Jiawang Bai

Orcid: 0000-0002-1472-6465

According to our database1, Jiawang Bai authored at least 25 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Imperceptible and Robust Backdoor Attack in 3D Point Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers.
CoRR, 2024

Adversarial Robustness for Visual Grounding of Multimodal Large Language Models.
CoRR, 2024

Beyond Sole Strength: Customized Ensembles for Generalized Vision-Language Models.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Parameter-Efficient and Memory-Efficient Tuning for Vision Transformer: A Disentangled Approach.
Proceedings of the Computer Vision - ECCV 2024, 2024

Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transfomers.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

BadCLIP: Trigger-Aware Prompt Learning for Backdoor Attacks on CLIP.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Versatile Weight Attack via Flipping Limited Bits.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

A Dive into SAM Prior in Image Restoration.
CoRR, 2023

Can SAM Boost Video Super-Resolution?
CoRR, 2023

Reliable and Efficient Evaluation of Adversarial Robustness for Deep Hashing-Based Retrieval.
CoRR, 2023

GraphAdapter: Tuning Vision-Language Models With Dual Knowledge Graph.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Backdoor Attack on Hash-based Image Retrieval via Clean-label Data Poisoning.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

2022
Multinomial random forest.
Pattern Recognit., 2022

Practical protection against video data leakage via universal adversarial head.
Pattern Recognit., 2022

Improving Vision Transformers by Revisiting High-Frequency Components.
Proceedings of the Computer Vision, 2022

Hardly Perceptible Trojan Attack Against Neural Networks with Bit Flips.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Clean-label Backdoor Attack against Deep Hashing based Retrieval.
CoRR, 2021

Targeted Attack against Deep Neural Networks via Flipping Limited Weight Bits.
Proceedings of the 9th International Conference on Learning Representations, 2021

2020
Open-sourced Dataset Protection via Backdoor Watermarking.
CoRR, 2020

Rectified Decision Trees: Exploring the Landscape of Interpretable and Effective Machine Learning.
CoRR, 2020

Targeted Attack for Deep Hashing Based Retrieval.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Rectified Decision Trees: Towards Interpretability, Compression and Empirical Soundness.
CoRR, 2019

Multinomial Random Forests: Fill the Gap between Theoretical Consistency and Empirical Soundness.
CoRR, 2019


  Loading...