Picture for Wenbo Zhou

Wenbo Zhou

Get Experience from Practice: LLM Agents with Record & Replay

Add code
May 23, 2025
Viaarxiv icon

Jailbreaking the Text-to-Video Generative Models

Add code
May 10, 2025
Viaarxiv icon

CasaGPT: Cuboid Arrangement and Scene Assembly for Interior Design

Add code
Apr 28, 2025
Viaarxiv icon

MES-RAG: Bringing Multi-modal, Entity-Storage, and Secure Enhancements to RAG

Add code
Mar 17, 2025
Viaarxiv icon

Efficient Dataset Distillation through Low-Rank Space Sampling

Add code
Mar 11, 2025
Viaarxiv icon

Inclusion 2024 Global Multimedia Deepfake Detection: Towards Multi-dimensional Facial Forgery Detection

Add code
Dec 30, 2024
Figure 1 for Inclusion 2024 Global Multimedia Deepfake Detection: Towards Multi-dimensional Facial Forgery Detection
Figure 2 for Inclusion 2024 Global Multimedia Deepfake Detection: Towards Multi-dimensional Facial Forgery Detection
Figure 3 for Inclusion 2024 Global Multimedia Deepfake Detection: Towards Multi-dimensional Facial Forgery Detection
Figure 4 for Inclusion 2024 Global Multimedia Deepfake Detection: Towards Multi-dimensional Facial Forgery Detection
Viaarxiv icon

EraseAnything: Enabling Concept Erasure in Rectified Flow Transformers

Add code
Dec 29, 2024
Viaarxiv icon

FaceTracer: Unveiling Source Identities from Swapped Face Images and Videos for Fraud Prevention

Add code
Dec 11, 2024
Figure 1 for FaceTracer: Unveiling Source Identities from Swapped Face Images and Videos for Fraud Prevention
Figure 2 for FaceTracer: Unveiling Source Identities from Swapped Face Images and Videos for Fraud Prevention
Figure 3 for FaceTracer: Unveiling Source Identities from Swapped Face Images and Videos for Fraud Prevention
Figure 4 for FaceTracer: Unveiling Source Identities from Swapped Face Images and Videos for Fraud Prevention
Viaarxiv icon

GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models

Add code
Aug 22, 2024
Viaarxiv icon

Compromising Embodied Agents with Contextual Backdoor Attacks

Add code
Aug 06, 2024
Figure 1 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 2 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 3 for Compromising Embodied Agents with Contextual Backdoor Attacks
Figure 4 for Compromising Embodied Agents with Contextual Backdoor Attacks
Viaarxiv icon