Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World., , , , , , , and . IJCAI, page 1670-1678. ijcai.org, (2024)Reverse Backdoor Distillation: Towards Online Backdoor Attack Detection for Deep Neural Network Models., , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (6): 5098-5111 (November 2024)AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning., , , , , and . ACM Multimedia, page 6311-6320. ACM, (2023)BadRobot: Jailbreaking LLM-based Embodied AI in the Physical World., , , , , and . CoRR, (2024)Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness., , , , , , , and . CoRR, (2024)Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning., , , , , , and . IJCAI, page 4567-4575. ijcai.org, (2023)Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need., , , , , , , and . CoRR, (2024)TrojanRobot: Backdoor Attacks Against Robotic Manipulation in the Physical World., , , , , , , , , and 2 other author(s). CoRR, (2024)