Picture for Atul Prakash

Atul Prakash

ELFS: Enhancing Label-Free Coreset Selection via Clustering-based Pseudo-Labeling

Add code
Jun 06, 2024
Viaarxiv icon

PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

Add code
Feb 24, 2024
Figure 1 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 2 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 3 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Figure 4 for PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails
Viaarxiv icon

Adaptive Skeleton Graph Decoding

Add code
Feb 19, 2024
Figure 1 for Adaptive Skeleton Graph Decoding
Figure 2 for Adaptive Skeleton Graph Decoding
Figure 3 for Adaptive Skeleton Graph Decoding
Figure 4 for Adaptive Skeleton Graph Decoding
Viaarxiv icon

Learn To be Efficient: Build Structured Sparsity in Large Language Models

Add code
Feb 13, 2024
Figure 1 for Learn To be Efficient: Build Structured Sparsity in Large Language Models
Figure 2 for Learn To be Efficient: Build Structured Sparsity in Large Language Models
Figure 3 for Learn To be Efficient: Build Structured Sparsity in Large Language Models
Figure 4 for Learn To be Efficient: Build Structured Sparsity in Large Language Models
Viaarxiv icon

Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation

Add code
Oct 11, 2023
Figure 1 for Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation
Figure 2 for Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation
Figure 3 for Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation
Figure 4 for Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation
Viaarxiv icon

Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks

Add code
Jul 30, 2023
Figure 1 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 2 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 3 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Figure 4 for Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks
Viaarxiv icon

CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception

Add code
Jun 01, 2023
Figure 1 for CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception
Figure 2 for CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception
Figure 3 for CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception
Figure 4 for CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception
Viaarxiv icon

Investigating Stateful Defenses Against Black-Box Adversarial Examples

Add code
Mar 17, 2023
Figure 1 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 2 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 3 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Figure 4 for Investigating Stateful Defenses Against Black-Box Adversarial Examples
Viaarxiv icon

Coverage-centric Coreset Selection for High Pruning Rates

Add code
Oct 28, 2022
Figure 1 for Coverage-centric Coreset Selection for High Pruning Rates
Figure 2 for Coverage-centric Coreset Selection for High Pruning Rates
Figure 3 for Coverage-centric Coreset Selection for High Pruning Rates
Figure 4 for Coverage-centric Coreset Selection for High Pruning Rates
Viaarxiv icon

Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing

Add code
May 18, 2022
Figure 1 for Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing
Figure 2 for Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing
Figure 3 for Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing
Figure 4 for Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing
Viaarxiv icon