Alert button
Picture for Kaidi Xu

Kaidi Xu

Alert button

Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack

Add code
Bookmark button
Alert button
Aug 23, 2023
Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen

Viaarxiv icon

Exposing the Fake: Effective Diffusion-Generated Images Detection

Add code
Bookmark button
Alert button
Jul 12, 2023
Ruipeng Ma, Jinhao Duan, Fei Kong, Xiaoshuang Shi, Kaidi Xu

Figure 1 for Exposing the Fake: Effective Diffusion-Generated Images Detection
Figure 2 for Exposing the Fake: Effective Diffusion-Generated Images Detection
Figure 3 for Exposing the Fake: Effective Diffusion-Generated Images Detection
Figure 4 for Exposing the Fake: Effective Diffusion-Generated Images Detection
Viaarxiv icon

Shifting Attention to Relevance: Towards the Uncertainty Estimation of Large Language Models

Add code
Bookmark button
Alert button
Jul 03, 2023
Jinhao Duan, Hao Cheng, Shiqi Wang, Chenan Wang, Alex Zavalny, Renjing Xu, Bhavya Kailkhura, Kaidi Xu

Figure 1 for Shifting Attention to Relevance: Towards the Uncertainty Estimation of Large Language Models
Figure 2 for Shifting Attention to Relevance: Towards the Uncertainty Estimation of Large Language Models
Figure 3 for Shifting Attention to Relevance: Towards the Uncertainty Estimation of Large Language Models
Figure 4 for Shifting Attention to Relevance: Towards the Uncertainty Estimation of Large Language Models
Viaarxiv icon

Flew Over Learning Trap: Learn Unlearnable Samples by Progressive Staged Training

Add code
Bookmark button
Alert button
Jun 03, 2023
Pucheng Dang, Xing Hu, Kaidi Xu, Jinhao Duan, Di Huang, Husheng Han, Rui Zhang, Zidong Du, Qi Guo, Yunji Chen

Viaarxiv icon

Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation

Add code
Bookmark button
Alert button
Jun 02, 2023
Zhengyue Zhao, Jinhao Duan, Xing Hu, Kaidi Xu, Chenan Wang, Rui Zhang, Zidong Du, Qi Guo, Yunji Chen

Figure 1 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 2 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 3 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Figure 4 for Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation
Viaarxiv icon

Using Caterpillar to Nibble Small-Scale Images

Add code
Bookmark button
Alert button
May 28, 2023
Jin Sun, Xiaoshuang Shi, Zhiyuan Weng, Kaidi Xu, Heng Tao Shen, Xiaofeng Zhu

Figure 1 for Using Caterpillar to Nibble Small-Scale Images
Figure 2 for Using Caterpillar to Nibble Small-Scale Images
Figure 3 for Using Caterpillar to Nibble Small-Scale Images
Figure 4 for Using Caterpillar to Nibble Small-Scale Images
Viaarxiv icon

An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization

Add code
Bookmark button
Alert button
May 26, 2023
Fei Kong, Jinhao Duan, RuiPeng Ma, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, Kaidi Xu

Figure 1 for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization
Figure 2 for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization
Figure 3 for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization
Figure 4 for An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization
Viaarxiv icon

Improve Video Representation with Temporal Adversarial Augmentation

Add code
Bookmark button
Alert button
May 14, 2023
Jinhao Duan, Quanfu Fan, Hao Cheng, Xiaoshuang Shi, Kaidi Xu

Figure 1 for Improve Video Representation with Temporal Adversarial Augmentation
Figure 2 for Improve Video Representation with Temporal Adversarial Augmentation
Figure 3 for Improve Video Representation with Temporal Adversarial Augmentation
Figure 4 for Improve Video Representation with Temporal Adversarial Augmentation
Viaarxiv icon

Are Diffusion Models Vulnerable to Membership Inference Attacks?

Add code
Bookmark button
Alert button
Feb 02, 2023
Jinhao Duan, Fei Kong, Shiqi Wang, Xiaoshuang Shi, Kaidi Xu

Figure 1 for Are Diffusion Models Vulnerable to Membership Inference Attacks?
Figure 2 for Are Diffusion Models Vulnerable to Membership Inference Attacks?
Figure 3 for Are Diffusion Models Vulnerable to Membership Inference Attacks?
Figure 4 for Are Diffusion Models Vulnerable to Membership Inference Attacks?
Viaarxiv icon