Picture for Meng Xue

Meng Xue

Beyond Max Tokens: Stealthy Resource Amplification via Tool Calling Chains in LLM Agents

Add code
Jan 16, 2026
Viaarxiv icon

An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers

Add code
Dec 09, 2024
Figure 1 for An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers
Figure 2 for An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers
Figure 3 for An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers
Figure 4 for An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers
Viaarxiv icon

Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer

Add code
Dec 06, 2024
Figure 1 for Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer
Figure 2 for Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer
Figure 3 for Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer
Figure 4 for Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer
Viaarxiv icon