Alert button
Picture for Junfeng Guo

Junfeng Guo

Alert button

Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt

Add code
Bookmark button
Alert button
Mar 25, 2024
Chenxi Liu, Zhenyi Wang, Tianyi Xiong, Ruibo Chen, Yihan Wu, Junfeng Guo, Heng Huang

Figure 1 for Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt
Figure 2 for Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt
Figure 3 for Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt
Figure 4 for Few-Shot Class Incremental Learning with Attention-Aware Self-Adaptive Prompt
Viaarxiv icon

Your Vision-Language Model Itself Is a Strong Filter: Towards High-Quality Instruction Tuning with Data Selection

Add code
Bookmark button
Alert button
Feb 19, 2024
Ruibo Chen, Yihan Wu, Lichang Chen, Guodong Liu, Qi He, Tianyi Xiong, Chenxi Liu, Junfeng Guo, Heng Huang

Viaarxiv icon

Federated Continual Novel Class Learning

Add code
Bookmark button
Alert button
Dec 21, 2023
Lixu Wang, Chenxi Liu, Junfeng Guo, Jiahua Dong, Xiao Wang, Heng Huang, Qi Zhu

Viaarxiv icon

Towards Sample-specific Backdoor Attack with Clean Labels via Attribute Trigger

Add code
Bookmark button
Alert button
Dec 03, 2023
Yiming Li, Mingyan Zhu, Junfeng Guo, Tao Wei, Shu-Tao Xia, Zhan Qin

Viaarxiv icon

Domain Watermark: Effective and Harmless Dataset Copyright Protection is Closed at Hand

Add code
Bookmark button
Alert button
Oct 09, 2023
Junfeng Guo, Yiming Li, Lixu Wang, Shu-Tao Xia, Heng Huang, Cong Liu, Bo Li

Viaarxiv icon

MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems

Add code
Bookmark button
Alert button
Sep 13, 2023
Hanqing Guo, Xun Chen, Junfeng Guo, Li Xiao, Qiben Yan

Figure 1 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 2 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 3 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 4 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Viaarxiv icon

Backdoor Detection in Reinforcement Learning

Add code
Bookmark button
Alert button
Feb 08, 2022
Junfeng Guo, Ang Li, Cong Liu

Figure 1 for Backdoor Detection in Reinforcement Learning
Figure 2 for Backdoor Detection in Reinforcement Learning
Figure 3 for Backdoor Detection in Reinforcement Learning
Figure 4 for Backdoor Detection in Reinforcement Learning
Viaarxiv icon

AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis

Add code
Bookmark button
Alert button
Nov 21, 2021
Junfeng Guo, Ang Li, Cong Liu

Figure 1 for AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Figure 2 for AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Figure 3 for AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Figure 4 for AEVA: Black-box Backdoor Detection Using Adversarial Extreme Value Analysis
Viaarxiv icon