Picture for Huan Liu

Huan Liu

C2P-CLIP: Injecting Category Common Prompt in CLIP to Enhance Generalization in Deepfake Detection

Add code
Aug 19, 2024
Figure 1 for C2P-CLIP: Injecting Category Common Prompt in CLIP to Enhance Generalization in Deepfake Detection
Figure 2 for C2P-CLIP: Injecting Category Common Prompt in CLIP to Enhance Generalization in Deepfake Detection
Figure 3 for C2P-CLIP: Injecting Category Common Prompt in CLIP to Enhance Generalization in Deepfake Detection
Figure 4 for C2P-CLIP: Injecting Category Common Prompt in CLIP to Enhance Generalization in Deepfake Detection
Viaarxiv icon

Model Attribution in Machine-Generated Disinformation: A Domain Generalization Approach with Supervised Contrastive Learning

Add code
Jul 31, 2024
Viaarxiv icon

BlueTempNet: A Temporal Multi-network Dataset of Social Interactions in Bluesky Social

Add code
Jul 24, 2024
Viaarxiv icon

Mindful-RAG: A Study of Points of Failure in Retrieval Augmented Generation

Add code
Jul 16, 2024
Figure 1 for Mindful-RAG: A Study of Points of Failure in Retrieval Augmented Generation
Figure 2 for Mindful-RAG: A Study of Points of Failure in Retrieval Augmented Generation
Viaarxiv icon

Catching Chameleons: Detecting Evolving Disinformation Generated using Large Language Models

Add code
Jun 26, 2024
Viaarxiv icon

"Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models

Add code
Jun 26, 2024
Figure 1 for "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models
Figure 2 for "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models
Figure 3 for "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models
Figure 4 for "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models
Viaarxiv icon

Defending Against Social Engineering Attacks in the Age of LLMs

Add code
Jun 18, 2024
Figure 1 for Defending Against Social Engineering Attacks in the Age of LLMs
Figure 2 for Defending Against Social Engineering Attacks in the Age of LLMs
Figure 3 for Defending Against Social Engineering Attacks in the Age of LLMs
Figure 4 for Defending Against Social Engineering Attacks in the Age of LLMs
Viaarxiv icon

Prioritizing Potential Wetland Areas via Region-to-Region Knowledge Transfer and Adaptive Propagation

Add code
Jun 08, 2024
Figure 1 for Prioritizing Potential Wetland Areas via Region-to-Region Knowledge Transfer and Adaptive Propagation
Figure 2 for Prioritizing Potential Wetland Areas via Region-to-Region Knowledge Transfer and Adaptive Propagation
Figure 3 for Prioritizing Potential Wetland Areas via Region-to-Region Knowledge Transfer and Adaptive Propagation
Figure 4 for Prioritizing Potential Wetland Areas via Region-to-Region Knowledge Transfer and Adaptive Propagation
Viaarxiv icon

Cognitive Evolutionary Learning to Select Feature Interactions for Recommender Systems

Add code
May 29, 2024
Figure 1 for Cognitive Evolutionary Learning to Select Feature Interactions for Recommender Systems
Figure 2 for Cognitive Evolutionary Learning to Select Feature Interactions for Recommender Systems
Figure 3 for Cognitive Evolutionary Learning to Select Feature Interactions for Recommender Systems
Figure 4 for Cognitive Evolutionary Learning to Select Feature Interactions for Recommender Systems
Viaarxiv icon

Efficient Reinforcement Learning via Large Language Model-based Search

Add code
May 24, 2024
Figure 1 for Efficient Reinforcement Learning via Large Language Model-based Search
Figure 2 for Efficient Reinforcement Learning via Large Language Model-based Search
Figure 3 for Efficient Reinforcement Learning via Large Language Model-based Search
Figure 4 for Efficient Reinforcement Learning via Large Language Model-based Search
Viaarxiv icon