Picture for Guanhong Tao

Guanhong Tao

Less Is More -- Until It Breaks: Security Pitfalls of Vision Token Compression in Large Vision-Language Models

Add code
Jan 17, 2026
Viaarxiv icon

Backdoor Attack on Vision Language Models with Stealthy Semantic Manipulation

Add code
Jun 08, 2025
Viaarxiv icon

A Comprehensive Study of LLM Secure Code Generation

Add code
Mar 18, 2025
Figure 1 for A Comprehensive Study of LLM Secure Code Generation
Figure 2 for A Comprehensive Study of LLM Secure Code Generation
Figure 3 for A Comprehensive Study of LLM Secure Code Generation
Figure 4 for A Comprehensive Study of LLM Secure Code Generation
Viaarxiv icon

How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies

Add code
Feb 06, 2025
Figure 1 for How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies
Figure 2 for How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies
Figure 3 for How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies
Figure 4 for How vulnerable is my policy? Adversarial attacks on modern behavior cloning policies
Viaarxiv icon

PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models

Add code
Jan 07, 2025
Figure 1 for PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models
Figure 2 for PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models
Figure 3 for PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models
Figure 4 for PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models
Viaarxiv icon

Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage

Add code
Nov 22, 2024
Figure 1 for Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Figure 2 for Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Figure 3 for Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Figure 4 for Exploiting Watermark-Based Defense Mechanisms in Text-to-Image Diffusion Models for Unauthorized Data Usage
Viaarxiv icon

UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening

Add code
Jul 16, 2024
Figure 1 for UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening
Figure 2 for UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening
Figure 3 for UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening
Figure 4 for UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening
Viaarxiv icon

Threat Behavior Textual Search by Attention Graph Isomorphism

Add code
Apr 18, 2024
Viaarxiv icon

LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning

Add code
Mar 25, 2024
Figure 1 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 2 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 3 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Figure 4 for LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning
Viaarxiv icon

Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia

Add code
Feb 08, 2024
Viaarxiv icon