Search

Your search keyword '"Xu, Kaidi"' showing total 70 results

Search Constraints

Start Over You searched for: Author "Xu, Kaidi" Remove constraint Author: "Xu, Kaidi" Database arXiv Remove constraint Database: arXiv
70 results on '"Xu, Kaidi"'

Search Results

1. Manipulation Facing Threats: Evaluating Physical Vulnerabilities in End-to-End Vision Language Action Models

2. Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective

3. DiffZOO: A Purely Query-Based Black-Box Attack for Red-teaming Text-to-Image Generative Model via Zeroth Order Optimization

4. ConU: Conformal Uncertainty in Large Language Models with Correctness Coverage Guarantees

5. Adversarial Contrastive Decoding: Boosting Safety Alignment of Large Language Models via Opposite Prompt Optimization

6. Typography Leads Semantic Diversifying: Amplifying Adversarial Transferability across Multimodal Large Language Models

7. Rescale-Invariant Federated Reinforcement Learning for Resource Allocation in V2X Networks

8. E3: Ensemble of Expert Embedders for Adapting Synthetic Image Detectors to New Generators Using Limited Data

9. Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient LLMs Under Compression

10. Medical Unlearnable Examples: Securing Medical Data from Unauthorized Training via Sparsity-Aware Local Masking

11. Unveiling Typographic Deceptions: Insights of the Typographic Vulnerability in Large Vision-Language Model

12. Word-Sequence Entropy: Towards Uncertainty Estimation in Free-Form Medical Question Answering Applications and Beyond

13. GTBench: Uncovering the Strategic Reasoning Limitations of LLMs via Game-Theoretic Evaluations

14. Two-dimensional 5d multiferroic W3Cl8: breathing Kagome lattice and tunable magneto-optical Kerr effect

15. TrustLLM: Trustworthiness in Large Language Models

16. Dynamic Adversarial Attacks on Autonomous Driving Systems

17. A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly

18. Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?

19. ACT-Diffusion: Efficient Adversarial Consistency Training for One-step Diffusion Models

20. Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise

21. PINNs-Based Uncertainty Quantification for Transient Stability Analysis

22. Pursing the Sparse Limitation of Spiking Deep Learning Structures

23. Federated Reinforcement Learning for Resource Allocation in V2X Networks

24. RBFormer: Improve Adversarial Robustness of Transformer by Robust Bias

25. Semantic Adversarial Attacks via Diffusion Models

26. Communication-Efficient Decentralized Federated Learning via One-Bit Compressive Sensing

27. Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack

28. Two-orbital spin-fermion model study of ferromagnetism in honeycomb lattice

29. Exposing the Fake: Effective Diffusion-Generated Images Detection

30. Shifting Attention to Relevance: Towards the Predictive Uncertainty Quantification of Free-Form Large Language Models

31. Flew Over Learning Trap: Learn Unlearnable Samples by Progressive Staged Training

32. Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation

33. Caterpillar: A Pure-MLP Architecture with Shifted-Pillars-Concatenation

34. An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization

35. Improve Video Representation with Temporal Adversarial Augmentation

36. Are Diffusion Models Vulnerable to Membership Inference Attacks?

37. Distributed-Training-and-Execution Multi-Agent Reinforcement Learning for Power Control in HetNet

38. Secrecy Rate Maximization of RIS-assisted SWIPT Systems: A Two-Timescale Beamforming Design Approach

39. Audit and Improve Robustness of Private Neural Networks on Encrypted Data

40. Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks

41. General Cutting Planes for Bound-Propagation-Based Neural Network Verification

42. Toward Robust Spiking Neural Network Against Adversarial Perturbation

43. ScaleCert: Scalable Certified Defense against Adversarial Patches with Sparse Superficial Layers

44. Efficient Micro-Structured Weight Unification and Pruning for Neural Network Compression

45. Mixture of Robust Experts (MoRE):A Robust Denoising Method towards multiple perturbations

46. Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Robustness Verification

47. On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning

48. Zeroth-Order Hybrid Gradient Descent: Towards A Principled Black-Box Optimization Framework

49. Intelligent Reflecting Surface Aided Full-Duplex Communication: Passive Beamforming and Deployment Design

50. Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers

Catalog

Books, media, physical & digital resources