Search

Your search keyword '"Liang, Siyuan"' showing total 445 results

Search Constraints

Start Over You searched for: Author "Liang, Siyuan" Remove constraint Author: "Liang, Siyuan"
445 results on '"Liang, Siyuan"'

Search Results

1. Reasoning-Augmented Conversation for Multi-Turn Jailbreak Attacks on Large Language Models

2. Black-Box Adversarial Attack on Vision Language Models for Autonomous Driving

3. CogMorph: Cognitive Morphing Attacks for Text-to-Image Models

4. WFCAT: Augmenting Website Fingerprinting with Channel-wise Attention on Timing Features

5. Red Pill and Blue Pill: Controllable Website Fingerprinting Defense via Dynamic Backdoor Learning

6. CopyrightShield: Spatial Similarity Guided Backdoor Defense against Copyright Infringement in Diffusion Models

7. BDefects4NN: A Backdoor Defect Database for Controlled Localization Studies in Neural Networks

8. Visual Adversarial Attack on Vision-Language Models for Autonomous Driving

9. Interpreting Object-level Foundation Models via Visual Precision Search

10. SafeBench: A Safety Evaluation Framework for Multimodal Large Language Models

11. NoVo: Norm Voting off Hallucinations with Attention Heads in Large Language Models

12. Patch is Enough: Naturalistic Adversarial Patch against Vision-Language Pre-training Models

13. Efficient Backdoor Defense in Multimodal Contrastive Learning: A Token-Level Unlearning Method for Mitigating Threats

14. CleanerCLIP: Fine-grained Counterfactual Semantic Augmentation for Backdoor Defense in Contrastive Learning

15. Towards Robust Object Detection: Identifying and Removing Backdoors via Module Inconsistency Analysis

16. Adversarial Backdoor Defense in CLIP

17. Module-wise Adaptive Adversarial Training for End-to-end Autonomous Driving

18. Compromising Embodied Agents with Contextual Backdoor Attacks

19. Multimodal Unlearnable Examples: Protecting Data against Multimodal Contrastive Learning

22. Simulation Analysis and Verification of Four-Air-Gap Current Transducer Based on TMR

23. Towards Robust Object Detection: Identifying and Removing Backdoors via Module Inconsistency Analysis

24. GenderBias-\emph{VL}: Benchmarking Gender Bias in Vision Language Models via Counterfactual Probing

25. Revisiting Backdoor Attacks against Large Vision-Language Models from Domain Shift

26. Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt

27. LanEvil: Benchmarking the Robustness of Lane Detection to Environmental Illusions

28. Correlation Matching Transformation Transformers for UHD Image Restoration

29. Breaking the False Sense of Security in Backdoor Defense through Re-Activation Attack

30. Environmental Matching Attack Against Unmanned Aerial Vehicles Object Detection

31. Towards Robust Physical-world Backdoor Attacks on Lane Detection

32. Object Detectors in the Open Environment: Challenges, Solutions, and Outlook

33. Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning

34. Hide in Thicket: Generating Imperceptible and Rational Adversarial Perturbations on 3D Point Clouds

35. VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models

36. Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs

37. Poisoned Forgery Face: Towards Backdoor Attacks on Face Forgery Detection

38. Less is More: Fewer Interpretable Region via Submodular Subset Selection

39. Does Few-shot Learning Suffer from Backdoor Attacks?

40. Pre-trained Trojan Attacks for Visual Recognition

41. SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation

42. BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive Learning

43. Improving Adversarial Transferability by Stable Diffusion

44. Face Encryption via Frequency-Restricted Identity-Agnostic Attacks

45. Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks

47. Diversifying the High-level Features for better Adversarial Transferability

48. X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection

49. Optimal Inter-area Oscillation Damping Control: A Transfer Deep Reinforcement Learning Approach with Switching Control Strategy

50. Learning to Optimize Permutation Flow Shop Scheduling via Graph-based Imitation Learning

Catalog

Books, media, physical & digital resources