Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical protection against video data leakage via universal adversarial head., , , , and . Pattern Recognit., (2022)Adversarial Robustness for Visual Grounding of Multimodal Large Language Models., , , , and . CoRR, (2024)Rectified Decision Trees: Towards Interpretability, Compression and Empirical Soundness., , , , and . CoRR, (2019)BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP., , , , , and . CoRR, (2023)Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits., , , , , and . ICLR, OpenReview.net, (2021)Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning., , , , and . BMVC, page 172-173. BMVA Press, (2023)Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers., , , , , and . CoRR, (2024)BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP., , , , , and . CVPR, page 24239-24250. IEEE, (2024)Beyond Sole Strength: Customized Ensembles for Generalized Vision-Language Models., , , , and . ICML, OpenReview.net, (2024)Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips., , , , , and . ECCV (5), volume 13665 of Lecture Notes in Computer Science, page 104-121. Springer, (2022)