Picture for Xiaoyun Wang

Xiaoyun Wang

Hard-Label Cryptanalytic Extraction of Neural Network Models

Add code
Sep 18, 2024
Figure 1 for Hard-Label Cryptanalytic Extraction of Neural Network Models
Figure 2 for Hard-Label Cryptanalytic Extraction of Neural Network Models
Figure 3 for Hard-Label Cryptanalytic Extraction of Neural Network Models
Figure 4 for Hard-Label Cryptanalytic Extraction of Neural Network Models
Viaarxiv icon

Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging

Add code
Apr 08, 2024
Figure 1 for Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging
Figure 2 for Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging
Figure 3 for Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging
Figure 4 for Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging
Viaarxiv icon

Wireless Network Digital Twin for 6G: Generative AI as A Key Enabler

Add code
Nov 29, 2023
Viaarxiv icon

FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts

Add code
Nov 09, 2023
Figure 1 for FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts
Figure 2 for FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts
Figure 3 for FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts
Figure 4 for FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts
Viaarxiv icon

Deterministic End-to-End Transmission to Optimize the Network Efficiency and Quality of Service: A Paradigm Shift in 6G

Add code
Jul 02, 2023
Viaarxiv icon

Network Architecture Design toward Convergence of Mobile Applications and Networks

Add code
Jun 15, 2023
Viaarxiv icon

Energy-based Out-of-distribution Detection

Add code
Oct 13, 2020
Figure 1 for Energy-based Out-of-distribution Detection
Figure 2 for Energy-based Out-of-distribution Detection
Figure 3 for Energy-based Out-of-distribution Detection
Figure 4 for Energy-based Out-of-distribution Detection
Viaarxiv icon

GraphDefense: Towards Robust Graph Convolutional Networks

Add code
Nov 11, 2019
Figure 1 for GraphDefense: Towards Robust Graph Convolutional Networks
Figure 2 for GraphDefense: Towards Robust Graph Convolutional Networks
Figure 3 for GraphDefense: Towards Robust Graph Convolutional Networks
Figure 4 for GraphDefense: Towards Robust Graph Convolutional Networks
Viaarxiv icon

Attack Graph Convolutional Networks by Adding Fake Nodes

Add code
Oct 26, 2018
Figure 1 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 2 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 3 for Attack Graph Convolutional Networks by Adding Fake Nodes
Figure 4 for Attack Graph Convolutional Networks by Adding Fake Nodes
Viaarxiv icon