Jiakai Wang

Orcid: 0000-0001-5884-3412

According to our database1, Jiakai Wang authored at least 68 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Adversarial Generation and Collaborative Evolution of Safety-Critical Scenarios for Autonomous Vehicles.
CoRR, August, 2025

MetAdv: A Unified and Interactive Adversarial Testing Platform for Autonomous Driving.
CoRR, August, 2025

First-Order Error Matters: Accurate Compensation for Quantized Large Language Models.
CoRR, July, 2025

Pre-trained Trojan Attacks for Visual Recognition.
Int. J. Comput. Vis., June, 2025

AGENTSAFE: Benchmarking the Safety of Embodied Agents on Hazardous Instructions.
CoRR, June, 2025

Pushing the Limits of Safety: A Technical Report on the ATLAS Challenge 2025.
CoRR, June, 2025

Towards Benchmarking and Assessing the Safety and Robustness of Autonomous Driving on Safety-critical Scenarios.
CoRR, March, 2025

Milmer: a Framework for Multiple Instance Learning based Multimodal Emotion Recognition.
CoRR, February, 2025

SAGNet: Decoupling Semantic-Agnostic Artifacts From Limited Training Data for Robust Generalization in Deepfake Detection.
IEEE Trans. Inf. Forensics Secur., 2025

Compromising LLM Driven Embodied Agents With Contextual Backdoor Attacks.
IEEE Trans. Inf. Forensics Secur., 2025

LS-PRISM: A layer-selective pruning method via low-rank approximation and sparsification for efficient large language model compression.
Neural Networks, 2025

Attacking cooperative multi-agent reinforcement learning by adversarial minority influence.
Neural Networks, 2025

Numerical simulation and optimization design of a novel longitudinal-flow online fertilizer mixing device.
Comput. Electron. Agric., 2025

Dual Intention Escape: Penetrating and Toxic Jailbreak Attack against Large Language Models.
Proceedings of the ACM on Web Conference 2025, 2025

BinaryDM: Accurate Weight Binarization for Efficient Diffusion Models.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

MTU-Bench: A Multi-granularity Tool-Use Benchmark for Large Language Models.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

Harnessing Global-Local Collaborative Adversarial Perturbation for Anti-Customization.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

Lexical Diversity-aware Relevance Assessment for Retrieval-Augmented Generation.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
Generate Transferable Adversarial Physical Camouflages via Triplet Attention Suppression.
Int. J. Comput. Vis., November, 2024

BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance.
IEEE Trans. Neural Networks Learn. Syst., August, 2024

Improving Deepfake Detection Generalization by Invariant Risk Minimization.
IEEE Trans. Multim., 2024

Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection.
IEEE Trans. Image Process., 2024

Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World.
IEEE Trans. Inf. Forensics Secur., 2024

DynamicPAE: Generating Scene-Aware Physical Adversarial Examples in Real-Time.
CoRR, 2024

Behavior Backdoor for Deep Learning Models.
CoRR, 2024

MTU-Bench: A Multi-granularity Tool-Use Benchmark for Large Language Models.
CoRR, 2024

Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology.
CoRR, 2024

Compromising Embodied Agents with Contextual Backdoor Attacks.
CoRR, 2024

R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models.
CoRR, 2024

BinaryDM: Towards Accurate Binarization of Diffusion Model.
CoRR, 2024

E^2-LLM: Efficient and Extreme Length Extension of Large Language Models.
CoRR, 2024

Transferable Multimodal Attack on Vision-Language Pre-training Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

BiDM: Pushing the Limit of Quantization for Diffusion Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

D-CPT Law: Domain-specific Continual Pre-Training Scaling Law for Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

DDK: Distilling Domain Knowledge for Efficient Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

RoleAgent: Building, Interacting, and Benchmarking High-quality Role-Playing Agents from Scripts.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Byzantine Robust Cooperative Multi-Agent Reinforcement Learning as a Bayesian Game.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

NAPGuard: Towards Detecting Naturalistic Adversarial Patches.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

E2-LLM: Efficient and Extreme Length Extension of Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Diverse Sample Generation: Pushing the Limit of Generative Data-Free Quantization.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2023

A comprehensive evaluation framework for deep model robustness.
Pattern Recognit., May, 2023

Adversarial Examples in the Physical World: A Survey.
CoRR, 2023

MIR2: Towards Provably Robust Multi-Agent Reinforcement Learning by Mutual Information Regularization.
CoRR, 2023

Byzantine Robust Cooperative Multi-Agent Reinforcement Learning as a Bayesian Game.
CoRR, 2023

Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks.
CoRR, 2023

Attacking Cooperative Multi-Agent Reinforcement Learning by Adversarial Minority Influence.
CoRR, 2023

X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Universal Adversarial Patch Attack for Automatic Checkout Using Perceptual and Attentional Bias.
IEEE Trans. Image Process., 2022

Phonemic Adversarial Attack against Audio Recognition in Real World.
CoRR, 2022

Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection.
CoRR, 2022

Generating Transferable Adversarial Examples against Vision Transformers.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Defensive Patches for Robust Recognition in the Physical World.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Harnessing Perceptual Adversarial Patches for Crowd Counting.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Sequential alignment attention model for scene text recognition.
J. Vis. Commun. Image Represent., 2021

RobustART: Benchmarking Robustness on Architecture Design and Training Techniques.
CoRR, 2021

Diverse Sample Generation: Pushing the Limit of Data-free Quantization.
CoRR, 2021

A Comprehensive Evaluation Framework for Deep Model Robustness.
CoRR, 2021

Improving Generalization of Deepfake Detection with Domain Adaptive Batch Normalization.
Proceedings of the ADVM '21: Proceedings of the 1st International Workshop on Adversarial Learning for Multimedia, 2021

Adversarial Examples in Physical World.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Towards Real-world X-ray Security Inspection: A High-Quality Benchmark And Lateral Inhibition Module For Prohibited Items Detection.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Patch Attack for Automatic Check-out.
CoRR, 2020

A Parallel Implementation of Hypothesis-Oriented Multiple Hypothesis Tracking.
Proceedings of the IEEE 23rd International Conference on Information Fusion, 2020

Bias-Based Universal Adversarial Patch Attack for Automatic Check-Out.
Proceedings of the Computer Vision - ECCV 2020, 2020

2018
Research on Electric Micro-Meteorological Disaster Monitoring and Early Warning Technology.
J. Comput., 2018


  Loading...