Search

Your search keyword '"Yu, Nenghai"' showing total 464 results

Search Constraints

Start Over You searched for: Author "Yu, Nenghai" Remove constraint Author: "Yu, Nenghai" Search Limiters Full Text Remove constraint Search Limiters: Full Text
464 results on '"Yu, Nenghai"'

Search Results

1. GenderCARE: A Comprehensive Framework for Assessing and Reducing Gender Bias in Large Language Models

2. ScalingFilter: Assessing Data Quality through Inverse Utilization of Scaling Laws

3. Mixture-of-Noises Enhanced Forgery-Aware Predictor for Multi-Face Manipulation Detection and Localization

4. UniForensics: Face Forgery Detection via General Facial Representation

5. Rank-based No-reference Quality Assessment for Face Swapping

6. AquaLoRA: Toward White-box Protection for Customized Stable Diffusion Models via Watermark LoRA

7. SPSW: Database Watermarking Based on Fake Tuples and Sparse Priority Strategy

8. \copyright Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model

9. How Far Have We Gone in Stripped Binary Code Understanding Using Large Language Models

10. Gaussian Shading: Provable Performance-Lossless Image Watermarking for Diffusion Models

11. Transformer based Pluralistic Image Completion with Reduced Information Loss

12. FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs

13. Provably Secure Disambiguating Neural Linguistic Steganography

14. MiM-ISTD: Mamba-in-Mamba for Efficient Infrared Small Target Detection

15. Towards Generalist Prompting for Large Language Models by Mental Models

16. Model X-ray:Detect Backdoored Models via Decision Boundary

17. Bootstrapping Audio-Visual Segmentation by Strengthening Audio Cues

18. TCI-Former: Thermal Conduction-Inspired Transformer for Infrared Small Target Detection

19. A Construction of Evolving $k$-threshold Secret Sharing Scheme over A Polynomial Ring

20. Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models

21. Control Risk for Potential Misuse of Artificial Intelligence in Science

22. Performance-lossless Black-box Model Watermarking

23. Data-Free Hard-Label Robustness Stealing Attack

24. Detecting Voice Cloning Attacks via Timbre Watermarking

25. Towards More Unified In-context Visual Understanding

26. OPERA: Alleviating Hallucination in Multi-Modal Large Language Models via Over-Trust Penalty and Retrospection-Allocation

27. CMFDFormer: Transformer-based Copy-Move Forgery Detection with Continual Learning

28. Turning Your Strength into Watermark: Watermarking Large Language Model via Knowledge Injection

29. Segue: Side-information Guided Generative Unlearnable Examples for Facial Privacy Protection in Real World

30. InferDPT: Privacy-Preserving Inference for Black-box Large Language Model

31. HairCLIPv2: Unifying Hair Editing via Proxy Feature Blending

32. Exploiting Modality-Specific Features For Multi-Modal Manipulation Detection And Grounding

33. Catch You Everything Everywhere: Guarding Textual Inversion via Concept Watermarking

34. Aparecium: Revealing Secrets from Physical Photographs

35. Improving Adversarial Robustness of Masked Autoencoders via Test-time Frequency-domain Prompting

36. Entanglement-Assisted Quantum Networks: Mechanics, Enabling Technologies, Challenges, and Research Directions

37. MotionGPT: Finetuned LLMs Are General-Purpose Motion Generators

38. EVOPOSE: A Recursive Transformer For 3D Human Pose Estimation With Kinematic Structure Priors

39. Exploring the Application of Large-scale Pre-trained Models on Adverse Weather Removal

40. HQ-50K: A Large-scale, High-quality Dataset for Image Restoration

41. DPIC: Decoupling Prompt and Intrinsic Characteristics for LLM Generated Text Detection

42. Multi-spectral Class Center Network for Face Manipulation Detection and Localization

43. Watermarking Text Generated by Black-Box Language Models

44. Clothes-Invariant Feature Learning by Causal Intervention for Clothes-Changing Person Re-identification

45. Deep Intellectual Property Protection: A Survey

46. Diversity-Aware Meta Visual Prompting

47. ICStega: Image Captioning-based Semantically Controllable Linguistic Steganography

48. Pseudo Label-Guided Model Inversion Attack via Conditional Generative Adversarial Network

49. OAcode: Overall Aesthetic 2D Barcode on Screen

50. VQNet 2.0: A New Generation Machine Learning Framework that Unifies Classical and Quantum

Catalog

Books, media, physical & digital resources