Picture for Raha Moraffah

Raha Moraffah

"Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models

Add code
Jun 26, 2024
Figure 1 for "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models
Figure 2 for "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models
Figure 3 for "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models
Figure 4 for "Glue pizza and eat rocks" -- Exploiting Vulnerabilities in Retrieval-Augmented Generative Models
Viaarxiv icon

Zero-shot LLM-guided Counterfactual Generation for Text

Add code
May 08, 2024
Figure 1 for Zero-shot LLM-guided Counterfactual Generation for Text
Figure 2 for Zero-shot LLM-guided Counterfactual Generation for Text
Figure 3 for Zero-shot LLM-guided Counterfactual Generation for Text
Figure 4 for Zero-shot LLM-guided Counterfactual Generation for Text
Viaarxiv icon

Cross-Platform Hate Speech Detection with Weakly Supervised Causal Disentanglement

Add code
Apr 17, 2024
Viaarxiv icon

EAGLE: A Domain Generalization Framework for AI-generated Text Detection

Add code
Mar 23, 2024
Figure 1 for EAGLE: A Domain Generalization Framework for AI-generated Text Detection
Figure 2 for EAGLE: A Domain Generalization Framework for AI-generated Text Detection
Figure 3 for EAGLE: A Domain Generalization Framework for AI-generated Text Detection
Figure 4 for EAGLE: A Domain Generalization Framework for AI-generated Text Detection
Viaarxiv icon

A Survey of AI-generated Text Forensic Systems: Detection, Attribution, and Characterization

Add code
Mar 02, 2024
Figure 1 for A Survey of AI-generated Text Forensic Systems: Detection, Attribution, and Characterization
Figure 2 for A Survey of AI-generated Text Forensic Systems: Detection, Attribution, and Characterization
Figure 3 for A Survey of AI-generated Text Forensic Systems: Detection, Attribution, and Characterization
Figure 4 for A Survey of AI-generated Text Forensic Systems: Detection, Attribution, and Characterization
Viaarxiv icon

The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative

Add code
Feb 20, 2024
Figure 1 for The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative
Figure 2 for The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative
Figure 3 for The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative
Figure 4 for The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative
Viaarxiv icon

A Generative Approach to Surrogate-based Black-box Attacks

Add code
Feb 05, 2024
Viaarxiv icon

Exploiting Class Probabilities for Black-box Sentence-level Attacks

Add code
Feb 05, 2024
Figure 1 for Exploiting Class Probabilities for Black-box Sentence-level Attacks
Figure 2 for Exploiting Class Probabilities for Black-box Sentence-level Attacks
Figure 3 for Exploiting Class Probabilities for Black-box Sentence-level Attacks
Figure 4 for Exploiting Class Probabilities for Black-box Sentence-level Attacks
Viaarxiv icon

Causal Feature Selection for Responsible Machine Learning

Add code
Feb 05, 2024
Viaarxiv icon

Adversarial Text Purification: A Large Language Model Approach for Defense

Add code
Feb 05, 2024
Figure 1 for Adversarial Text Purification: A Large Language Model Approach for Defense
Figure 2 for Adversarial Text Purification: A Large Language Model Approach for Defense
Figure 3 for Adversarial Text Purification: A Large Language Model Approach for Defense
Figure 4 for Adversarial Text Purification: A Large Language Model Approach for Defense
Viaarxiv icon