting Neural Networks

Add code
Jan 01, 2025
Viaarxiv icon

Toward Robust Incomplete Multimodal Sentiment Analysis via Hierarchical Representation Learning

Add code
Nov 05, 2024
Figure 1 for Toward Robust Incomplete Multimodal Sentiment Analysis via Hierarchical Representation Learning
Figure 2 for Toward Robust Incomplete Multimodal Sentiment Analysis via Hierarchical Representation Learning
Figure 3 for Toward Robust Incomplete Multimodal Sentiment Analysis via Hierarchical Representation Learning
Figure 4 for Toward Robust Incomplete Multimodal Sentiment Analysis via Hierarchical Representation Learning
Viaarxiv icon

MedAide: Towards an Omni Medical Aide via Specialized LLM-based Multi-Agent Collaboration

Add code
Oct 17, 2024
Figure 1 for MedAide: Towards an Omni Medical Aide via Specialized LLM-based Multi-Agent Collaboration
Figure 2 for MedAide: Towards an Omni Medical Aide via Specialized LLM-based Multi-Agent Collaboration
Figure 3 for MedAide: Towards an Omni Medical Aide via Specialized LLM-based Multi-Agent Collaboration
Figure 4 for MedAide: Towards an Omni Medical Aide via Specialized LLM-based Multi-Agent Collaboration
Viaarxiv icon

Side-Channel Analysis of OpenVINO-based Neural Network Models

Add code
Jul 23, 2024
Figure 1 for Side-Channel Analysis of OpenVINO-based Neural Network Models
Figure 2 for Side-Channel Analysis of OpenVINO-based Neural Network Models
Figure 3 for Side-Channel Analysis of OpenVINO-based Neural Network Models
Viaarxiv icon

Detecting and Evaluating Medical Hallucinations in Large Vision Language Models

Add code
Jun 14, 2024
Figure 1 for Detecting and Evaluating Medical Hallucinations in Large Vision Language Models
Figure 2 for Detecting and Evaluating Medical Hallucinations in Large Vision Language Models
Figure 3 for Detecting and Evaluating Medical Hallucinations in Large Vision Language Models
Figure 4 for Detecting and Evaluating Medical Hallucinations in Large Vision Language Models
Viaarxiv icon

DeepNcode: Encoding-Based Protection against Bit-Flip Attacks on Neural Networks

Add code
May 22, 2024
Viaarxiv icon

Efficiency in Focus: LayerNorm as a Catalyst for Fine-tuning Medical Visual Language Pre-trained Models

Add code
Apr 25, 2024
Figure 1 for Efficiency in Focus: LayerNorm as a Catalyst for Fine-tuning Medical Visual Language Pre-trained Models
Figure 2 for Efficiency in Focus: LayerNorm as a Catalyst for Fine-tuning Medical Visual Language Pre-trained Models
Figure 3 for Efficiency in Focus: LayerNorm as a Catalyst for Fine-tuning Medical Visual Language Pre-trained Models
Figure 4 for Efficiency in Focus: LayerNorm as a Catalyst for Fine-tuning Medical Visual Language Pre-trained Models
Viaarxiv icon

A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks

Add code
Mar 25, 2023
Figure 1 for A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
Figure 2 for A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
Figure 3 for A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
Figure 4 for A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
Viaarxiv icon

FooBaR: Fault Fooling Backdoor Attack on Neural Network Training

Add code
Sep 23, 2021
Figure 1 for FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
Figure 2 for FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
Figure 3 for FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
Figure 4 for FooBaR: Fault Fooling Backdoor Attack on Neural Network Training
Viaarxiv icon

SNIFF: Reverse Engineering of Neural Networks with Fault Attacks

Add code
Feb 23, 2020
Figure 1 for SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
Figure 2 for SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
Figure 3 for SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
Figure 4 for SNIFF: Reverse Engineering of Neural Networks with Fault Attacks
Viaarxiv icon