Nattack: Learning the distributions of adversarial examples for an improved black-box attack on deep neural networks Y Li, L Li, L Wang, T Zhang, B Gong International conference on machine learning, 3866-3876, 2019 | 296 | 2019 |
SALAD-Bench: A Hierarchical and Comprehensive Safety Benchmark for Large Language Models L Li, B Dong, R Wang, X Hu, W Zuo, D Lin, Y Qiao, J Shao arXiv preprint arXiv:2402.05044, 2024 | 94 | 2024 |
End-to-end video captioning with multitask reinforcement learning L Li, B Gong 2019 IEEE winter conference on applications of computer vision (WACV), 339-348, 2019 | 79 | 2019 |
Easyjailbreak: A unified framework for jailbreaking large language models W Zhou, X Wang, L Xiong, H Xia, Y Gu, M Chai, F Zhu, C Huang, S Dou, ... arXiv preprint arXiv:2403.12171, 2024 | 36 | 2024 |
Psysafe: A comprehensive framework for psychological-based attack, defense, and evaluation of multi-agent system safety Z Zhang, Y Zhang, L Li, H Gao, L Wang, H Lu, F Zhao, Y Qiao, J Shao arXiv preprint arXiv:2401.11880, 2024 | 28 | 2024 |
Assessment of multimodal large language models in alignment with human values Z Shi, Z Wang, H Fan, Z Zhang, L Li, Y Zhang, Z Yin, L Sheng, Y Qiao, ... arXiv preprint arXiv:2403.17830, 2024 | 20 | 2024 |
Renderih: A large-scale synthetic dataset for 3d interacting hand pose estimation L Li, L Tian, X Zhang, Q Wang, B Zhang, L Bo, M Liu, C Chen Proceedings of the IEEE/CVF international conference on computer vision …, 2023 | 16 | 2023 |
From gpt-4 to gemini and beyond: Assessing the landscape of mllms on generalizability, trustworthiness and causality through four modalities C Lu, C Qian, G Zheng, H Fan, H Gao, J Zhang, J Shao, J Deng, J Fu, ... arXiv preprint arXiv:2401.15071, 2024 | 14 | 2024 |
Action recognition with spatio-temporal augmented descriptor and fusion method L Li, S Dai Multimedia Tools and Applications 76, 13953-13969, 2017 | 12 | 2017 |
Worldsimbench: Towards video generation models as world simulators Y Qin, Z Shi, J Yu, X Wang, E Zhou, L Li, Z Yin, X Liu, L Sheng, J Shao, ... arXiv preprint arXiv:2410.18072, 2024 | 7 | 2024 |
DiffHand: end-to-end hand mesh reconstruction via diffusion models L Li, L Zhuo, B Zhang, L Bo, C Chen arXiv preprint arXiv:2305.13705, 2023 | 6 | 2023 |
Action recognition based on local fisher discriminant analysis and mix encoding L Li, S Dai 2016 International Conference on Virtual Reality and Visualization (ICVRV …, 2016 | 5 | 2016 |
Action Recognition with deep network features and dimension reduction L Li, S Dai KSII Transactions on Internet and Information Systems (TIIS) 13 (2), 832-854, 2019 | 3 | 2019 |
T2ISafety: Benchmark for Assessing Fairness, Toxicity, and Privacy in Image Generation L Li, Z Shi, X Hu, B Dong, Y Qin, X Liu, L Sheng, J Shao arXiv preprint arXiv:2501.12612, 2025 | 1 | 2025 |
Nattack: A strong and universal gaussian black-box adversarial attack Y Li, L Li, L Wang, T Zhang, B Gong | 1 | 2018 |
One-stage Action Detection Transformer L Li, L Zhuo, B Zhang arXiv preprint arXiv:2206.10080, 2022 | | 2022 |
Benchmarking Ethics in Text-to-Image Models: A Holistic Dataset and Evaluator for Fairness, Toxicity, and Privacy L Li, Z Shi, X Hu, B Dong, Y Qin, X Liu, L Sheng, J Shao | | |
SALAD-Bench: A Hierarchical and Comprehensive Safety Benchmark for Large Language Models L Li, B Dong, R Wang, X Hu, W Zuo, D Lin, Y Qiao, J Shao Findings of the Association for Computational Linguistics: ACL 2024, 3923–3954, 0 | | |
Supplementary Materials for NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks Y Li, L Li, L Wang, T Zhang, B Gong | | |