Picture for Zeyang Sha

Zeyang Sha

Prompt Stealing Attacks Against Large Language Models

Add code
Feb 20, 2024
Viaarxiv icon

Conversation Reconstruction Attack Against GPT Models

Add code
Feb 05, 2024
Viaarxiv icon

From Visual Prompt Learning to Zero-Shot Transfer: Mapping Is All You Need

Add code
Mar 09, 2023
Viaarxiv icon

Fine-Tuning Is All You Need to Mitigate Backdoor Attacks

Add code
Dec 18, 2022
Viaarxiv icon

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models

Add code
Oct 13, 2022
Figure 1 for DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Figure 2 for DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Figure 3 for DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Figure 4 for DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models
Viaarxiv icon

Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders

Add code
Jan 19, 2022
Figure 1 for Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Figure 2 for Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Figure 3 for Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Figure 4 for Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders
Viaarxiv icon