Sora: A Review on Background, Technology, Limitations, and Opportunities of Large Vision Models Y Liu, K Zhang, Y Li, Z Yan, C Gao, R Chen, Z Yuan, Y Huang, H Sun, ... arXiv preprint arXiv:2402.17177, 2024 | 30 | 2024 |
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji Computers & Security 104, 102220, 2021 | 24 | 2021 |
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours J Chen, H Zheng, R Chen, H Xiong Computers & Security 96, 101916, 2020 | 13 | 2020 |
Salient feature extractor for adversarial defense on deep neural networks R Chen, J Chen, H Zheng, Q Xuan, Z Ming, W Jiang, C Cui Information Sciences 600, 118-143, 2022 | 11 | 2022 |
Is multi-modal necessarily better? Robustness evaluation of multi-modal fake news detection J Chen, C Jia, H Zheng, R Chen, C Fu IEEE Transactions on Network Science and Engineering, 2023 | 6 | 2023 |
GUARD: Role-playing to Generate Natural-language Jailbreakings to Test Guideline Adherence of Large Language Models H Jin, R Chen, A Zhou, J Chen, Y Zhang, H Wang arXiv preprint arXiv:2402.03299, 2024 | 2 | 2024 |
EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models R Chen, H Jin, J Chen, L Sun arXiv preprint arXiv:2311.12066, 2023 | 2 | 2023 |
Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons H Jin, R Chen, H Zheng, J Chen, Y Cheng, Y Yu, T Chen, X Liu Information Sciences 637, 118936, 2023 | 2 | 2023 |
Mora: Enabling Generalist Video Generation via A Multi-Agent Framework Z Yuan, R Chen, Z Li, H Jia, L He, C Wang, L Sun arXiv preprint arXiv:2403.13248, 2024 | 1 | 2024 |
MLLM-as-a-Judge: Assessing Multimodal LLM-as-a-Judge with Vision-Language Benchmark D Chen, R Chen, S Zhang, Y Liu, Y Wang, H Zhou, Q Zhang, P Zhou, ... arXiv preprint arXiv:2402.04788, 2024 | 1 | 2024 |
DeepSensor: Deep Learning Testing Framework Based on Neuron Sensitivity H Jin, R Chen, H Zheng, J Chen, Z Liu, Q Xuan, Y Yu, Y Cheng arXiv preprint arXiv:2202.07464, 2022 | 1 | 2022 |
CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing H Jin, R Chen, J Chen, Y Cheng, C Fu, T Wang, Y Yu, Z Ming arXiv preprint arXiv:2112.13064, 2021 | 1 | 2021 |
NIP: Neuron-level Inverse Perturbation Against Adversarial Attacks R Chen, H Jin, J Chen, H Zheng, Y Yu, S Ji arXiv preprint arXiv:2112.13060, 2021 | 1 | 2021 |
面向深度学习模型的可靠性测试综述 陈若曦, 金海波, 陈晋音, 郑海斌, 李晓豪 Journal of Cyber Security 信息安全学报 9 (1), 2024 | | 2024 |
AdvCheck: Characterizing adversarial examples via local gradient checking R Chen, H Jin, J Chen, H Zheng, S Zheng, X Yang, X Yang Computers & Security 136, 103540, 2024 | | 2024 |
Quack: Automatic Jailbreaking Large Language Models via Role-playing H Jin, R Chen, J Chen, H Wang | | 2023 |