Zhenting Wang

Orcid: 0000-0002-7742-6777

According to our database1, Zhenting Wang authored at least 38 papers between 2019 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Desertification Mitigation in Northern China Was Promoted by Climate Drivers after 2000.
Remote. Sens., October, 2024

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
CoRR, 2024

Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents.
CoRR, 2024

Data-centric NLP Backdoor Defense from the Lens of Memorization.
CoRR, 2024

Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer.
CoRR, 2024

Visual Agents as Fast and Slow Thinkers.
CoRR, 2024

When AI Meets Finance (StockAgent): Large Language Model-based Stock Trading in Simulated Real-world Environments.
CoRR, 2024

Uncertainty is Fragile: Manipulating Uncertainty in Large Language Models.
CoRR, 2024

APEER: Automatic Prompt Engineering Enhances Large Language Model Reranking.
CoRR, 2024

Evaluating and Mitigating IP Infringement in Visual Generative AI.
CoRR, 2024

Towards Imperceptible Backdoor Attack in Self-supervised Learning.
CoRR, 2024

ProLLM: Protein Chain-of-Thoughts Enhanced LLM for Protein-Protein Interaction Prediction.
CoRR, 2024

Exploring Concept Depth: How Large Language Models Acquire Knowledge at Different Layers?
CoRR, 2024

Health-LLM: Personalized Retrieval-Augmented Disease Prediction System.
CoRR, 2024

Assembly Task Allocation for Human-Robot Collaboration Considering Stability and Assembly Complexity.
IEEE Access, 2024

Distribution Preserving Backdoor Attack in Self-supervised Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

How to Trace Latent Generative Model Generated Images without Artificial Watermark?
Proceedings of the Forty-first International Conference on Machine Learning, 2024

DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Finding Needles in a Haystack: A Black-Box Approach to Invisible Watermark Detection.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
Difficulty and complexity definitions for assembly task allocation and assignment in human-robot collaborations: A review.
Robotics Comput. Integr. Manuf., December, 2023

How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models.
CoRR, 2023

Alteration-free and Model-agnostic Origin Attribution of Generated Images.
CoRR, 2023

Error Correction in Robotic Assembly Planning From Graphical Instruction Manuals.
IEEE Access, 2023

Where Did I Come From? Origin Attribution of AI-Generated Images.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

UNICORN: A Unified Backdoor Trigger Inversion Framework.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Backdoor Vulnerabilities in Normally Trained Deep Learning Models.
CoRR, 2022

Neural Network Trojans Analysis and Mitigation from the Input Domain.
CoRR, 2022

Rethinking the Reverse-engineering of Trojan Triggers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Training with More Confidence: Mitigating Injected and Natural Backdoors During Training.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Learning Selective Assignment Network for Scene-Aware Vehicle Detection.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Complex Backdoor Detection by Symmetric Feature Differencing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry.
CoRR, 2021

Assembly Planning by Recognizing a Graphical Instruction Manual.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

2020
CODAN: Counting-driven Attention Network for Vehicle Detection in Congested Scenes.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2019
A Novel and Fine-grained Heap Randomization Allocation Strategy for Effectively Alleviating Heap Buffer Overflow Vulnerabilities.
Proceedings of the 4th International Conference on Mathematics and Artificial Intelligence, 2019

Multi-contact Stability of Humanoids using ZMP and CWC.
Proceedings of the 19th IEEE-RAS International Conference on Humanoid Robots, 2019


  Loading...