Search

Your search keyword '"Xu, Wenyuan"' showing total 1,068 results

Search Constraints

Start Over You searched for: Author "Xu, Wenyuan" Remove constraint Author: "Xu, Wenyuan"
1,068 results on '"Xu, Wenyuan"'

Search Results

1. PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR

2. ReThink: Reveal the Threat of Electromagnetic Interference on Power Inverters

3. SafeEar: Content Privacy-Preserving Audio Deepfake Detection

4. RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer

5. Legilimens: Practical and Unified Content Moderation for Large Language Model Services

6. RAGLAB: A Modular and Research-Oriented Unified Framework for Retrieval-Augmented Generation

7. Understanding Impacts of Electromagnetic Signal Injection Attacks on Object Detection

8. SOPHON: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models

9. SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models

13. CamPro: Camera-based Anti-Facial Recognition

14. TPatch: A Triggered Physical Adversarial Patch

15. Exploring Adversarial Robustness of LiDAR-Camera Fusion Model in Autonomous Driving

19. Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time

20. Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound

24. Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion

26. V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization

29. Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing

30. Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition

34. FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants

42. SMS Goes Nuclear: Fortifying SMS-Based MFA in Online Account Ecosystem

43. Tips and Tricks for Webly-Supervised Fine-Grained Recognition: Learning from the WebFG 2020 Challenge

44. Experimental Study on Cemented Tailings Backfill in a Copper Mine

45. Peak Clipping Control Strategy Based on Inverter Air Conditioner and Electric Vehicle Power Compensation

46. A Data Center Energy Storage Economic Analysis Model Based on Information Decision Theory and Demand Response

47. IEC-FOF: An Industrial Electricity Consumption Forecasting and Optimization Framework

48. Demons Hidden in the Light: Unrestricted Adversarial Illumination Attacks

49. Mechanical damage mechanism investigation on CFRP strengthened recycled red brick concrete

50. Channel Pruning Guided by Spatial and Channel Attention for DNNs in Intelligent Edge Computing

Catalog

Books, media, physical & digital resources