Picture for Zhenting Wang

Zhenting Wang

MLLM-as-a-Judge for Image Safety without Human Labeling

Add code
Dec 31, 2024
Viaarxiv icon

Token-Budget-Aware LLM Reasoning

Add code
Dec 24, 2024
Viaarxiv icon

Robustness-aware Automatic Prompt Optimization

Add code
Dec 24, 2024
Viaarxiv icon

Continuous Concepts Removal in Text-to-image Diffusion Models

Add code
Nov 30, 2024
Viaarxiv icon

Accelerating Multimodel Large Language Models by Searching Optimal Vision Token Reduction

Add code
Nov 30, 2024
Viaarxiv icon

ProSec: Fortifying Code LLMs with Proactive Security Alignment

Add code
Nov 19, 2024
Viaarxiv icon

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models

Add code
Oct 14, 2024
Figure 1 for Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Figure 2 for Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Figure 3 for Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Figure 4 for Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Viaarxiv icon

Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents

Add code
Oct 03, 2024
Figure 1 for Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents
Figure 2 for Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents
Figure 3 for Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents
Figure 4 for Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents
Viaarxiv icon

Data-centric NLP Backdoor Defense from the Lens of Memorization

Add code
Sep 21, 2024
Figure 1 for Data-centric NLP Backdoor Defense from the Lens of Memorization
Figure 2 for Data-centric NLP Backdoor Defense from the Lens of Memorization
Figure 3 for Data-centric NLP Backdoor Defense from the Lens of Memorization
Figure 4 for Data-centric NLP Backdoor Defense from the Lens of Memorization
Viaarxiv icon

Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer

Add code
Aug 21, 2024
Figure 1 for Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer
Figure 2 for Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer
Figure 3 for Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer
Figure 4 for Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer
Viaarxiv icon