Παρακολούθηση
Lijun Li
Lijun Li
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα buaa.edu.cn
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Nattack: Learning the distributions of adversarial examples for an improved black-box attack on deep neural networks
Y Li, L Li, L Wang, T Zhang, B Gong
International conference on machine learning, 3866-3876, 2019
2962019
SALAD-Bench: A Hierarchical and Comprehensive Safety Benchmark for Large Language Models
L Li, B Dong, R Wang, X Hu, W Zuo, D Lin, Y Qiao, J Shao
arXiv preprint arXiv:2402.05044, 2024
942024
End-to-end video captioning with multitask reinforcement learning
L Li, B Gong
2019 IEEE winter conference on applications of computer vision (WACV), 339-348, 2019
792019
Easyjailbreak: A unified framework for jailbreaking large language models
W Zhou, X Wang, L Xiong, H Xia, Y Gu, M Chai, F Zhu, C Huang, S Dou, ...
arXiv preprint arXiv:2403.12171, 2024
362024
Psysafe: A comprehensive framework for psychological-based attack, defense, and evaluation of multi-agent system safety
Z Zhang, Y Zhang, L Li, H Gao, L Wang, H Lu, F Zhao, Y Qiao, J Shao
arXiv preprint arXiv:2401.11880, 2024
282024
Assessment of multimodal large language models in alignment with human values
Z Shi, Z Wang, H Fan, Z Zhang, L Li, Y Zhang, Z Yin, L Sheng, Y Qiao, ...
arXiv preprint arXiv:2403.17830, 2024
202024
Renderih: A large-scale synthetic dataset for 3d interacting hand pose estimation
L Li, L Tian, X Zhang, Q Wang, B Zhang, L Bo, M Liu, C Chen
Proceedings of the IEEE/CVF international conference on computer vision …, 2023
162023
From gpt-4 to gemini and beyond: Assessing the landscape of mllms on generalizability, trustworthiness and causality through four modalities
C Lu, C Qian, G Zheng, H Fan, H Gao, J Zhang, J Shao, J Deng, J Fu, ...
arXiv preprint arXiv:2401.15071, 2024
142024
Action recognition with spatio-temporal augmented descriptor and fusion method
L Li, S Dai
Multimedia Tools and Applications 76, 13953-13969, 2017
122017
Worldsimbench: Towards video generation models as world simulators
Y Qin, Z Shi, J Yu, X Wang, E Zhou, L Li, Z Yin, X Liu, L Sheng, J Shao, ...
arXiv preprint arXiv:2410.18072, 2024
72024
DiffHand: end-to-end hand mesh reconstruction via diffusion models
L Li, L Zhuo, B Zhang, L Bo, C Chen
arXiv preprint arXiv:2305.13705, 2023
62023
Action recognition based on local fisher discriminant analysis and mix encoding
L Li, S Dai
2016 International Conference on Virtual Reality and Visualization (ICVRV …, 2016
52016
Action Recognition with deep network features and dimension reduction
L Li, S Dai
KSII Transactions on Internet and Information Systems (TIIS) 13 (2), 832-854, 2019
32019
T2ISafety: Benchmark for Assessing Fairness, Toxicity, and Privacy in Image Generation
L Li, Z Shi, X Hu, B Dong, Y Qin, X Liu, L Sheng, J Shao
arXiv preprint arXiv:2501.12612, 2025
12025
Nattack: A strong and universal gaussian black-box adversarial attack
Y Li, L Li, L Wang, T Zhang, B Gong
12018
One-stage Action Detection Transformer
L Li, L Zhuo, B Zhang
arXiv preprint arXiv:2206.10080, 2022
2022
Benchmarking Ethics in Text-to-Image Models: A Holistic Dataset and Evaluator for Fairness, Toxicity, and Privacy
L Li, Z Shi, X Hu, B Dong, Y Qin, X Liu, L Sheng, J Shao
SALAD-Bench: A Hierarchical and Comprehensive Safety Benchmark for Large Language Models
L Li, B Dong, R Wang, X Hu, W Zuo, D Lin, Y Qiao, J Shao
Findings of the Association for Computational Linguistics: ACL 2024, 3923–3954, 0
Supplementary Materials for NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks
Y Li, L Li, L Wang, T Zhang, B Gong
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–19