关注
Jianping Zhang
Jianping Zhang
在 link.cuhk.edu.hk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Improving adversarial transferability via neuron attribution-based attacks
J Zhang, W Wu, J Huang, Y Huang, W Wang, Y Su, MR Lyu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
1352022
Structure invariant transformation for better adversarial transferability
X Wang, Z Zhang, J Zhang
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
412023
Transferable adversarial attacks on vision transformers with token gradient regularization
J Zhang, Y Huang, W Wu, MR Lyu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
372023
Improving the transferability of adversarial samples by path-augmented method
J Zhang, J Huang, W Wang, Y Li, W Wu, X Wang, Y Su, MR Lyu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
372023
Mttm: Metamorphic testing for textual content moderation software
W Wang, J Huang, W Wu, J Zhang, Y Huang, S Li, P He, MR Lyu
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
232023
AEON: a method for automatic evaluation of NLP test cases
J Huang, J Zhang, W Wang, P He, Y Su, MR Lyu
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
202022
Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-Coded Credentials
Y Huang, Y Li, W Wu, J Zhang, MR Lyu
Proceedings of the ACM on Software Engineering 1 (FSE), 2515-2537, 2024
13*2024
On the robustness of latent diffusion models
J Zhang, Z Xu, S Cui, C Meng, W Wu, MR Lyu
arXiv preprint arXiv:2306.08257, 2023
132023
Towards Semantics-and Domain-Aware Adversarial Attacks
J Zhang, YC Huang, W Wu, MR Lyu
IJCAI 2023, 2023
72023
Validating multimedia content moderation software via semantic fusion
W Wang, J Huang, C Chen, J Gu, J Zhang, W Wu, P He, M Lyu
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
62023
Practical and efficient model extraction of sentiment analysis APIs
W Wu, J Zhang, VJ Wei, X Chen, Z Zheng, I King, MR Lyu
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
52023
A joint intensity-neuromorphic event imaging system with bandwidth-limited communication channel
S Banerjee, HH Chopp, J Zhang, ZW Wang, P Kang, O Cossairt, ...
IEEE Transactions on Neural Networks and Learning Systems, 2022
52022
Improving the Adversarial Transferability of Vision Transformers with Virtual Dense Connection
J Zhang, Y Huang, Z Xu, W Wu, MR Lyu
Proceedings of the AAAI Conference on Artificial Intelligence 38 (7), 7133-7141, 2024
42024
Blurred-dilated method for adversarial attacks
Y Deng, W Wu, J Zhang, Z Zheng
Advances in Neural Information Processing Systems 36, 2024
32024
Backpropagation path search on adversarial transferability
Z Xu, Z Gu, J Zhang, S Cui, C Meng, W Wang
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
32023
ATM: attentional text matting
P Kang, J Zhang, C Ma, G Sun
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer …, 2021
32021
Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Apps
S Li, C Gao, J Zhang, Y Zhang, Y Liu, J Gu, Y Peng, MR Lyu
Proceedings of the ACM on Software Engineering 1 (FSE), 2167-2189, 2024
12024
Curvature-Invariant Adversarial Attacks for 3D Point Clouds
J Zhang, W Gu, Y Huang, Z Jiang, W Wu, MR Lyu
Proceedings of the AAAI Conference on Artificial Intelligence 38 (7), 7142-7150, 2024
12024
TroubleLLM: Align to Red Team Expert
Z Xu, J Zhang, S Cui, C Meng, W Wang
arXiv preprint arXiv:2403.00829, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–19