Picture for Huajie Chen

Huajie Chen

Osmosis Distillation: Model Hijacking with the Fewest Samples

Add code
Mar 05, 2026
Viaarxiv icon

From Spark to Fire: Modeling and Mitigating Error Cascades in LLM-Based Multi-Agent Collaboration

Add code
Mar 04, 2026
Viaarxiv icon

Turning Black Box into White Box: Dataset Distillation Leaks

Add code
Mar 01, 2026
Viaarxiv icon

Hide&Seek: Remove Image Watermarks with Negligible Cost via Pixel-wise Reconstruction

Add code
Mar 01, 2026
Viaarxiv icon

DINO-Detect: A Simple yet Effective Framework for Blur-Robust AI-Generated Image Detection

Add code
Nov 18, 2025
Viaarxiv icon

QUEEN: Query Unlearning against Model Extraction

Add code
Jul 01, 2024
Figure 1 for QUEEN: Query Unlearning against Model Extraction
Figure 2 for QUEEN: Query Unlearning against Model Extraction
Figure 3 for QUEEN: Query Unlearning against Model Extraction
Figure 4 for QUEEN: Query Unlearning against Model Extraction
Viaarxiv icon

Equivariant Matrix Function Neural Networks

Add code
Oct 16, 2023
Figure 1 for Equivariant Matrix Function Neural Networks
Figure 2 for Equivariant Matrix Function Neural Networks
Figure 3 for Equivariant Matrix Function Neural Networks
Figure 4 for Equivariant Matrix Function Neural Networks
Viaarxiv icon

Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness

Add code
Mar 23, 2023
Figure 1 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 2 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 3 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Figure 4 for Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness
Viaarxiv icon

Provable Convergence of Variational Monte Carlo Methods

Add code
Mar 19, 2023
Figure 1 for Provable Convergence of Variational Monte Carlo Methods
Viaarxiv icon

Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack

Add code
Mar 22, 2022
Figure 1 for Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Figure 2 for Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Figure 3 for Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Figure 4 for Making DeepFakes more spurious: evading deep face forgery detection via trace removal attack
Viaarxiv icon