Picture for Shijian Lu

Shijian Lu

Nanyang Technological University

ToDRE: Visual Token Pruning via Diversity and Task Awareness for Efficient Large Vision-Language Models

Add code
May 24, 2025
Viaarxiv icon

MTL-UE: Learning to Learn Nothing for Multi-Task Learning

Add code
May 08, 2025
Viaarxiv icon

Towards Model Resistant to Transferable Adversarial Examples via Trigger Activation

Add code
Apr 20, 2025
Viaarxiv icon

R1-VL: Learning to Reason with Multimodal Large Language Models via Step-wise Group Relative Policy Optimization

Add code
Mar 17, 2025
Viaarxiv icon

Exploring 3D Activity Reasoning and Planning: From Implicit Human Intentions to Route-Aware Planning

Add code
Mar 17, 2025
Viaarxiv icon

MMLU-ProX: A Multilingual Benchmark for Advanced Large Language Model Evaluation

Add code
Mar 13, 2025
Viaarxiv icon

SOGS: Second-Order Anchor for Advanced 3D Gaussian Splatting

Add code
Mar 10, 2025
Viaarxiv icon

Data-Efficient Generalization for Zero-shot Composed Image Retrieval

Add code
Mar 07, 2025
Viaarxiv icon

Backdoor Attacks against No-Reference Image Quality Assessment Models via A Scalable Trigger

Add code
Dec 10, 2024
Figure 1 for Backdoor Attacks against No-Reference Image Quality Assessment Models via A Scalable Trigger
Figure 2 for Backdoor Attacks against No-Reference Image Quality Assessment Models via A Scalable Trigger
Figure 3 for Backdoor Attacks against No-Reference Image Quality Assessment Models via A Scalable Trigger
Figure 4 for Backdoor Attacks against No-Reference Image Quality Assessment Models via A Scalable Trigger
Viaarxiv icon

Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior

Add code
Dec 02, 2024
Figure 1 for Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Figure 2 for Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Figure 3 for Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Figure 4 for Robust and Transferable Backdoor Attacks Against Deep Image Compression With Selective Frequency Prior
Viaarxiv icon