Zhenting Wang

Orcid: 0000-0003-0311-1331

According to our database1, Zhenting Wang authored at least 63 papers between 2019 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Breaking the Myth: Can Small Models Infer Postconditions Too?
CoRR, July, 2025

EDITOR: Effective and Interpretable Prompt Inversion for Text-to-Image Diffusion Models.
CoRR, June, 2025

DUMP: Automated Distribution-Level Curriculum Learning for RL-based LLM Post-training.
CoRR, April, 2025

Scaling Laws of Scientific Discovery with AI and Robot Scientists.
CoRR, March, 2025

LED: LLM Enhanced Open-Vocabulary Object Detection without Human Curated Data Generation.
CoRR, March, 2025

Can Large Vision-Language Models Detect Images Copyright Infringement from GenAI?
CoRR, February, 2025

The Hidden Life of Tokens: Reducing Hallucination of Large Vision-Language Models via Visual Information Steering.
CoRR, February, 2025

APEER : Automatic Prompt Engineering Enhances Large Language Model Reranking.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2025, 2025

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Vision-based Robotic Assembly from Novel Graphical Instructions.
Proceedings of the IEEE/SICE International Symposium on System Integration, 2025

Data-centric NLP Backdoor Defense from the Lens of Memorization.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2025, Albuquerque, New Mexico, USA, April 29, 2025

EmojiPrompt: Generative Prompt Obfuscation for Privacy-Preserving Communication with Cloud-based LLMs.
Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies, 2025

An Optimizable Suffix Is Worth A Thousand Templates: Efficient Black-box Jailbreaking without Affirmative Phrases via LLM as Optimizer.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2025, Albuquerque, New Mexico, USA, April 29, 2025

Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

Visual Agents as Fast and Slow Thinkers.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

LoR-VP: Low-Rank Visual Prompting for Efficient Vision Model Adaptation.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

Accelerating Multimodal Large Language Models by Searching Optimal Vision Token Reduction.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

Invisible Backdoor Attack against Self-supervised Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

MLLM-as-a-Judge for Image Safety without Human Labeling.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

CO-SPY: Combining Semantic and Pixel Features to Detect Synthetic Images by AI.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

Exploring Concept Depth: How Large Language Models Acquire Knowledge and Concept at Different Layers?
Proceedings of the 31st International Conference on Computational Linguistics, 2025

ADO: Automatic Data Optimization for Inputs in LLM Prompts.
Proceedings of the Findings of the Association for Computational Linguistics, 2025

Token-Budget-Aware LLM Reasoning.
Proceedings of the Findings of the Association for Computational Linguistics, 2025

2024
Time Series Forecasting with LLMs: Understanding and Enhancing Model Capabilities.
SIGKDD Explor., December, 2024

Desertification Mitigation in Northern China Was Promoted by Climate Drivers after 2000.
Remote. Sens., October, 2024

Robustness-aware Automatic Prompt Optimization.
CoRR, 2024

Continuous Concepts Removal in Text-to-image Diffusion Models.
CoRR, 2024

ProSec: Fortifying Code LLMs with Proactive Security Alignment.
CoRR, 2024

Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents.
CoRR, 2024

Unlocking Adversarial Suffix Optimization Without Affirmative Phrases: Efficient Black-box Jailbreaking via LLM as Optimizer.
CoRR, 2024

Visual Agents as Fast and Slow Thinkers.
CoRR, 2024

When AI Meets Finance (StockAgent): Large Language Model-based Stock Trading in Simulated Real-world Environments.
CoRR, 2024

Uncertainty is Fragile: Manipulating Uncertainty in Large Language Models.
CoRR, 2024

Evaluating and Mitigating IP Infringement in Visual Generative AI.
CoRR, 2024

Towards Imperceptible Backdoor Attack in Self-supervised Learning.
CoRR, 2024

ProLLM: Protein Chain-of-Thoughts Enhanced LLM for Protein-Protein Interaction Prediction.
CoRR, 2024

Exploring Concept Depth: How Large Language Models Acquire Knowledge at Different Layers?
CoRR, 2024

Health-LLM: Personalized Retrieval-Augmented Disease Prediction System.
CoRR, 2024

Assembly Task Allocation for Human-Robot Collaboration Considering Stability and Assembly Complexity.
IEEE Access, 2024

Distribution Preserving Backdoor Attack in Self-supervised Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

How to Trace Latent Generative Model Generated Images without Artificial Watermark?
Proceedings of the Forty-first International Conference on Machine Learning, 2024

DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Finding Needles in a Haystack: A Black-Box Approach to Invisible Watermark Detection.
Proceedings of the Computer Vision - ECCV 2024, 2024

Exploring Inherent Backdoors in Deep Learning Models.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
Difficulty and complexity definitions for assembly task allocation and assignment in human-robot collaborations: A review.
Robotics Comput. Integr. Manuf., December, 2023

How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models.
CoRR, 2023

Alteration-free and Model-agnostic Origin Attribution of Generated Images.
CoRR, 2023

Error Correction in Robotic Assembly Planning From Graphical Instruction Manuals.
IEEE Access, 2023

Where Did I Come From? Origin Attribution of AI-Generated Images.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

UNICORN: A Unified Backdoor Trigger Inversion Framework.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Backdoor Vulnerabilities in Normally Trained Deep Learning Models.
CoRR, 2022

Neural Network Trojans Analysis and Mitigation from the Input Domain.
CoRR, 2022

Rethinking the Reverse-engineering of Trojan Triggers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Training with More Confidence: Mitigating Injected and Natural Backdoors During Training.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Learning Selective Assignment Network for Scene-Aware Vehicle Detection.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Complex Backdoor Detection by Symmetric Feature Differencing.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry.
CoRR, 2021

Assembly Planning by Recognizing a Graphical Instruction Manual.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2021

2020
CODAN: Counting-driven Attention Network for Vehicle Detection in Congested Scenes.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2019
A Novel and Fine-grained Heap Randomization Allocation Strategy for Effectively Alleviating Heap Buffer Overflow Vulnerabilities.
Proceedings of the 4th International Conference on Mathematics and Artificial Intelligence, 2019

Multi-contact Stability of Humanoids using ZMP and CWC.
Proceedings of the 19th IEEE-RAS International Conference on Humanoid Robots, 2019


  Loading...