Picture for Zhengyue Zhao

Zhengyue Zhao

Adversarial Contrastive Decoding: Boosting Safety Alignment of Large Language Models via Opposite Prompt Optimization

Add code
Jun 24, 2024
Viaarxiv icon

Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?

Add code
Nov 30, 2023
Viaarxiv icon

Pushing the Limits of Machine Design: Automated CPU Design with AI

Add code
Jun 27, 2023
Viaarxiv icon

Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation

Add code
Jun 02, 2023
Figure 1 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 2 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 3 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 4 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Viaarxiv icon