Summary of Aicattack: Adversarial Image Captioning Attack with Attention-based Optimization, by Jiyao Li et al.
AICAttack: Adversarial Image Captioning Attack with Attention-Based Optimizationby Jiyao Li, Mingze Ni, Yifei Dong, Tianqing…
AICAttack: Adversarial Image Captioning Attack with Attention-Based Optimizationby Jiyao Li, Mingze Ni, Yifei Dong, Tianqing…
Exploring Precision and Recall to assess the quality and diversity of LLMsby Florian Le Bronnec,…
DataDreamer: A Tool for Synthetic Data Generation and Reproducible LLM Workflowsby Ajay Patel, Colin Raffel,…
Reward Generalization in RLHF: A Topological Perspectiveby Tianyi Qiu, Fanzhi Zeng, Jiaming Ji, Dong Yan,…
BUSTER: a “BUSiness Transaction Entity Recognition” datasetby Andrea Zugarini, Andrew Zamai, Marco Ernandes, Leonardo RigutiniFirst…
Research and application of Transformer based anomaly detection model: A literature reviewby Mingrui Ma, Lansheng…
An Efficient Rehearsal Scheme for Catastrophic Forgetting Mitigation during Multi-stage Fine-tuningby Andrew Bai, Chih-Kuan Yeh,…
AraSpider: Democratizing Arabic-to-SQLby Ahmed Heakl, Youssef Mohamed, Ahmed B. ZakyFirst submitted to arxiv on: 12…
Open-ended VQA benchmarking of Vision-Language models by exploiting Classification datasets and their semantic hierarchyby Simon…
A Survey on Transformer Compressionby Yehui Tang, Yunhe Wang, Jianyuan Guo, Zhijun Tu, Kai Han,…