Jiakai Wang

Orcid: 0000-0001-5884-3412

According to our database1, Jiakai Wang authored at least 48 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Generate Transferable Adversarial Physical Camouflages via Triplet Attention Suppression.
Int. J. Comput. Vis., November, 2024

BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance.
IEEE Trans. Neural Networks Learn. Syst., August, 2024

Improving Deepfake Detection Generalization by Invariant Risk Minimization.
IEEE Trans. Multim., 2024

Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection.
IEEE Trans. Image Process., 2024

Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World.
IEEE Trans. Inf. Forensics Secur., 2024

DynamicPAE: Generating Scene-Aware Physical Adversarial Examples in Real-Time.
CoRR, 2024

BiDM: Pushing the Limit of Quantization for Diffusion Models.
CoRR, 2024

Behavior Backdoor for Deep Learning Models.
CoRR, 2024

MTU-Bench: A Multi-granularity Tool-Use Benchmark for Large Language Models.
CoRR, 2024

Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology.
CoRR, 2024

Compromising Embodied Agents with Contextual Backdoor Attacks.
CoRR, 2024

DDK: Distilling Domain Knowledge for Efficient Large Language Models.
CoRR, 2024

D-CPT Law: Domain-specific Continual Pre-Training Scaling Law for Large Language Models.
CoRR, 2024

R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models.
CoRR, 2024

BinaryDM: Towards Accurate Binarization of Diffusion Model.
CoRR, 2024

E^2-LLM: Efficient and Extreme Length Extension of Large Language Models.
CoRR, 2024

Transferable Multimodal Attack on Vision-Language Pre-training Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Byzantine Robust Cooperative Multi-Agent Reinforcement Learning as a Bayesian Game.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

NAPGuard: Towards Detecting Naturalistic Adversarial Patches.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Diverse Sample Generation: Pushing the Limit of Generative Data-Free Quantization.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2023

A comprehensive evaluation framework for deep model robustness.
Pattern Recognit., May, 2023

Pre-trained Trojan Attacks for Visual Recognition.
CoRR, 2023

Adversarial Examples in the Physical World: A Survey.
CoRR, 2023

MIR2: Towards Provably Robust Multi-Agent Reinforcement Learning by Mutual Information Regularization.
CoRR, 2023

Byzantine Robust Cooperative Multi-Agent Reinforcement Learning as a Bayesian Game.
CoRR, 2023

Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks.
CoRR, 2023

Attacking Cooperative Multi-Agent Reinforcement Learning by Adversarial Minority Influence.
CoRR, 2023

X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Universal Adversarial Patch Attack for Automatic Checkout Using Perceptual and Attentional Bias.
IEEE Trans. Image Process., 2022

Phonemic Adversarial Attack against Audio Recognition in Real World.
CoRR, 2022

Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection.
CoRR, 2022

Generating Transferable Adversarial Examples against Vision Transformers.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Defensive Patches for Robust Recognition in the Physical World.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Harnessing Perceptual Adversarial Patches for Crowd Counting.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Sequential alignment attention model for scene text recognition.
J. Vis. Commun. Image Represent., 2021

RobustART: Benchmarking Robustness on Architecture Design and Training Techniques.
CoRR, 2021

Diverse Sample Generation: Pushing the Limit of Data-free Quantization.
CoRR, 2021

A Comprehensive Evaluation Framework for Deep Model Robustness.
CoRR, 2021

Improving Generalization of Deepfake Detection with Domain Adaptive Batch Normalization.
Proceedings of the ADVM '21: Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia, 2021

Adversarial Examples in Physical World.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Towards Real-world X-ray Security Inspection: A High-Quality Benchmark And Lateral Inhibition Module For Prohibited Items Detection.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Patch Attack for Automatic Check-out.
CoRR, 2020

A Parallel Implementation of Hypothesis-Oriented Multiple Hypothesis Tracking.
Proceedings of the IEEE 23rd International Conference on Information Fusion, 2020

Bias-Based Universal Adversarial Patch Attack for Automatic Check-Out.
Proceedings of the Computer Vision - ECCV 2020, 2020

2018
Research on Electric Micro-Meteorological Disaster Monitoring and Early Warning Technology.
J. Comput., 2018


  Loading...