Picture for Xun Chen

Xun Chen

BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models

Add code
Jun 03, 2024
Figure 1 for BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models
Figure 2 for BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models
Figure 3 for BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models
Figure 4 for BadRAG: Identifying Vulnerabilities in Retrieval Augmented Generation of Large Language Models
Viaarxiv icon

InternLM2 Technical Report

Add code
Mar 26, 2024
Figure 1 for InternLM2 Technical Report
Figure 2 for InternLM2 Technical Report
Figure 3 for InternLM2 Technical Report
Figure 4 for InternLM2 Technical Report
Viaarxiv icon

Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation

Add code
Mar 02, 2024
Figure 1 for Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation
Figure 2 for Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation
Figure 3 for Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation
Figure 4 for Dual Graph Attention based Disentanglement Multiple Instance Learning for Brain Age Estimation
Viaarxiv icon

Learning to Compress Prompt in Natural Language Formats

Add code
Feb 28, 2024
Viaarxiv icon

TrustLLM: Trustworthiness in Large Language Models

Add code
Jan 25, 2024
Figure 1 for TrustLLM: Trustworthiness in Large Language Models
Figure 2 for TrustLLM: Trustworthiness in Large Language Models
Figure 3 for TrustLLM: Trustworthiness in Large Language Models
Figure 4 for TrustLLM: Trustworthiness in Large Language Models
Viaarxiv icon

TrojFSP: Trojan Insertion in Few-shot Prompt Tuning

Add code
Dec 16, 2023
Figure 1 for TrojFSP: Trojan Insertion in Few-shot Prompt Tuning
Figure 2 for TrojFSP: Trojan Insertion in Few-shot Prompt Tuning
Figure 3 for TrojFSP: Trojan Insertion in Few-shot Prompt Tuning
Figure 4 for TrojFSP: Trojan Insertion in Few-shot Prompt Tuning
Viaarxiv icon

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?

Add code
Dec 10, 2023
Viaarxiv icon

Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis

Add code
Nov 22, 2023
Figure 1 for Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis
Figure 2 for Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis
Figure 3 for Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis
Figure 4 for Toward Robust Imperceptible Perturbation against Unauthorized Text-to-image Diffusion-based Synthesis
Viaarxiv icon

Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise

Add code
Nov 22, 2023
Figure 1 for Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise
Figure 2 for Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise
Figure 3 for Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise
Figure 4 for Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise
Viaarxiv icon

MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems

Add code
Sep 13, 2023
Figure 1 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 2 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 3 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Figure 4 for MASTERKEY: Practical Backdoor Attack Against Speaker Verification Systems
Viaarxiv icon