Search

Your search keyword '"Shen, Chao"' showing total 5,781 results

Search Constraints

Start Over You searched for: Author "Shen, Chao" Remove constraint Author: "Shen, Chao"
5,781 results on '"Shen, Chao"'

Search Results

1. Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer

2. Optimal Joint Fronthaul Compression and Beamforming Design for Networked ISAC Systems

3. Autonomous, Self-driving Multi-Step Growth of Semiconductor Heterostructures Guided by Machine Learning

4. BackdoorBench: A Comprehensive Benchmark and Analysis of Backdoor Learning

5. A Survey of Defenses against AI-generated Visual Media: Detection, Disruption, and Authentication

6. Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study

7. Constrained Intrinsic Motivation for Reinforcement Learning

8. Token-Mol 1.0: Tokenized drug design with large language model

9. Efficient DNN-Powered Software with Fair Sparse Models

10. Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems

11. CITADEL: Context Similarity Based Deep Learning Framework Bug Finding

12. Concentrate Attention: Towards Domain-Generalizable Prompt Optimization for Language Models

13. ControlLoc: Physical-World Hijacking Attack on Visual Perception in Autonomous Driving

14. SlowPerception: Physical-World Latency Attack against Visual Perception in Autonomous Driving

15. From Effectiveness to Efficiency: Comparative Evaluation of Code Generated by LCGMs for Bilingual Programming Questions

16. Large Language Models Can Self-Correct with Minimal Effort

17. Exploration of the LHCb $P_c$ states and possible resonances in a unitary coupled-channel model

18. StablePT: Towards Stable Prompting for Few-shot Learning via Input Separation

19. A Survey of Deep Learning Library Testing Methods

20. MPC Based Linear Equivalence with Control Barrier Functions for VTOL-UAVs

21. A Linear MPC with Control Barrier Functions for Differential Drive Robots

22. Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving

23. Instructing Large Language Models to Identify and Ignore Irrelevant Conditions

24. Adversarial Example Soups: Improving Transferability and Stealthiness for Free

25. Your Large Language Model is Secretly a Fairness Proponent and You Should Prompt it Like One

26. Stumbling Blocks: Stress Testing the Robustness of Machine-Generated Text Detectors Under Attacks

27. Does DetectGPT Fully Utilize Perturbation? Bridging Selective Perturbation to Fine-tuned Contrastive Learning Detector would be Better

28. LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection

29. Hijacking Attacks against Neural Networks by Analyzing Training Data

34. DREAM: Debugging and Repairing AutoML Pipelines

35. JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

36. SlowTrack: Increasing the Latency of Camera-based Perception in Autonomous Driving Using Adversarial Examples

37. Collapse-Aware Triplet Decoupling for Adversarially Robust Image Retrieval

38. Get an A in Math: Progressive Rectification Prompting

39. Universal Deoxidation of Semiconductor Substrates Assisted by Machine-Learning and Real-Time-Feedback-Control

40. 6G Non-Terrestrial Networks Enabled Low-Altitude Economy: Opportunities and Challenges

41. Forget metamaterial: It does not improve sound absorption performance as it claims

42. Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights

43. Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning

44. Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection

47. Dialogue for Prompting: a Policy-Gradient-Based Discrete Prompt Generation for Few-shot Learning

48. Delete: Deep Lead Optimization Enveloped in Protein Pocket through Unified Deleting Strategies and a Structure-aware Network

49. Hard Adversarial Example Mining for Improving Robust Fairness

50. Nature of the $N^*$ and $\Delta$ resonances via coupled-channel dynamics

Catalog

Books, media, physical & digital resources