Picture for Ning Zhang

Ning Zhang

Sid

Maximum Likelihood Estimation on Stochastic Blockmodels for Directed Graph Clustering

Add code
Mar 28, 2024
Viaarxiv icon

Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models

Add code
Mar 26, 2024
Figure 1 for Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
Figure 2 for Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
Figure 3 for Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
Figure 4 for Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models
Viaarxiv icon

SecGPT: An Execution Isolation Architecture for LLM-Based Systems

Add code
Mar 08, 2024
Figure 1 for SecGPT: An Execution Isolation Architecture for LLM-Based Systems
Figure 2 for SecGPT: An Execution Isolation Architecture for LLM-Based Systems
Figure 3 for SecGPT: An Execution Isolation Architecture for LLM-Based Systems
Figure 4 for SecGPT: An Execution Isolation Architecture for LLM-Based Systems
Viaarxiv icon

Automatic and Universal Prompt Injection Attacks against Large Language Models

Add code
Mar 07, 2024
Viaarxiv icon

DiffMOT: A Real-time Diffusion-based Multiple Object Tracker with Non-linear Prediction

Add code
Mar 04, 2024
Figure 1 for DiffMOT: A Real-time Diffusion-based Multiple Object Tracker with Non-linear Prediction
Figure 2 for DiffMOT: A Real-time Diffusion-based Multiple Object Tracker with Non-linear Prediction
Figure 3 for DiffMOT: A Real-time Diffusion-based Multiple Object Tracker with Non-linear Prediction
Figure 4 for DiffMOT: A Real-time Diffusion-based Multiple Object Tracker with Non-linear Prediction
Viaarxiv icon

A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems

Add code
Feb 28, 2024
Figure 1 for A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems
Figure 2 for A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems
Figure 3 for A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems
Figure 4 for A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems
Viaarxiv icon

Bidirectional Autoregressive Diffusion Model for Dance Generation

Add code
Feb 06, 2024
Viaarxiv icon

Preference Poisoning Attacks on Reward Model Learning

Add code
Feb 02, 2024
Viaarxiv icon

Exploring the Limits of ChatGPT in Software Security Applications

Add code
Dec 08, 2023
Figure 1 for Exploring the Limits of ChatGPT in Software Security Applications
Figure 2 for Exploring the Limits of ChatGPT in Software Security Applications
Figure 3 for Exploring the Limits of ChatGPT in Software Security Applications
Figure 4 for Exploring the Limits of ChatGPT in Software Security Applications
Viaarxiv icon

Adaptive Digital Twin for UAV-Assisted Integrated Sensing, Communication, and Computation Networks

Add code
Oct 26, 2023
Viaarxiv icon