default search action
Jiakai Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Jiakai Wang, Ye Tao, Yichi Zhang, Wanting Liu, Yusheng Kong, Shaolin Tan, Rongen Yan, Xianglong Liu:
Adversarial Examples Against WiFi Fingerprint-Based Localization in the Physical World. IEEE Trans. Inf. Forensics Secur. 19: 8457-8471 (2024) - [j8]Simin Li, Huangxinxin Xu, Jiakai Wang, Ruixiao Xu, Aishan Liu, Fazhi He, Xianglong Liu, Dacheng Tao:
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection. IEEE Trans. Image Process. 33: 2714-2729 (2024) - [j7]Zixin Yin, Jiakai Wang, Yisong Xiao, Hanqing Zhao, Tianlin Li, Wenbo Zhou, Aishan Liu, Xianglong Liu:
Improving Deepfake Detection Generalization by Invariant Risk Minimization. IEEE Trans. Multim. 26: 6785-6798 (2024) - [j6]Haotong Qin, Xudong Ma, Yifu Ding, Xiaoyang Li, Yang Zhang, Zejun Ma, Jiakai Wang, Jie Luo, Xianglong Liu:
BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance. IEEE Trans. Neural Networks Learn. Syst. 35(8): 10674-10686 (2024) - [c15]Siyang Wu, Jiakai Wang, Jiejie Zhao, Yazhe Wang, Xianglong Liu:
NAPGuard: Towards Detecting Naturalistic Adversarial Patches. CVPR 2024: 24367-24376 - [c14]Simin Li, Jun Guo, Jingqiao Xiu, Ruixiao Xu, Xin Yu, Jiakai Wang, Aishan Liu, Yaodong Yang, Xianglong Liu:
Byzantine Robust Cooperative Multi-Agent Reinforcement Learning as a Bayesian Game. ICLR 2024 - [c13]Yanni Xue, Haojie Hao, Jiakai Wang, Qiang Sheng, Renshuai Tao, Yu Liang, Pu Feng, Xianglong Liu:
Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation. IJCAI 2024: 6606-6614 - [c12]Haodi Wang, Kai Dong, Zhilei Zhu, Haotong Qin, Aishan Liu, Xiaolin Fang, Jiakai Wang, Xianglong Liu:
Transferable Multimodal Attack on Vision-Language Pre-training Models. SP 2024: 1722-1740 - [i26]Jiaheng Liu, Zhiqi Bai, Yuanxing Zhang, Chenchen Zhang, Yu Zhang, Ge Zhang, Jiakai Wang, Haoran Que, Yukang Chen, