Picture for Zhenxing Qian

Zhenxing Qian

DANCE: Dual-View Distribution Alignment for Dataset Condensation

Add code
Jun 03, 2024
Figure 1 for DANCE: Dual-View Distribution Alignment for Dataset Condensation
Figure 2 for DANCE: Dual-View Distribution Alignment for Dataset Condensation
Figure 3 for DANCE: Dual-View Distribution Alignment for Dataset Condensation
Figure 4 for DANCE: Dual-View Distribution Alignment for Dataset Condensation
Viaarxiv icon

Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game

Add code
May 24, 2024
Figure 1 for Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game
Figure 2 for Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game
Figure 3 for Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game
Figure 4 for Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game
Viaarxiv icon

Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models

Add code
Mar 03, 2024
Figure 1 for Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models
Figure 2 for Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models
Figure 3 for Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models
Figure 4 for Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models
Viaarxiv icon

Purified and Unified Steganographic Network

Add code
Feb 27, 2024
Figure 1 for Purified and Unified Steganographic Network
Figure 2 for Purified and Unified Steganographic Network
Figure 3 for Purified and Unified Steganographic Network
Figure 4 for Purified and Unified Steganographic Network
Viaarxiv icon

Object-oriented backdoor attack against image captioning

Add code
Jan 05, 2024
Figure 1 for Object-oriented backdoor attack against image captioning
Figure 2 for Object-oriented backdoor attack against image captioning
Figure 3 for Object-oriented backdoor attack against image captioning
Figure 4 for Object-oriented backdoor attack against image captioning
Viaarxiv icon

Fact-checking based fake news detection: a review

Add code
Jan 03, 2024
Viaarxiv icon

From Covert Hiding to Visual Editing: Robust Generative Video Steganography

Add code
Jan 01, 2024
Figure 1 for From Covert Hiding to Visual Editing: Robust Generative Video Steganography
Figure 2 for From Covert Hiding to Visual Editing: Robust Generative Video Steganography
Figure 3 for From Covert Hiding to Visual Editing: Robust Generative Video Steganography
Figure 4 for From Covert Hiding to Visual Editing: Robust Generative Video Steganography
Viaarxiv icon

PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning

Add code
Jan 01, 2024
Figure 1 for PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning
Figure 2 for PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning
Figure 3 for PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning
Figure 4 for PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning
Viaarxiv icon

Steal My Artworks for Fine-tuning? A Watermarking Framework for Detecting Art Theft Mimicry in Text-to-Image Models

Add code
Nov 22, 2023
Viaarxiv icon

Rich and Poor Texture Contrast: A Simple yet Effective Approach for AI-generated Image Detection

Add code
Nov 21, 2023
Viaarxiv icon