Search

Your search keyword '"Huang, Yihao"' showing total 255 results

Search Constraints

Start Over You searched for: Author "Huang, Yihao" Remove constraint Author: "Huang, Yihao"
255 results on '"Huang, Yihao"'

Search Results

1. Global Challenge for Safe and Secure LLMs Track 1

2. Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack

3. Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models

4. Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks

5. RT-Attack: Jailbreaking Text-to-Image Models via Random Token

6. Perception-guided Jailbreak against Text-to-Image Models

7. NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing

8. Texture Re-scalable Universal Adversarial Perturbation

9. Improved Techniques for Optimization-Based Jailbreaking on Large Language Models

10. Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake

11. Semantic-guided Prompt Organization for Universal Goal Hijacking against LLMs

12. Application of a Mathematical Model in Determining the Spread of the Rabies Virus: Simulation Study

13. Optimization of Precontrol Methods and Analysis of a Dynamic Model for Brucellosis: Model Development and Validation

14. CosalPure: Learning Concept from Group Images for Robust Co-Saliency Detection

15. MIP: CLIP-based Image Reconstruction from PEFT Gradients

16. Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective

17. JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

18. PECANN: Parallel Efficient Clustering with Graph-Based Approximate Nearest Neighbor Search

19. TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation

20. AdapterFL: Adaptive Heterogeneous Federated Learning for Resource-constrained Mobile Computing Systems

21. Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation

22. Towards Better Fairness-Utility Trade-off: A Comprehensive Measurement-Based Reinforcement Learning Framework

23. FREPA: An Automated and Formal Approach to Requirement Modeling and Analysis in Aircraft Control Domain

24. On the Robustness of Segment Anything

25. Architecture-agnostic Iterative Black-box Certified Defense against Adversarial Patches

26. Is Aggregation the Only Choice? Federated Learning via Layer-wise Model Recombination

27. Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models

28. Faster Parallel Exact Density Peaks Clustering

29. Evading DeepFake Detectors via Adversarial Statistical Consistency

30. CFP: A Reinforcement Learning Framework for Comprehensive Fairness-Performance Trade-Off in Machine Learning

32. GitFL: Adaptive Asynchronous Federated Learning using Version Control

33. FedCross: Towards Accurate Federated Learning via Multi-Model Cross-Aggregation

36. Masked Faces with Faced Masks

37. ALA: Naturalness-aware Adversarial Lightness Attack

39. Natural & Adversarial Bokeh Rendering via Circle-of-Confusion Predictive Network

41. AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning

43. Countering Malicious DeepFakes: Survey, Battleground, and Horizon

44. Insights into the Resource Utilization Behavior of Reclaimed Asphalt Pavement Based on Theory of Planned Behavior from Different Stakeholders’ Perspective

45. Masked Faces with Faced Masks

46. Dodging DeepFake Detection via Implicit Spatial-Domain Notch Filtering

47. FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction

48. DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices

49. FakeLocator: Robust Localization of GAN-Based Face Manipulations

Catalog

Books, media, physical & digital resources