BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning Z Wang, J Zhai, S Ma Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 108 | 2022 |
Complex Backdoor Detection by Symmetric Feature Differencing Y Liu, G Shen, G Tao, Z Wang, S Ma, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 76* | 2022 |
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models K Mei, Z Li, Z Wang, Y Zhang, S Ma Proceedings of the 61st Annual Meeting of the Association for Computational …, 2023 | 52 | 2023 |
Rethinking the Reverse-engineering of Trojan Triggers Z Wang, K Mei, H Ding, J Zhai, S Ma Advances in Neural Information Processing Systems, 2022 | 50 | 2022 |
Training with More Confidence: Mitigating Injected and Natural Backdoors During Training Z Wang, H Ding, J Zhai, S Ma Advances in Neural Information Processing Systems, 2022 | 45 | 2022 |
UNICORN: A Unified Backdoor Trigger Inversion Framework Z Wang, K Mei, J Zhai, S Ma The Eleventh International Conference on Learning Representations, 2023 | 39 | 2023 |
Exploring Concept Depth: How Large Language Models Acquire Knowledge at Different Layers? M Jin, Q Yu, J Huang, Q Zeng, Z Wang, W Hua, H Zhao, K Mei, Y Meng, ... arXiv preprint arXiv:2404.07066, 2024 | 36* | 2024 |
Health-LLM: Personalized Retrieval-Augmented Disease Prediction Model M Jin, Q Yu, D Shu, C Zhang, L Fan, W Hua, S Zhu, Y Meng, Z Wang, ... arXiv preprint arXiv:2402.00746, 2024 | 35* | 2024 |
DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models Z Wang, C Chen, L Lyu, D Metaxas, S Ma The Twelfth International Conference on Learning Representations, 2024 | 31* | 2024 |
APEER: Automatic Prompt Engineering Enhances Large Language Model Reranking C Jin, H Peng, S Zhao, Z Wang, W Xu, L Han, J Zhao, K Zhong, ... arXiv preprint arXiv:2406.14449, 2024 | 27 | 2024 |
Distribution Preserving Backdoor Attack in Self-supervised Learning G Tao*, Z Wang*, S Feng, G Shen, S Ma, X Zhang 2024 IEEE Symposium on Security and Privacy (SP) (* indicates equal …, 2023 | 24 | 2023 |
CODAN: Counting-driven Attention Network for Vehicle Detection in Congested Scenes W Li, Z Wang, X Wu, J Zhang, Q Peng, H Li Proceedings of the 28th ACM International Conference on Multimedia, 73-82, 2020 | 21 | 2020 |
Time Series Forecasting with LLMs: Understanding and Enhancing Model Capabilities M Jin, H Tang, C Zhang, Q Yu, Z Wang, X Jin, Y Zhang, M Du arXiv preprint arXiv:2402.10835, 2024 | 20 | 2024 |
Where Did I Come From? Origin Attribution of AI-Generated Images Z Wang, C Chen, Y Zeng, L Lyu, S Ma Thirty-seventh Conference on Neural Information Processing Systems, 2023 | 18* | 2023 |
Backdoor Vulnerabilities in Normally Trained Deep Learning Models G Tao, Z Wang, S Cheng, S Ma, S An, Y Liu, G Shen, Z Zhang, Y Mao, ... arXiv preprint arXiv:2211.15929, 2022 | 15 | 2022 |
EmojiPrompt: Generative Prompt Obfuscation for Privacy-Preserving Communication with Cloud-based LLMs G Lin, W Hua, Z Wang, M Jin, Y Zhang NAACL 2025, 2024 | 14* | 2024 |
When ai meets finance (stockagent): Large language model-based stock trading in simulated real-world environments C Zhang, X Liu, Z Zhang, M Jin, L Li, Z Wang, W Hua, D Shu, S Zhu, X Jin, ... arXiv preprint arXiv:2407.18957, 2024 | 12* | 2024 |
How to Trace Latent Generative Model Generated Images without Artificial Watermark? Z Wang, V Sehwag, C Chen, L Lyu, DN Metaxas, S Ma The Forty-first International Conference on Machine Learning, 2024 | 10 | 2024 |
Uncertainty is Fragile: Manipulating Uncertainty in Large Language Models Q Zeng, M Jin, Q Yu, Z Wang, W Hua, Z Zhou, G Sun, Y Meng, S Ma, ... arXiv preprint arXiv:2407.11282, 2024 | 9 | 2024 |
Visual Agents as Fast and Slow Thinkers G Sun, M Jin, Z Wang, CL Wang, S Ma, Q Wang, YN Wu, Y Zhang, D Liu arXiv preprint arXiv:2408.08862, 2024 | 6 | 2024 |