no code implementations • 30 Oct 2024 • Ji Guo, Hongwei Li, Wenbo Jiang, Guoming Lu
Unlike previous backdoor attacks against ViTs, AGEB achieves an optimal balance between attack stealthiness and attack effectiveness, ensuring the trigger remains invisible to human detection while preserving the model's accuracy on clean samples.
no code implementations • 30 Oct 2024 • Ji Guo, Wenbo Jiang, Rui Zhang, Guoming Lu, Hongwei Li
To answer this question, we first define the concept of T2I model verification, which aims to determine whether a black-box target model is identical to a given white-box reference T2I model.
no code implementations • 6 Jan 2021 • Hailin Wang, Ke Qin, Rufai Yusuf Zakari, Guoming Lu, Jin Yin
One of the representations of knowledge is semantic relations between entities.