Jiakai Wang
Orcid: 0000-0001-5884-3412
According to our database1,
Jiakai Wang
authored at least 48 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Generate Transferable Adversarial Physical Camouflages via Triplet Attention Suppression.
Int. J. Comput. Vis., November, 2024
BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance.
IEEE Trans. Neural Networks Learn. Syst., August, 2024
IEEE Trans. Multim., 2024
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection.
IEEE Trans. Image Process., 2024
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World.
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
CoRR, 2024
Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology.
CoRR, 2024
D-CPT Law: Domain-specific Continual Pre-Training Scaling Law for Large Language Models.
CoRR, 2024
R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models.
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
IEEE Trans. Pattern Anal. Mach. Intell., October, 2023
Pattern Recognit., May, 2023
MIR2: Towards Provably Robust Multi-Agent Reinforcement Learning by Mutual Information Regularization.
CoRR, 2023
CoRR, 2023
Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks.
CoRR, 2023
Attacking Cooperative Multi-Agent Reinforcement Learning by Adversarial Minority Influence.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
Universal Adversarial Patch Attack for Automatic Checkout Using Perceptual and Attentional Bias.
IEEE Trans. Image Process., 2022
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection.
CoRR, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
J. Vis. Commun. Image Represent., 2021
CoRR, 2021
Improving Generalization of Deepfake Detection with Domain Adaptive Batch Normalization.
Proceedings of the ADVM '21: Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Towards Real-world X-ray Security Inspection: A High-Quality Benchmark And Lateral Inhibition Module For Prohibited Items Detection.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
2020
Proceedings of the IEEE 23rd International Conference on Information Fusion, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
2018
Research on Electric Micro-Meteorological Disaster Monitoring and Early Warning Technology.
J. Comput., 2018