default search action
Xiaosen Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2019
- [j1]Kun He, Wu Wang, Xiaosen Wang, John E. Hopcroft:
A new anchor word selection method for the separable topic discovery. WIREs Data Mining Knowl. Discov. 9(5) (2019)
Conference and Workshop Papers
- 2024
- [c18]Yijun Yang, Ruiyuan Gao, Xiaosen Wang, Tsung-Yi Ho, Nan Xu, Qiang Xu:
MMA-Diffusion: MultiModal Attack on Diffusion Models. CVPR 2024: 7737-7746 - [c17]Kunyu Wang, Xuanran He, Wenxuan Wang, Xiaosen Wang:
Boosting Adversarial Transferability by Block Shuffle and Rotation. CVPR 2024: 24336-24346 - 2023
- [c16]Zhiyuan Wang, Zeliang Zhang, Siyuan Liang, Xiaosen Wang:
Diversifying the High-level Features for better Adversarial Transferability. BMVC 2023: 70-76 - [c15]Jianping Zhang, Jen-tse Huang, Wenxuan Wang, Yichen Li, Weibin Wu, Xiaosen Wang, Yuxin Su, Michael R. Lyu:
Improving the Transferability of Adversarial Samples by Path-Augmented Method. CVPR 2023: 8173-8182 - [c14]Xiaosen Wang, Zeliang Zhang, Jianping Zhang:
Structure Invariant Transformation for better Adversarial Transferability. ICCV 2023: 4584-4596 - [c13]Zhijin Ge, Fanhua Shang, Hongying Liu, Yuanyuan Liu, Liang Wan, Wei Feng, Xiaosen Wang:
Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer. ACM Multimedia 2023: 4440-4449 - [c12]Zhijin Ge, Xiaosen Wang, Hongying Liu, Fanhua Shang, Yuanyuan Liu:
Boosting Adversarial Transferability by Achieving Flat Local Maxima. NeurIPS 2023 - [c11]Xiaosen Wang, Kangheng Tong, Kun He:
Rethinking the Backward Propagation for Adversarial Transferability. NeurIPS 2023 - 2022
- [c10]Xiaosen Wang, Zeliang Zhang, Kangheng Tong, Dihong Gong, Kun He, Zhifeng Li, Wei Liu:
Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack. ECCV (5) 2022: 156-174 - [c9]Zhen Yu, Xiaosen Wang, Wanxiang Che, Kun He:
TextHacker: Learning based Hybrid Local Search Algorithm for Text Hard-label Adversarial Attack. EMNLP (Findings) 2022: 622-637 - [c8]Xiaosen Wang, Yifeng Xiong, Kun He:
Detecting textual adversarial examples through randomized substitution and vote. UAI 2022: 2056-2065 - [c7]Yichen Yang, Xiaosen Wang, Kun He:
Robust textual embedding against word-level adversarial attacks. UAI 2022: 2214-2224 - 2021
- [c6]Xiaosen Wang, Yichen Yang, Yihe Deng, Kun He:
Adversarial Training with Fast Gradient Projection Method against Synonym Substitution Based Text Attacks. AAAI 2021: 13997-14005 - [c5]Xiaosen Wang, Jiadong Lin, Han Hu, Jingdong Wang, Kun He:
Boosting Adversarial Transferability through Enhanced Momentum. BMVC 2021: 272 - [c4]Xiaosen Wang, Kun He:
Enhancing the Transferability of Adversarial Attacks Through Variance Tuning. CVPR 2021: 1924-1933 - [c3]Xiaosen Wang, Xuanran He, Jingdong Wang, Kun He:
Admix: Enhancing the Transferability of Adversarial Attacks. ICCV 2021: 16138-16147 - [c2]Xiaosen Wang, Jin Hao, Yichen Yang, Kun He:
Natural language adversarial defense through synonym encoding. UAI 2021: 823-833 - 2019
- [c1]Mumtaz A. Kaloi, Xiaosen Wang, Kun He:
Multi-task Deep Learning for Child Gender and Age Determination on Hand Radiographs. CCBR 2019: 396-404
Informal and Other Publications
- 2024
- [i25]Zeliang Zhang, Rongyi Zhu, Wei Yao, Xiaosen Wang, Chenliang Xu:
Bag of Tricks to Boost Adversarial Transferability. CoRR abs/2401.08734 (2024) - [i24]Ruofan Wang, Bo Wang, Xiaosen Wang, Xingjun Ma, Yu-Gang Jiang:
IDEATOR: Jailbreaking Large Vision-Language Models Using Themselves. CoRR abs/2411.00827 (2024) - 2023
- [i23]Zeliang Zhang, Peihan Liu, Xiaosen Wang, Chenliang Xu:
