Search

Your search keyword '"Dong, Yinpeng"' showing total 267 results

Search Constraints

Start Over You searched for: Author "Dong, Yinpeng" Remove constraint Author: "Dong, Yinpeng"
267 results on '"Dong, Yinpeng"'

Search Results

1. Real-world Adversarial Defense against Patch Attacks based on Diffusion Model

2. T2VSafetyBench: Evaluating the Safety of Text-to-Video Generative Models

3. Toward Availability Attacks in 3D Point Clouds

4. Benchmarking Trustworthiness of Multimodal Large Language Models: A Comprehensive Study

5. Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior

6. AutoBreach: Universal and Adaptive Jailbreaking with Efficient Wordplay-Guided Optimization

7. Membership Inference on Text-to-Image Diffusion Models via Conditional Likelihood Discrepancy

8. The RoboDrive Challenge: Drive Anytime Anywhere in Any Condition

9. Omniview-Tuning: Boosting Viewpoint Invariance of Vision-Language Pre-training Models

10. Exploring the Transferability of Visual Prompting for Multimodal Large Language Models

11. FaceCat: Enhancing Face Recognition Security with a Unified Diffusion Model

12. Embodied Active Defense: Leveraging Recurrent Feedback to Counter Adversarial Patches

13. Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction

14. BSPA: Exploring Black-box Stealthy Prompt Attacks against Image Generators

15. Discovering Universal Semantic Triggers for Text-to-Image Synthesis

16. Diffusion Models are Certifiably Robust Classifiers

17. Towards Transferable Targeted 3D Adversarial Attack in the Physical World

18. Focus on Hiders: Exploring Hidden Threats for Enhancing Adversarial Training

19. Machine Vision Therapy: Multimodal Large Language Models Can Enhance Visual Robustness via Denoising In-Context Learning

20. Omniview-Tuning: Boosting Viewpoint Invariance of Vision-Language Pre-training Models

23. Evil Geniuses: Delving into the Safety of LLM-based Agents

24. How Robust is Google's Bard to Adversarial Image Attacks?

25. Robustness and Generalizability of Deepfake Detection: A Study with Diffusion Models

26. Exploring Transferability of Multimodal Adversarial Samples for Vision-Language Pre-training Models with Contrastive Learning

27. Root Pose Decomposition Towards Generic Non-rigid 3D Reconstruction with Monocular Videos

28. Improving Viewpoint Robustness for Visual Recognition via Adversarial Training

29. Towards Viewpoint-Invariant Visual Recognition via Adversarial Training

30. Distributional Modeling for Location-Aware Adversarial Patches

31. Evaluating the Robustness of Text-to-image Diffusion Models against Real-world Attacks

32. DIFFender: Diffusion-Based Adversarial Defense against Patch Attacks

33. Robust Classification via a Single Diffusion Model

34. Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning

35. Learning Sample Difficulty from Pre-trained Models for Reliable Prediction

36. Understanding the Robustness of 3D Object Detection with Bird's-Eye-View Representations in Autonomous Driving

37. Towards Effective Adversarial Textured 3D Meshes on Physical Face Recognition

38. Compacting Binary Neural Networks by Sparse Kernel Selection

39. Benchmarking Robustness of 3D Object Detection to Common Corruptions in Autonomous Driving

40. Rethinking Model Ensemble in Transfer-based Adversarial Attacks

41. GNOT: A General Neural Operator Transformer for Operator Learning

42. A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking

43. Artificial Intelligence Security Competition (AISC)

44. Improving transferability of 3D adversarial attacks with scale and shear transformations

45. Isometric 3D Adversarial Examples in the Physical World

46. ViewFool: Evaluating the Robustness of Visual Recognition to Adversarial Viewpoints

47. Pre-trained Adversarial Perturbations

48. GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing

49. Kallima: A Clean-label Framework for Textual Backdoor Attacks

50. BadDet: Backdoor Attacks on Object Detection

Catalog

Books, media, physical & digital resources