Search Results for author: Guoming Lu

Found 3 papers, 0 papers with code

Backdoor Attack Against Vision Transformers via Attention Gradient-Based Image Erosion

no code implementations30 Oct 2024 Ji Guo, Hongwei Li, Wenbo Jiang, Guoming Lu

Unlike previous backdoor attacks against ViTs, AGEB achieves an optimal balance between attack stealthiness and attack effectiveness, ensuring the trigger remains invisible to human detection while preserving the model's accuracy on clean samples.

Backdoor Attack Human Detection

One Prompt to Verify Your Models: Black-Box Text-to-Image Models Verification via Non-Transferable Adversarial Attacks

no code implementations30 Oct 2024 Ji Guo, Wenbo Jiang, Rui Zhang, Guoming Lu, Hongwei Li

To answer this question, we first define the concept of T2I model verification, which aims to determine whether a black-box target model is identical to a given white-box reference T2I model.

text similarity

Cannot find the paper you are looking for? You can Submit a new open access paper.