Picture for Hanxun Huang

Hanxun Huang

BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models

Add code
Aug 23, 2024
Figure 1 for BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Figure 2 for BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Figure 3 for BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Figure 4 for BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models
Viaarxiv icon

Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers

Add code
Aug 03, 2024
Viaarxiv icon

Multi-Trigger Backdoor Attacks: More Triggers, More Threats

Add code
Jan 27, 2024
Viaarxiv icon

LDReg: Local Dimensionality Regularized Self-Supervised Learning

Add code
Jan 19, 2024
Viaarxiv icon

Distilling Cognitive Backdoor Patterns within an Image

Add code
Jan 26, 2023
Figure 1 for Distilling Cognitive Backdoor Patterns within an Image
Figure 2 for Distilling Cognitive Backdoor Patterns within an Image
Figure 3 for Distilling Cognitive Backdoor Patterns within an Image
Figure 4 for Distilling Cognitive Backdoor Patterns within an Image
Viaarxiv icon

Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks

Add code
Oct 21, 2021
Figure 1 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 2 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 3 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Figure 4 for Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
Viaarxiv icon

Unlearnable Examples: Making Personal Data Unexploitable

Add code
Jan 13, 2021
Figure 1 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 2 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 3 for Unlearnable Examples: Making Personal Data Unexploitable
Figure 4 for Unlearnable Examples: Making Personal Data Unexploitable
Viaarxiv icon

Neural Architecture Search via Combinatorial Multi-Armed Bandit

Add code
Jan 01, 2021
Figure 1 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 2 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 3 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Figure 4 for Neural Architecture Search via Combinatorial Multi-Armed Bandit
Viaarxiv icon

Normalized Loss Functions for Deep Learning with Noisy Labels

Add code
Jun 24, 2020
Figure 1 for Normalized Loss Functions for Deep Learning with Noisy Labels
Figure 2 for Normalized Loss Functions for Deep Learning with Noisy Labels
Figure 3 for Normalized Loss Functions for Deep Learning with Noisy Labels
Figure 4 for Normalized Loss Functions for Deep Learning with Noisy Labels
Viaarxiv icon