Author of the publication

Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning.

, , , , , and . ACM Multimedia, page 1577-1587. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust visual tracking by embedding combination and weighted-gradient optimization., , , , and . Pattern Recognit., (2020)Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture., , and . IACR Cryptology ePrint Archive, (2011)An Intrusion Detection Method Based on System Call Temporal Serial Analysis., and . ICIC (1), volume 4681 of Lecture Notes in Computer Science, page 656-666. Springer, (2007)EAGL: An Elliptic Curve Arithmetic GPU-Based Library for Bilinear Pairing., and . Pairing, volume 8365 of Lecture Notes in Computer Science, page 1-19. Springer, (2013)Manual control of inverted pendulum with different input from joystick., , , , and . ASCC, page 1-6. IEEE, (2013)Distributed Random Reshuffling Over Networks., , , , and . IEEE Trans. Signal Process., (2023)Improving the Transient Times for Distributed Stochastic Gradient Methods., and . IEEE Trans. Autom. Control., 68 (7): 4127-4142 (July 2023)A Sharp Estimate on the Transient Time of Distributed Stochastic Gradient Descent., , and . IEEE Trans. Autom. Control., 67 (11): 5900-5915 (2022)Noise Reduction by Swarming in Social Foraging., , and . IEEE Trans. Autom. Control., 61 (12): 4007-4013 (2016)Incorporating Item Response Theory into Knowledge Tracing., , and . AIED (2), volume 12749 of Lecture Notes in Computer Science, page 114-118. Springer, (2021)