Picture for Pan Zhou

Pan Zhou

The Hubei Engineering Research Center on Big Data Security, School of Cyber Science and Engineering, Huazhong University of Science and Technology

Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis

Add code
Nov 22, 2023
Figure 1 for Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis
Figure 2 for Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis
Figure 3 for Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis
Figure 4 for Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis
Viaarxiv icon

Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts

Add code
Nov 15, 2023
Viaarxiv icon

Instant3D: Instant Text-to-3D Generation

Add code
Nov 14, 2023
Figure 1 for Instant3D: Instant Text-to-3D Generation
Figure 2 for Instant3D: Instant Text-to-3D Generation
Figure 3 for Instant3D: Instant Text-to-3D Generation
Figure 4 for Instant3D: Instant Text-to-3D Generation
Viaarxiv icon

F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns

Add code
Oct 23, 2023
Figure 1 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 2 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 3 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Figure 4 for F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns
Viaarxiv icon

ScaleLong: Towards More Stable Training of Diffusion Model via Scaling Network Long Skip Connection

Add code
Oct 20, 2023
Viaarxiv icon

MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use

Add code
Oct 12, 2023
Figure 1 for MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use
Figure 2 for MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use
Figure 3 for MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use
Figure 4 for MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use
Viaarxiv icon

3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack

Add code
Aug 15, 2023
Figure 1 for 3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
Figure 2 for 3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
Figure 3 for 3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
Figure 4 for 3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
Viaarxiv icon

Graph Agent Network: Empowering Nodes with Decentralized Communications Capabilities for Adversarial Resilience

Add code
Jun 12, 2023
Viaarxiv icon

Fast Diffusion Model

Add code
Jun 12, 2023
Figure 1 for Fast Diffusion Model
Figure 2 for Fast Diffusion Model
Figure 3 for Fast Diffusion Model
Figure 4 for Fast Diffusion Model
Viaarxiv icon

Transform-Equivariant Consistency Learning for Temporal Sentence Grounding

Add code
May 06, 2023
Viaarxiv icon