Picture for Zhenting Wang

Zhenting Wang

ADO: Automatic Data Optimization for Inputs in LLM Prompts

Add code
Feb 17, 2025
Viaarxiv icon

The Hidden Life of Tokens: Reducing Hallucination of Large Vision-Language Models via Visual Information Steering

Add code
Feb 05, 2025
Figure 1 for The Hidden Life of Tokens: Reducing Hallucination of Large Vision-Language Models via Visual Information Steering
Figure 2 for The Hidden Life of Tokens: Reducing Hallucination of Large Vision-Language Models via Visual Information Steering
Figure 3 for The Hidden Life of Tokens: Reducing Hallucination of Large Vision-Language Models via Visual Information Steering
Figure 4 for The Hidden Life of Tokens: Reducing Hallucination of Large Vision-Language Models via Visual Information Steering
Viaarxiv icon

LoR-VP: Low-Rank Visual Prompting for Efficient Vision Model Adaptation

Add code
Feb 04, 2025
Viaarxiv icon

MLLM-as-a-Judge for Image Safety without Human Labeling

Add code
Dec 31, 2024
Figure 1 for MLLM-as-a-Judge for Image Safety without Human Labeling
Figure 2 for MLLM-as-a-Judge for Image Safety without Human Labeling
Figure 3 for MLLM-as-a-Judge for Image Safety without Human Labeling
Figure 4 for MLLM-as-a-Judge for Image Safety without Human Labeling
Viaarxiv icon

Robustness-aware Automatic Prompt Optimization

Add code
Dec 24, 2024
Viaarxiv icon

Token-Budget-Aware LLM Reasoning

Add code
Dec 24, 2024
Viaarxiv icon

Continuous Concepts Removal in Text-to-image Diffusion Models

Add code
Nov 30, 2024
Viaarxiv icon

Accelerating Multimodel Large Language Models by Searching Optimal Vision Token Reduction

Add code
Nov 30, 2024
Viaarxiv icon

ProSec: Fortifying Code LLMs with Proactive Security Alignment

Add code
Nov 19, 2024
Viaarxiv icon

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models

Add code
Oct 14, 2024
Figure 1 for Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Figure 2 for Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Figure 3 for Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Figure 4 for Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models
Viaarxiv icon