Picture for Khoa D. Doan

Khoa D. Doan

Flatness-aware Sequential Learning Generates Resilient Backdoors

Add code
Jul 20, 2024
Figure 1 for Flatness-aware Sequential Learning Generates Resilient Backdoors
Figure 2 for Flatness-aware Sequential Learning Generates Resilient Backdoors
Figure 3 for Flatness-aware Sequential Learning Generates Resilient Backdoors
Figure 4 for Flatness-aware Sequential Learning Generates Resilient Backdoors
Viaarxiv icon

Less is More: Sparse Watermarking in LLMs with Enhanced Text Quality

Add code
Jul 17, 2024
Viaarxiv icon

Wicked Oddities: Selectively Poisoning for Effective Clean-Label Backdoor Attacks

Add code
Jul 16, 2024
Viaarxiv icon

MetaLLM: A High-performant and Cost-efficient Dynamic Framework for Wrapping LLMs

Add code
Jul 15, 2024
Viaarxiv icon

Forget but Recall: Incremental Latent Rectification in Continual Learning

Add code
Jun 25, 2024
Figure 1 for Forget but Recall: Incremental Latent Rectification in Continual Learning
Figure 2 for Forget but Recall: Incremental Latent Rectification in Continual Learning
Figure 3 for Forget but Recall: Incremental Latent Rectification in Continual Learning
Figure 4 for Forget but Recall: Incremental Latent Rectification in Continual Learning
Viaarxiv icon

Fooling the Textual Fooler via Randomizing Latent Representations

Add code
Oct 02, 2023
Figure 1 for Fooling the Textual Fooler via Randomizing Latent Representations
Figure 2 for Fooling the Textual Fooler via Randomizing Latent Representations
Figure 3 for Fooling the Textual Fooler via Randomizing Latent Representations
Figure 4 for Fooling the Textual Fooler via Randomizing Latent Representations
Viaarxiv icon

Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks

Add code
Oct 01, 2023
Viaarxiv icon

Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack

Add code
Sep 03, 2023
Figure 1 for Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack
Figure 2 for Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack
Figure 3 for Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack
Figure 4 for Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack
Viaarxiv icon

Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class

Add code
Oct 17, 2022
Figure 1 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 2 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 3 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Figure 4 for Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class
Viaarxiv icon

CoopHash: Cooperative Learning of Multipurpose Descriptor and Contrastive Pair Generator via Variational MCMC Teaching for Supervised Image Hashing

Add code
Oct 09, 2022
Figure 1 for CoopHash: Cooperative Learning of Multipurpose Descriptor and Contrastive Pair Generator via Variational MCMC Teaching for Supervised Image Hashing
Figure 2 for CoopHash: Cooperative Learning of Multipurpose Descriptor and Contrastive Pair Generator via Variational MCMC Teaching for Supervised Image Hashing
Figure 3 for CoopHash: Cooperative Learning of Multipurpose Descriptor and Contrastive Pair Generator via Variational MCMC Teaching for Supervised Image Hashing
Figure 4 for CoopHash: Cooperative Learning of Multipurpose Descriptor and Contrastive Pair Generator via Variational MCMC Teaching for Supervised Image Hashing
Viaarxiv icon