Picture for Yingjie Lao

Yingjie Lao

DMin: Scalable Training Data Influence Estimation for Diffusion Models

Add code
Dec 11, 2024
Viaarxiv icon

Theoretical Corrections and the Leveraging of Reinforcement Learning to Enhance Triangle Attack

Add code
Nov 18, 2024
Viaarxiv icon

Less is More: Sparse Watermarking in LLMs with Enhanced Text Quality

Add code
Jul 17, 2024
Viaarxiv icon

Fully Attentional Networks with Self-emerging Token Labeling

Add code
Jan 08, 2024
Viaarxiv icon

Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks

Add code
Oct 01, 2023
Viaarxiv icon

Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class

Add code
Oct 17, 2022
Figure 1 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 2 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 3 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 4 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Viaarxiv icon

NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language

Add code
Aug 29, 2022
Figure 1 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 2 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 3 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Figure 4 for NL2GDPR: Automatically Develop GDPR Compliant Android Application Features from Natural Language
Viaarxiv icon

Defending Backdoor Attacks on Vision Transformer via Patch Processing

Add code
Jun 24, 2022
Figure 1 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 2 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 3 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Figure 4 for Defending Backdoor Attacks on Vision Transformer via Patch Processing
Viaarxiv icon

Class-Oriented Poisoning Attack

Add code
Jul 31, 2020
Figure 1 for Class-Oriented Poisoning Attack
Figure 2 for Class-Oriented Poisoning Attack
Figure 3 for Class-Oriented Poisoning Attack
Figure 4 for Class-Oriented Poisoning Attack
Viaarxiv icon

Rallying Adversarial Techniques against Deep Learning for Network Security

Add code
Mar 27, 2019
Figure 1 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 2 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 3 for Rallying Adversarial Techniques against Deep Learning for Network Security
Figure 4 for Rallying Adversarial Techniques against Deep Learning for Network Security
Viaarxiv icon