Picture for Zhibo Wang

Zhibo Wang

Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning

Add code
Jun 22, 2024
Viaarxiv icon

Textual Unlearning Gives a False Sense of Unlearning

Add code
Jun 19, 2024
Viaarxiv icon

Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation

Add code
May 30, 2024
Viaarxiv icon

A Causal Explainable Guardrails for Large Language Models

Add code
May 07, 2024
Viaarxiv icon

Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models

Add code
May 07, 2024
Figure 1 for Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models
Figure 2 for Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models
Figure 3 for Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models
Figure 4 for Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models
Viaarxiv icon

SoK: Gradient Leakage in Federated Learning

Add code
Apr 08, 2024
Figure 1 for SoK: Gradient Leakage in Federated Learning
Figure 2 for SoK: Gradient Leakage in Federated Learning
Figure 3 for SoK: Gradient Leakage in Federated Learning
Figure 4 for SoK: Gradient Leakage in Federated Learning
Viaarxiv icon

Siamese Meets Diffusion Network: SMDNet for Enhanced Change Detection in High-Resolution RS Imagery

Add code
Jan 17, 2024
Viaarxiv icon

Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning

Add code
Oct 15, 2023
Figure 1 for Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning
Figure 2 for Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning
Figure 3 for Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning
Figure 4 for Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning
Viaarxiv icon

SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution

Add code
Sep 25, 2023
Figure 1 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 2 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 3 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Figure 4 for SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution
Viaarxiv icon

Locate and Verify: A Two-Stream Network for Improved Deepfake Detection

Add code
Sep 20, 2023
Figure 1 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 2 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 3 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Figure 4 for Locate and Verify: A Two-Stream Network for Improved Deepfake Detection
Viaarxiv icon