default search action
Zhenting Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Zhenting Wang, Takuya Kiyokawa, Natsuki Yamanobe, Weiwei Wan, Kensuke Harada:
Assembly Task Allocation for Human-Robot Collaboration Considering Stability and Assembly Complexity. IEEE Access 12: 159821-159832 (2024) - [j3]Haohui Li, Kai Yang, Yang Cui, Lingyun Ai, Chenghai Wang, Zhenting Wang, Caixia Zhang:
Desertification Mitigation in Northern China Was Promoted by Climate Drivers after 2000. Remote. Sens. 16(19): 3706 (2024) - [c16]Minzhou Pan, Zhenting Wang, Xin Dong, Vikash Sehwag, Lingjuan Lyu, Xue Lin:
Finding Needles in a Haystack: A Black-Box Approach to Invisible Watermark Detection. ECCV (33) 2024: 253-270 - [c15]Zhenting Wang, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma:
DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models. ICLR 2024 - [c14]Zhenting Wang, Vikash Sehwag, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma:
How to Trace Latent Generative Model Generated Images without Artificial Watermark? ICML 2024 - [c13]Guanhong Tao, Zhenting Wang, Shiwei Feng, Guangyu Shen, Shiqing Ma, Xiangyu Zhang:
Distribution Preserving Backdoor Attack in Self-supervised Learning. SP 2024: 2029-2047 - [i24]Mingyu Jin, Qinkai Yu, Dong Shu, Chong Zhang, Lizhou Fan, Wenyue Hua, Suiyuan Zhu, Yanda Meng, Zhenting Wang, Mengnan Du, Yongfeng Zhang, Yanda Meng:
Health-LLM: Personalized Retrieval-Augmented Disease Prediction System. CoRR abs/2402.00746 (2024) - [i23]Minzhou Pan, Zhenting Wang, Xin Dong, Vikash Sehwag, Lingjuan Lyu, Xue Lin:
Finding needles in a haystack: A Black-Box Approach to Invisible Watermark Detection. CoRR abs/2403.15955 (2024) - [i22]Mingyu Jin, Qinkai Yu, Jingyuan Huang, Qingcheng Zeng, Zhenting Wang, Wenyue Hua, Haiyan Zhao, Kai Mei, Yanda Meng, Kaize Ding, Fan Yang, Mengnan Du, Yongfeng Zhang:
Exploring Concept Depth: How Large Language Models Acquire Knowledge at Different Layers? CoRR abs/2404.07066 (2024) - [i21]Mingyu Jin, Haochen Xue, Zhenting Wang, Boming Kang, Ruosong Ye, Kaixiong Zhou, Mengnan Du, Yongfeng Zhang:
ProLLM: Protein Chain-of-Thoughts Enhanced LLM for Protein-Protein Interaction Prediction. CoRR abs/2405.06649 (2024) - [i20]Zhenting Wang, Vikash Sehwag, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma:
How to Trace Latent Generative Model Generated Images without Artificial Watermark? CoRR abs/2405.13360 (2024) - [i19]Hanrong Zhang, Zhenting Wang, Tingxu Han, Mingyu Jin, Chenlu Zhan, Mengnan Du, Hongwei Wang, Shiqing Ma:
Towards Imperceptible Backdoor Attack in Self-supervised Learning. CoRR abs/2405.14672 (2024) - [i18]Zhenting Wang, Chen Chen, Vikash Sehwag, Minzhou Pan, Lingjuan Lyu:
Evaluating and Mitigating IP Infringement in Visual Generative AI. CoRR abs/2406.04662 (2024) - [i17]Can Jin, Hongwu Peng, Shiyu Zhao, Zhenting Wang, Wujiang Xu, Ligong Han, Jiahui Zhao, Kai Zhong, Sanguthevar Rajasekaran, Dimitris N. Metaxas:
APEER: Automatic Prompt Engineering Enhances Large Language Model Reranking. CoRR abs/2406.14449 (2024) - [i16]Qingcheng Zeng, Mingyu Jin, Qinkai Yu, Zhenting Wang, Wenyue Hua, Zihao Zhou, Guangyan Sun, Yanda Meng, Shiqing Ma, Qifan Wang, Felix Juefei-Xu, Kaize Ding, Fan Yang, Ruixiang Tang, Yongfeng Zhang:
Uncertainty is Fragile: Manipulating Uncertainty in Large Language Models. CoRR abs/2407.11282 (2024) - [i15]Chong Zhang, Xinyi Liu, Mingyu Jin, Zhongmou Zhang, Lingyao Li, Zhenting Wang, Wenyue Hua, Dong Shu, Suiyuan Zhu, Xiaobo Jin, Sujian Li, Mengnan Du, Yongfeng Zhang:
When AI Meets Finance (StockAgent): Large Language Model-based Stock Trading in Simulated Real-world Environments. CoRR abs/2407.18957 (2024) - [i14]Guangyan Sun, Mingyu Jin, Zhenting Wang, Cheng-Long Wang, Siqi Ma, Qifan Wang, Ying Nian Wu, Yongfeng Zhang, Dongfang Liu:
Visual Agents as Fast and Slow Thinkers. CoRR abs/2408.08862 (2024) - [i13]Weipeng Jiang, Zhenting Wang, Juan Zhai, Shiqing Ma, Zhengyu Zhao, Chao Shen:
Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer. CoRR abs/2408.11313 (2024) - [i12]Zhenting Wang, Zhizhi Wang, Mingyu Jin, Mengnan Du, Juan Zhai, Shiqing Ma:
Data-centric NLP Backdoor Defense from the Lens of Memorization. CoRR abs/2409.14200 (2024) - [i11]Hanrong Zhang, Jingyuan Huang, Kai Mei, Yifei Yao, Zhenting Wang, Chenlu Zhan, Hongwei Wang, Yongfeng Zhang:
Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents. CoRR abs/2410.02644 (2024) - 2023
- [j2]Zhenting Wang, Takuya Kiyokawa, Issei Sera, Natsuki Yamanobe, Weiwei Wan, Kensuke Harada:
Error Correction in Robotic Assembly Planning From Graphical Instruction Manuals. IEEE Access 11: 107276-107286 (2023) - [j1]Takuya Kiyokawa, Naoki Shirakura, Zhenting Wang, Natsuki Yamanobe, Ixchel Georgina Ramirez-Alpizar, Weiwei Wan, Kensuke Harada:
Difficulty and complexity definitions for assembly task allocation and assignment in human-robot collaborations: A review. Robotics Comput. Integr. Manuf. 84: 102598 (2023) - [c12]Kai Mei, Zheng Li, Zhenting Wang, Yang Zhang, Shiqing Ma:
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models. ACL (1) 2023: 15551-15565 - [c11]Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma:
UNICORN: A Unified Backdoor Trigger Inversion Framework. ICLR 2023 - [c10]Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma:
Where Did I Come From? Origin Attribution of AI-Generated Images. NeurIPS 2023 - [i10]Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma:
UNICORN: A Unified Backdoor Trigger Inversion Framework. CoRR abs/2304.02786 (2023) - [i9]Kai Mei, Zheng Li, Zhenting Wang, Yang Zhang, Shiqing Ma:
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models. CoRR abs/2305.17826 (2023) - [i8]Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma:
Alteration-free and Model-agnostic Origin Attribution of Generated Images. CoRR abs/2305.18439 (2023) - [i7]Zhenting Wang, Chen Chen, Yuchen Liu, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma:
How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models. CoRR abs/2307.03108 (2023) - 2022
- [c9]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
Complex Backdoor Detection by Symmetric Feature Differencing. CVPR 2022: 14983-14993 - [c8]Zhenting Wang, Juan Zhai, Shiqing Ma:
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning. CVPR 2022: 15054-15063 - [c7]Zhenting Wang, Wei Li, Xiao Wu, Luhan Sheng:
Learning Selective Assignment Network for Scene-Aware Vehicle Detection. ICIP 2022: 1366-1370 - [c6]Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma:
Training with More Confidence: Mitigating Injected and Natural Backdoors During Training. NeurIPS 2022 - [c5]Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma:
Rethinking the Reverse-engineering of Trojan Triggers. NeurIPS 2022 - [i6]Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma:
Neural Network Trojans Analysis and Mitigation from the Input Domain. CoRR abs/2202.06382 (2022) - [i5]Zhenting Wang, Juan Zhai, Shiqing Ma:
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning. CoRR abs/2205.13383 (2022) - [i4]Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma:
Rethinking the Reverse-engineering of Trojan Triggers. CoRR abs/2210.15127 (2022) - [i3]Guanhong Tao, Zhenting Wang, Siyuan Cheng, Shiqing Ma, Shengwei An, Yingqi Liu, Guangyu Shen, Zhuo Zhang, Yunshu Mao, Xiangyu Zhang:
Backdoor Vulnerabilities in Normally Trained Deep Learning Models. CoRR abs/2211.15929 (2022) - 2021
- [c4]Issei Sera, Natsuki Yamanobe, Ixchel Georgina Ramirez-Alpizar, Zhenting Wang, Weiwei Wan, Kensuke Harada:
Assembly Planning by Recognizing a Graphical Instruction Manual. IROS 2021: 3138-3145 - [i2]Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang:
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry. CoRR abs/2103.08820 (2021) - [i1]Issei Sera, Natsuki Yamanobe, Ixchel Georgina Ramirez-Alpizar, Zhenting Wang, Weiwei Wan, Kensuke Harada:
Assembly Planning by Recognizing a Graphical Instruction Manual. CoRR abs/2106.00424 (2021) - 2020
- [c3]Wei Li, Zhenting Wang, Xiao Wu, Ji Zhang, Qiang Peng, Hongliang Li:
CODAN: Counting-driven Attention Network for Vehicle Detection in Congested Scenes. ACM Multimedia 2020: 73-82
2010 – 2019
- 2019
- [c2]Zhenting Wang, Kensuke Harada, Weiwei Wan:
Multi-contact Stability of Humanoids using ZMP and CWC. Humanoids 2019: 126-131 - [c1]Zhiyong Jin, Yongfu Chen, Tian Liu, Kai Li, Zhenting Wang, Jiongzhi Zheng:
A Novel and Fine-grained Heap Randomization Allocation Strategy for Effectively Alleviating Heap Buffer Overflow Vulnerabilities. ICMAI 2019: 115-122
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint