Picture for Qing Guo

Qing Guo

IHPC, Agency for Science, Technology and Research, Singapore, CFAR, Agency for Science, Technology and Research, Singapore

MAGIC: Mastering Physical Adversarial Generation in Context through Collaborative LLM Agents

Add code
Dec 11, 2024
Figure 1 for MAGIC: Mastering Physical Adversarial Generation in Context through Collaborative LLM Agents
Figure 2 for MAGIC: Mastering Physical Adversarial Generation in Context through Collaborative LLM Agents
Figure 3 for MAGIC: Mastering Physical Adversarial Generation in Context through Collaborative LLM Agents
Figure 4 for MAGIC: Mastering Physical Adversarial Generation in Context through Collaborative LLM Agents
Viaarxiv icon

SceneTAP: Scene-Coherent Typographic Adversarial Planner against Vision-Language Models in Real-World Environments

Add code
Nov 28, 2024
Figure 1 for SceneTAP: Scene-Coherent Typographic Adversarial Planner against Vision-Language Models in Real-World Environments
Figure 2 for SceneTAP: Scene-Coherent Typographic Adversarial Planner against Vision-Language Models in Real-World Environments
Figure 3 for SceneTAP: Scene-Coherent Typographic Adversarial Planner against Vision-Language Models in Real-World Environments
Figure 4 for SceneTAP: Scene-Coherent Typographic Adversarial Planner against Vision-Language Models in Real-World Environments
Viaarxiv icon

Imitation from Diverse Behaviors: Wasserstein Quality Diversity Imitation Learning with Single-Step Archive Exploration

Add code
Nov 11, 2024
Viaarxiv icon

Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack

Add code
Nov 04, 2024
Figure 1 for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack
Figure 2 for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack
Figure 3 for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack
Figure 4 for Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack
Viaarxiv icon

Quality Diversity Imitation Learning

Add code
Oct 08, 2024
Viaarxiv icon

RT-Attack: Jailbreaking Text-to-Image Models via Random Token

Add code
Aug 27, 2024
Figure 1 for RT-Attack: Jailbreaking Text-to-Image Models via Random Token
Figure 2 for RT-Attack: Jailbreaking Text-to-Image Models via Random Token
Figure 3 for RT-Attack: Jailbreaking Text-to-Image Models via Random Token
Figure 4 for RT-Attack: Jailbreaking Text-to-Image Models via Random Token
Viaarxiv icon

Compromising Embodied Agents with Contextual Backdoor Attacks

Add code
Aug 06, 2024
Figure 1 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 2 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 3 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 4 for Compromising Embodied Agents with Contextual Backdoor Attacks
Viaarxiv icon

CLII: Visual-Text Inpainting via Cross-Modal Predictive Interaction

Add code
Jul 23, 2024
Figure 1 for CLII: Visual-Text Inpainting via Cross-Modal Predictive Interaction
Figure 2 for CLII: Visual-Text Inpainting via Cross-Modal Predictive Interaction
Figure 3 for CLII: Visual-Text Inpainting via Cross-Modal Predictive Interaction
Figure 4 for CLII: Visual-Text Inpainting via Cross-Modal Predictive Interaction
Viaarxiv icon

Event Trojan: Asynchronous Event-based Backdoor Attacks

Add code
Jul 09, 2024
Figure 1 for Event Trojan: Asynchronous Event-based Backdoor Attacks
Figure 2 for Event Trojan: Asynchronous Event-based Backdoor Attacks
Figure 3 for Event Trojan: Asynchronous Event-based Backdoor Attacks
Figure 4 for Event Trojan: Asynchronous Event-based Backdoor Attacks
Viaarxiv icon

EmoAttack: Emotion-to-Image Diffusion Models for Emotional Backdoor Generation

Add code
Jun 22, 2024
Figure 1 for EmoAttack: Emotion-to-Image Diffusion Models for Emotional Backdoor Generation
Figure 2 for EmoAttack: Emotion-to-Image Diffusion Models for Emotional Backdoor Generation
Figure 3 for EmoAttack: Emotion-to-Image Diffusion Models for Emotional Backdoor Generation
Figure 4 for EmoAttack: Emotion-to-Image Diffusion Models for Emotional Backdoor Generation
Viaarxiv icon