Author of the publication

Unveiling Typographic Deceptions: Insights of the Typographic Vulnerability in Large Vision-Language Model.

, , , , , , , , and . CoRR, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Iterative Algorithm Induced Deep-Unfolding Neural Networks: Precoding Design for Multiuser MIMO Systems., , , , , and . IEEE Trans. Wirel. Commun., 20 (2): 1394-1410 (2021)Interpreting Adversarial Examples by Activation Promotion and Suppression., , , , , , , and . CoRR, (2019)Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise., , , and . CoRR, (2023)Using Caterpillar to Nibble Small-Scale Images., , , , , and . CoRR, (2023)Efficient Micro-Structured Weight Unification and Pruning for Neural Network Compression., , , , , , and . CoRR, (2021)Low-Complexity Joint Power Allocation and Trajectory Design for UAV-Enabled Secure Communications With Power Splitting., , , and . IEEE Trans. Commun., 69 (3): 1896-1911 (2021)Medical Unlearnable Examples: Securing Medical Data from Unauthorized Traning via Sparsity-Aware Local Masking., , , , and . CoRR, (2024)Reinforced Adversarial Attacks on Deep Neural Networks Using ADMM., , , , , and . GlobalSIP, page 1169-1173. IEEE, (2018)E3: Ensemble of Expert Embedders for Adapting Synthetic Image Detectors to New Generators Using Limited Data., , , , , and . CoRR, (2024)Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks., , , , , , , , , and 2 other author(s). IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 43 (1): 366-379 (January 2024)