Picture for Junfeng Guo

Junfeng Guo

Distortion-free Watermarks are not Truly Distortion-free under Watermark Key Collisions

Add code
Jun 02, 2024
Viaarxiv icon

Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt

Add code
Mar 25, 2024
Figure 1 for Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt
Figure 2 for Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt
Figure 3 for Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt
Figure 4 for Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt
Viaarxiv icon

Your Vision-Language Model Itself Is a Strong Filter: Towards High-Quality Instruction Tuning with Data Selection

Add code
Feb 19, 2024
Viaarxiv icon

Federated Continual Novel Class Learning

Add code
Dec 21, 2023
Viaarxiv icon

Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger

Add code
Dec 03, 2023
Viaarxiv icon

Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand

Add code
Oct 09, 2023
Viaarxiv icon

MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems

Add code
Sep 13, 2023
Figure 1 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 2 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 3 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 4 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Viaarxiv icon

Backdoor Detection in Reinforcement Learning

Add code
Feb 08, 2022
Figure 1 for Backdoor Detection in Reinforcement Learning
Figure 2 for Backdoor Detection in Reinforcement Learning
Figure 3 for Backdoor Detection in Reinforcement Learning
Figure 4 for Backdoor Detection in Reinforcement Learning
Viaarxiv icon

AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis

Add code
Nov 21, 2021
Figure 1 for AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Figure 2 for AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Figure 3 for AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Figure 4 for AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Viaarxiv icon

Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition

Add code
May 07, 2021
Figure 1 for Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition
Figure 2 for Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition
Figure 3 for Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition
Figure 4 for Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition
Viaarxiv icon