Picture for Ziqiang Li

Ziqiang Li

Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks

Add code
Aug 21, 2024
Viaarxiv icon

Infinite-ID: Identity-preserved Personalization via ID-semantics Decoupling Paradigm

Add code
Mar 18, 2024
Figure 1 for Infinite-ID: Identity-preserved Personalization via ID-semantics Decoupling Paradigm
Figure 2 for Infinite-ID: Identity-preserved Personalization via ID-semantics Decoupling Paradigm
Figure 3 for Infinite-ID: Identity-preserved Personalization via ID-semantics Decoupling Paradigm
Figure 4 for Infinite-ID: Identity-preserved Personalization via ID-semantics Decoupling Paradigm
Viaarxiv icon

Closed-Loop Unsupervised Representation Disentanglement with $β$-VAE Distillation and Diffusion Probabilistic Feedback

Add code
Feb 04, 2024
Viaarxiv icon

Diffusion model for relational inference

Add code
Jan 30, 2024
Viaarxiv icon

Two-stream joint matching method based on contrastive learning for few-shot action recognition

Add code
Jan 08, 2024
Viaarxiv icon

Efficient Trigger Word Insertion

Add code
Nov 23, 2023
Viaarxiv icon

Peer is Your Pillar: A Data-unbalanced Conditional GANs for Few-shot Image Generation

Add code
Nov 14, 2023
Viaarxiv icon

Explore the Effect of Data Selection on Poison Efficiency in Backdoor Attacks

Add code
Oct 15, 2023
Viaarxiv icon

Dynamical Graph Echo State Networks with Snapshot Merging for Dissemination Process Classification

Add code
Jul 03, 2023
Figure 1 for Dynamical Graph Echo State Networks with Snapshot Merging for Dissemination Process Classification
Figure 2 for Dynamical Graph Echo State Networks with Snapshot Merging for Dissemination Process Classification
Figure 3 for Dynamical Graph Echo State Networks with Snapshot Merging for Dissemination Process Classification
Figure 4 for Dynamical Graph Echo State Networks with Snapshot Merging for Dissemination Process Classification
Viaarxiv icon

Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios

Add code
Jun 14, 2023
Figure 1 for Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios
Figure 2 for Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios
Figure 3 for Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios
Figure 4 for Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios
Viaarxiv icon