Picture for Zhongliang Guo

Zhongliang Guo

Towards more transferable adversarial attack in black-box manner

Add code
May 23, 2025
Viaarxiv icon

My Face Is Mine, Not Yours: Facial Protection Against Diffusion Model Face Swapping

Add code
May 21, 2025
Viaarxiv icon

T2ICount: Enhancing Cross-modal Understanding for Zero-Shot Counting

Add code
Feb 28, 2025
Viaarxiv icon

FedKD-hybrid: Federated Hybrid Knowledge Distillation for Lithography Hotspot Detection

Add code
Jan 07, 2025
Figure 1 for FedKD-hybrid: Federated Hybrid Knowledge Distillation for Lithography Hotspot Detection
Figure 2 for FedKD-hybrid: Federated Hybrid Knowledge Distillation for Lithography Hotspot Detection
Figure 3 for FedKD-hybrid: Federated Hybrid Knowledge Distillation for Lithography Hotspot Detection
Figure 4 for FedKD-hybrid: Federated Hybrid Knowledge Distillation for Lithography Hotspot Detection
Viaarxiv icon

MMAD-Purify: A Precision-Optimized Framework for Efficient and Scalable Multi-Modal Attacks

Add code
Oct 17, 2024
Figure 1 for MMAD-Purify: A Precision-Optimized Framework for Efficient and Scalable Multi-Modal Attacks
Figure 2 for MMAD-Purify: A Precision-Optimized Framework for Efficient and Scalable Multi-Modal Attacks
Figure 3 for MMAD-Purify: A Precision-Optimized Framework for Efficient and Scalable Multi-Modal Attacks
Figure 4 for MMAD-Purify: A Precision-Optimized Framework for Efficient and Scalable Multi-Modal Attacks
Viaarxiv icon

Weak-To-Strong Backdoor Attacks for LLMs with Contrastive Knowledge Distillation

Add code
Sep 26, 2024
Viaarxiv icon

Instant Adversarial Purification with Adversarial Consistency Distillation

Add code
Sep 02, 2024
Figure 1 for Instant Adversarial Purification with Adversarial Consistency Distillation
Figure 2 for Instant Adversarial Purification with Adversarial Consistency Distillation
Figure 3 for Instant Adversarial Purification with Adversarial Consistency Distillation
Figure 4 for Instant Adversarial Purification with Adversarial Consistency Distillation
Viaarxiv icon

A Grey-box Attack against Latent Diffusion Model-based Image Editing by Posterior Collapse

Add code
Aug 20, 2024
Viaarxiv icon

Threats and Defenses in Federated Learning Life Cycle: A Comprehensive Survey and Challenges

Add code
Jul 11, 2024
Figure 1 for Threats and Defenses in Federated Learning Life Cycle: A Comprehensive Survey and Challenges
Figure 2 for Threats and Defenses in Federated Learning Life Cycle: A Comprehensive Survey and Challenges
Figure 3 for Threats and Defenses in Federated Learning Life Cycle: A Comprehensive Survey and Challenges
Figure 4 for Threats and Defenses in Federated Learning Life Cycle: A Comprehensive Survey and Challenges
Viaarxiv icon

A Survey of Backdoor Attacks and Defenses on Large Language Models: Implications for Security Measures

Add code
Jun 10, 2024
Viaarxiv icon