Yangyi Chen

Orcid: 0000-0002-5607-7096

According to our database1, Yangyi Chen authored at least 39 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Executable Code Actions Elicit Better LLM Agents.
CoRR, 2024

2023
DRESS: Instructing Large Vision-Language Models to Align and Interact with Humans via Natural Language Feedback.
CoRR, 2023

Prudent Silence or Foolish Babble? Examining Large Language Models' Responses to the Unknown.
CoRR, 2023

R-Tuning: Teaching Large Language Models to Refuse Unknown Questions.
CoRR, 2023

CRAFT: Customizing LLMs by Creating and Retrieving from Specialized Toolsets.
CoRR, 2023

MINT: Evaluating LLMs in Multi-turn Interaction with Tools and Language Feedback.
CoRR, 2023

Measuring and Improving Chain-of-Thought Reasoning in Vision-Language Models.
CoRR, 2023

Revisiting Out-of-distribution Robustness in NLP: Benchmark, Analysis, and LLMs Evaluations.
CoRR, 2023

Revisiting Out-of-distribution Robustness in NLP: Benchmarks, Analysis, and LLMs Evaluations.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Beat LLMs at Their Own Game: Zero-Shot LLM-Generated Text Detection via Querying ChatGPT.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

ViStruct: Visual Structural Knowledge Extraction via Curriculum Guided Code-Vision Representation.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Bridge the Gap Between CV and NLP! A Gradient-based Textual Adversarial Attack Framework.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

A Close Look into the Calibration of Pre-trained Language Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

From Adversarial Arms Race to Model-centric Evaluation: Motivating a Unified Automatic Robustness Evaluation Framework.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Making Pre-trained Language Models both Task-solvers and Self-calibrators.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Moderate-fitting as a Natural Backdoor Defender for Pre-trained Language Models.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

A Unified Evaluation of Textual Backdoor Learning: Frameworks and Benchmarks.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Exploring the Universal Vulnerability of Prompt-based Learning Paradigm.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022

Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Why Should Adversarial Perturbations be Imperceptible? Rethink the Research Paradigm in Adversarial NLP.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

2021
Textual Backdoor Attacks Can Be More Harmful via Two Simple Tricks.
CoRR, 2021

Mind the Style of Text! Adversarial and Backdoor Attacks Based on Text Style Transfer.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

ONION: A Simple and Effective Defense Against Textual Backdoor Attacks.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Multi-granularity Textual Adversarial Attack with Behavior Cloning.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

QoE-Fairness Tradeoff Scheme for Dynamic Spectrum Allocation Based on Deep Reinforcement Learning.
Proceedings of the CSAE 2021: The 5th International Conference on Computer Science and Application Engineering, Sanya, China, October 19, 2021

Hidden Killer: Invisible Textual Backdoor Attacks with Syntactic Trigger.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

Automatic Construction of Sememe Knowledge Bases via Dictionaries.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

2020
ONION: A Simple and Effective Defense Against Textual Backdoor Attacks.
CoRR, 2020

2019
Optimized Non-Cooperative Spectrum Sensing Algorithm in Cognitive Wireless Sensor Networks.
Sensors, 2019

A Policy for Optimizing Sub-Band Selection Sequences in Wideband Spectrum Sensing.
Sensors, 2019

Evaluation of NUMA-Aware Scheduling in Warehouse-Scale Clusters.
Proceedings of the 12th IEEE International Conference on Cloud Computing, 2019

2016
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev., 2016

2015
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Perplexed Messengers from the Cloud: Automated Security Analysis of Push-Messaging Integrations.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing.
IEEE Trans. Wirel. Commun., 2014

2013
InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
To Release or Not to Release: Evaluating Information Leaks in Aggregate Human-Genome Data.
Proceedings of the Computer Security - ESORICS 2011, 2011

Sedic: privacy-aware data intensive computing on hybrid clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011


  Loading...