Picture for Xun Chen

Xun Chen

InternLM2 Technical Report

Add code
Mar 26, 2024
Figure 1 for InternLM2 Technical Report
Figure 2 for InternLM2 Technical Report
Figure 3 for InternLM2 Technical Report
Figure 4 for InternLM2 Technical Report
Viaarxiv icon

Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation

Add code
Mar 02, 2024
Figure 1 for Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation
Figure 2 for Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation
Figure 3 for Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation
Figure 4 for Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation
Viaarxiv icon

Learning to Compress Prompt in Natural Language Formats

Add code
Feb 28, 2024
Viaarxiv icon

TrustLLM: Trustworthiness in Large Language Models

Add code
Jan 25, 2024
Figure 1 for TrustLLM: Trustworthiness in Large Language Models
Figure 2 for TrustLLM: Trustworthiness in Large Language Models
Figure 3 for TrustLLM: Trustworthiness in Large Language Models
Figure 4 for TrustLLM: Trustworthiness in Large Language Models
Viaarxiv icon

TrojFSP: Trojan Insertion in Few-shot Prompt Tuning

Add code
Dec 16, 2023
Figure 1 for TrojFSP: Trojan Insertion in Few-shot Prompt Tuning
Figure 2 for TrojFSP: Trojan Insertion in Few-shot Prompt Tuning
Figure 3 for TrojFSP: Trojan Insertion in Few-shot Prompt Tuning
Figure 4 for TrojFSP: Trojan Insertion in Few-shot Prompt Tuning
Viaarxiv icon

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?

Add code
Dec 10, 2023
Viaarxiv icon

Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise

Add code
Nov 22, 2023
Viaarxiv icon

Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis

Add code
Nov 22, 2023
Viaarxiv icon

MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems

Add code
Sep 13, 2023
Figure 1 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 2 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 3 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 4 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Viaarxiv icon

Achieving Covert Communication With A Probabilistic Jamming Strategy

Add code
Aug 29, 2023
Figure 1 for Achieving Covert Communication With A Probabilistic Jamming Strategy
Figure 2 for Achieving Covert Communication With A Probabilistic Jamming Strategy
Figure 3 for Achieving Covert Communication With A Probabilistic Jamming Strategy
Figure 4 for Achieving Covert Communication With A Probabilistic Jamming Strategy
Viaarxiv icon