Picture for Yue Xing

Yue Xing

Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models

Add code
Jun 21, 2024
Figure 1 for Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models
Figure 2 for Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models
Figure 3 for Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models
Figure 4 for Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models
Viaarxiv icon

Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis

Add code
Jun 16, 2024
Figure 1 for Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis
Figure 2 for Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis
Figure 3 for Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis
Figure 4 for Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis
Viaarxiv icon

Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention

Add code
Mar 17, 2024
Figure 1 for Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention
Figure 2 for Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention
Figure 3 for Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention
Figure 4 for Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention
Viaarxiv icon

Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability

Add code
Mar 06, 2024
Figure 1 for Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability
Figure 2 for Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability
Figure 3 for Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability
Figure 4 for Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability
Viaarxiv icon

The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation

Add code
Feb 23, 2024
Figure 1 for The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation
Figure 2 for The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation
Figure 3 for The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation
Figure 4 for The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation
Viaarxiv icon

Benefits of Transformer: In-Context Learning in Linear Regression Tasks with Unstructured Data

Add code
Feb 01, 2024
Viaarxiv icon

Superiority of Multi-Head Attention in In-Context Linear Regression

Add code
Jan 30, 2024
Viaarxiv icon

Better Representations via Adversarial Training in Pre-Training: A Theoretical Perspective

Add code
Jan 26, 2024
Viaarxiv icon

Exploring Memorization in Fine-tuned Language Models

Add code
Oct 10, 2023
Figure 1 for Exploring Memorization in Fine-tuned Language Models
Figure 2 for Exploring Memorization in Fine-tuned Language Models
Figure 3 for Exploring Memorization in Fine-tuned Language Models
Figure 4 for Exploring Memorization in Fine-tuned Language Models
Viaarxiv icon

FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models

Add code
Oct 03, 2023
Figure 1 for FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models
Figure 2 for FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models
Figure 3 for FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models
Figure 4 for FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models
Viaarxiv icon