Improving Adversarial Transferability with Scheduled Step Size and Dual Example. CoRR abs/2301.12968 (2023) - [i22]Jianping Zhang, Jen-tse Huang, Wenxuan Wang, Yichen Li, Weibin Wu, Xiaosen Wang, Yuxin Su, Michael R. Lyu:
Improving the Transferability of Adversarial Samples by Path-Augmented Method. CoRR abs/2303.15735 (2023) - [i21]Zhiyuan Wang, Zeliang Zhang, Siyuan Liang, Xiaosen Wang:
Diversifying the High-level Features for better Adversarial Transferability. CoRR abs/2304.10136 (2023) - [i20]Zhijin Ge, Fanhua Shang, Hongying Liu, Yuanyuan Liu, Xiaosen Wang:
Boosting Adversarial Transferability by Achieving Flat Local Maxima. CoRR abs/2306.05225 (2023) - [i19]Xiaosen Wang, Kangheng Tong, Kun He:
Rethinking the Backward Propagation for Adversarial Transferability. CoRR abs/2306.12685 (2023) - [i18]Kunyu Wang, Xuanran He, Wenxuan Wang, Xiaosen Wang:
Boosting Adversarial Transferability by Block Shuffle and Rotation. CoRR abs/2308.10299 (2023) - [i17]Zhijin Ge, Fanhua Shang, Hongying Liu, Yuanyuan Liu, Liang Wan, Wei Feng, Xiaosen Wang:
Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer. CoRR abs/2308.10601 (2023) - [i16]Xiaosen Wang, Zeliang Zhang, Jianping Zhang:
Structure Invariant Transformation for better Adversarial Transferability. CoRR abs/2309.14700 (2023) - [i15]Xiaosen Wang, Zeyuan Yin:
Rethinking Mixup for Improving the Adversarial Transferability. CoRR abs/2311.17087 (2023) - [i14]Yijun Yang, Ruiyuan Gao, Xiaosen Wang, Nan Xu, Qiang Xu:
MMA-Diffusion: MultiModal Attack on Diffusion Models. CoRR abs/2311.17516 (2023) - [i13]Xiaosen Wang, Kunyu Wang:
Generating Visually Realistic Adversarial Patch. CoRR abs/2312.03030 (2023) - 2022
- [i12]Zhen Yu, Xiaosen Wang, Wanxiang Che, Kun He:
Learning-based Hybrid Local Search for the Hard-label Textual Attack. CoRR abs/2201.08193 (2022) - [i11]Yichen Yang, Xiaosen Wang, Kun He:
Robust Textual Embedding against Word-level Adversarial Attacks. CoRR abs/2202.13817 (2022) - 2021
- [i10]Xiaosen Wang, Xuanran He, Jingdong Wang, Kun He:
Admix: Enhancing the Transferability of Adversarial Attacks. CoRR abs/2102.00436 (2021) - [i9]Xiaosen Wang, Jiadong Lin, Han Hu, Jingdong Wang, Kun He:
Boosting Adversarial Transferability through Enhanced Momentum. CoRR abs/2103.10609 (2021) - [i8]Xiaosen Wang, Kun He:
Enhancing the Transferability of Adversarial Attacks through Variance Tuning. CoRR abs/2103.15571 (2021) - [i7]Xiaosen Wang, Chuanbiao Song, Liwei Wang, Kun He:
Multi-stage Optimization based Adversarial Training. CoRR abs/2106.15357 (2021) - [i6]Xiaosen Wang, Yifeng Xiong, Kun He:
Randomized Substitution and Vote for Textual Adversarial Example Detection. CoRR abs/2109.05698 (2021) - [i5]Xiaosen Wang, Zeliang Zhang, Kangheng Tong, Dihong Gong, Kun He, Zhifeng Li, Wei Liu:
Triangle Attack: A Query-efficient Decision-based Adversarial Attack. CoRR abs/2112.06569 (2021) - 2020
- [i4]Xiaosen Wang, Yichen Yang, Yihe Deng, Kun He:
Adversarial Training with Fast Gradient Projection Method against Synonym Substitution based Text Attacks. CoRR abs/2008.03709 (2020) - 2019
- [i3]Xiaosen Wang, Kun He, John E. Hopcroft:
AT-GAN: A Generative Attack Model for Adversarial Transferring on Generative Adversarial Nets. CoRR abs/1904.07793 (2019) - [i2]Kun He, Wu Wang, Xiaosen Wang, John E. Hopcroft:
A New Anchor Word Selection Method for the Separable Topic Discovery. CoRR abs/1905.06109 (2019) - [i1]Xiaosen Wang, Hao Jin, Kun He:
Natural Language Adversarial Attacks and Defenses in Word Level. CoRR abs/1909.06723 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 22:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint