Picture for Yufan Wu

Yufan Wu

HI-TOM: A Benchmark for Evaluating Higher-Order Theory of Mind Reasoning in Large Language Models

Add code
Oct 25, 2023
Figure 1 for HI-TOM: A Benchmark for Evaluating Higher-Order Theory of Mind Reasoning in Large Language Models
Figure 2 for HI-TOM: A Benchmark for Evaluating Higher-Order Theory of Mind Reasoning in Large Language Models
Figure 3 for HI-TOM: A Benchmark for Evaluating Higher-Order Theory of Mind Reasoning in Large Language Models
Figure 4 for HI-TOM: A Benchmark for Evaluating Higher-Order Theory of Mind Reasoning in Large Language Models
Viaarxiv icon

Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense

Add code
Apr 14, 2023
Figure 1 for Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense
Figure 2 for Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense
Figure 3 for Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense
Figure 4 for Interpretability is a Kind of Safety: An Interpreter-based Ensemble for Adversary Defense
Viaarxiv icon

ConvTransformer: A Convolutional Transformer Network for Video Frame Synthesis

Add code
Nov 20, 2020
Figure 1 for ConvTransformer: A Convolutional Transformer Network for Video Frame Synthesis
Figure 2 for ConvTransformer: A Convolutional Transformer Network for Video Frame Synthesis
Figure 3 for ConvTransformer: A Convolutional Transformer Network for Video Frame Synthesis
Figure 4 for ConvTransformer: A Convolutional Transformer Network for Video Frame Synthesis
Viaarxiv icon

Detecting and Recovering Adversarial Examples: An Input Sensitivity Guided Method

Add code
Feb 28, 2020
Figure 1 for Detecting and Recovering Adversarial Examples: An Input Sensitivity Guided Method
Figure 2 for Detecting and Recovering Adversarial Examples: An Input Sensitivity Guided Method
Figure 3 for Detecting and Recovering Adversarial Examples: An Input Sensitivity Guided Method
Figure 4 for Detecting and Recovering Adversarial Examples: An Input Sensitivity Guided Method
Viaarxiv icon