Picture for Hanxun Huang

Hanxun Huang

X-Transfer Attacks: Towards Super Transferable Adversarial Attacks on CLIP

Add code
May 08, 2025
Viaarxiv icon

CURVALID: Geometrically-guided Adversarial Prompt Detection

Add code
Mar 05, 2025
Viaarxiv icon

Detecting Backdoor Samples in Contrastive Language Image Pretraining

Add code
Feb 03, 2025
Viaarxiv icon

Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks

Add code
Nov 20, 2024
Figure 1 for Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Figure 2 for Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Figure 3 for Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Figure 4 for Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Viaarxiv icon

Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models

Add code
Oct 25, 2024
Figure 1 for Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Figure 2 for Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Figure 3 for Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Figure 4 for Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models
Viaarxiv icon

BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models

Add code
Aug 23, 2024
Figure 1 for BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Figure 2 for BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Figure 3 for BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Figure 4 for BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Viaarxiv icon

Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers

Add code
Aug 03, 2024
Figure 1 for Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Figure 2 for Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Figure 3 for Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Figure 4 for Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
Viaarxiv icon

Multi-Trigger Backdoor Attacks: More Triggers, More Threats

Add code
Jan 27, 2024
Figure 1 for Multi-Trigger Backdoor Attacks: More Triggers, More Threats
Figure 2 for Multi-Trigger Backdoor Attacks: More Triggers, More Threats
Figure 3 for Multi-Trigger Backdoor Attacks: More Triggers, More Threats
Figure 4 for Multi-Trigger Backdoor Attacks: More Triggers, More Threats
Viaarxiv icon

LDReg: Local Dimensionality Regularized Self-Supervised Learning

Add code
Jan 19, 2024
Figure 1 for LDReg: Local Dimensionality Regularized Self-Supervised Learning
Figure 2 for LDReg: Local Dimensionality Regularized Self-Supervised Learning
Figure 3 for LDReg: Local Dimensionality Regularized Self-Supervised Learning
Figure 4 for LDReg: Local Dimensionality Regularized Self-Supervised Learning
Viaarxiv icon

Distilling Cognitive Backdoor Patterns within an Image

Add code
Jan 26, 2023
Viaarxiv icon