Alert button
Picture for Ee-Chien Chang

Ee-Chien Chang

Alert button

Object Detectors in the Open Environment: Challenges, Solutions, and Outlook

Add code
Bookmark button
Alert button
Apr 09, 2024
Siyuan Liang, Wei Wang, Ruoyu Chen, Aishan Liu, Boxi Wu, Ee-Chien Chang, Xiaochun Cao, Dacheng Tao

Viaarxiv icon

Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning

Add code
Bookmark button
Alert button
Mar 24, 2024
Siyuan Liang, Kuanrong Liu, Jiajun Gong, Jiawei Liang, Yuan Xun, Ee-Chien Chang, Xiaochun Cao

Viaarxiv icon

Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs

Add code
Bookmark button
Alert button
Feb 27, 2024
Xiaoxia Li, Siyuan Liang, Jiyi Zhang, Han Fang, Aishan Liu, Ee-Chien Chang

Viaarxiv icon

VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models

Add code
Bookmark button
Alert button
Feb 21, 2024
Jiawei Liang, Siyuan Liang, Man Luo, Aishan Liu, Dongchen Han, Ee-Chien Chang, Xiaochun Cao

Viaarxiv icon

Domain Bridge: Generative model-based domain forensic for black-box models

Add code
Bookmark button
Alert button
Feb 07, 2024
Jiyi Zhang, Han Fang, Ee-Chien Chang

Viaarxiv icon

BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive Learning

Add code
Bookmark button
Alert button
Nov 20, 2023
Siyuan Liang, Mingli Zhu, Aishan Liu, Baoyuan Wu, Xiaochun Cao, Ee-Chien Chang

Viaarxiv icon

Improving Adversarial Transferability by Stable Diffusion

Add code
Bookmark button
Alert button
Nov 18, 2023
Jiayang Liu, Siyu Zhu, Siyuan Liang, Jie Zhang, Han Fang, Weiming Zhang, Ee-Chien Chang

Viaarxiv icon

Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions

Add code
Bookmark button
Alert button
Aug 21, 2023
Wesley Tann, Yuancheng Liu, Jun Heng Sim, Choon Meng Seah, Ee-Chien Chang

Figure 1 for Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions
Figure 2 for Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions
Figure 3 for Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions
Figure 4 for Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions
Viaarxiv icon