Alert button
Picture for Xiaohua Jia

Xiaohua Jia

Alert button

LMEraser: Large Model Unlearning through Adaptive Prompt Tuning

Add code
Bookmark button
Alert button
Apr 17, 2024
Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia

Viaarxiv icon

Machine Unlearning: Solutions and Challenges

Add code
Bookmark button
Alert button
Aug 14, 2023
Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia

Figure 1 for Machine Unlearning: Solutions and Challenges
Figure 2 for Machine Unlearning: Solutions and Challenges
Figure 3 for Machine Unlearning: Solutions and Challenges
Figure 4 for Machine Unlearning: Solutions and Challenges
Viaarxiv icon

Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process

Add code
Bookmark button
Alert button
Jun 06, 2023
Sen Peng, Yufei Chen, Cong Wang, Xiaohua Jia

Figure 1 for Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process
Figure 2 for Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process
Figure 3 for Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process
Figure 4 for Protecting the Intellectual Property of Diffusion Models by the Watermark Diffusion Process
Viaarxiv icon

Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service

Add code
Bookmark button
Alert button
Feb 16, 2022
Songlei Wang, Yifeng Zheng, Xiaohua Jia

Figure 1 for Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service
Figure 2 for Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service
Figure 3 for Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service
Figure 4 for Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service
Viaarxiv icon

Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems

Add code
Bookmark button
Alert button
Oct 20, 2021
Jindi Zhang, Yifan Zhang, Kejie Lu, Jianping Wang, Kui Wu, Xiaohua Jia, Bin Liu

Figure 1 for Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems
Figure 2 for Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems
Figure 3 for Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems
Figure 4 for Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems
Viaarxiv icon

Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles

Add code
Bookmark button
Alert button
Aug 06, 2021
Jindi Zhang, Yang Lou, Jianping Wang, Kui Wu, Kejie Lu, Xiaohua Jia

Figure 1 for Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles
Figure 2 for Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles
Figure 3 for Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles
Figure 4 for Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles
Viaarxiv icon