Zhenting Wang

Orcid: 0000-0002-7742-6777

According to our database1, Zhenting Wang authored at least 22 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring Concept Depth: How Large Language Models Acquire Knowledge at Different Layers?
CoRR, 2024

Finding needles in a haystack: A Black-Box Approach to Invisible Watermark Detection.
CoRR, 2024

Health-LLM: Personalized Retrieval-Augmented Disease Prediction System.
CoRR, 2024

2023
Difficulty and complexity definitions for assembly task allocation and assignment in human-robot collaborations: A review.
Robotics Comput. Integr. Manuf., December, 2023

How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models.
CoRR, 2023

Alteration-free and Model-agnostic Origin Attribution of Generated Images.
CoRR, 2023

Error Correction in Robotic Assembly Planning From Graphical Instruction Manuals.
IEEE Access, 2023

Where Did I Come From? Origin Attribution of AI-Generated Images.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

UNICORN: A Unified Backdoor Trigger Inversion Framework.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Backdoor Vulnerabilities in Normally Trained Deep Learning Models.
CoRR, 2022

Neural Network Trojans Analysis and Mitigation from the Input Domain.
CoRR, 2022

Rethinking the Reverse-engineering of Trojan Triggers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Training with More Confidence: Mitigating Injected and Natural Backdoors During Training.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Learning Selective Assignment Network for Scene-Aware Vehicle Detection.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Complex Backdoor Detection by Symmetric Feature Differencing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry.
CoRR, 2021

Assembly Planning by Recognizing a Graphical Instruction Manual.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

2020
CODAN: Counting-driven Attention Network for Vehicle Detection in Congested Scenes.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2019
A Novel and Fine-grained Heap Randomization Allocation Strategy for Effectively Alleviating Heap Buffer Overflow Vulnerabilities.
Proceedings of the 4th International Conference on Mathematics and Artificial Intelligence, 2019

Multi-contact Stability of Humanoids using ZMP and CWC.
Proceedings of the 19th IEEE-RAS International Conference on Humanoid Robots, 2019


  Loading...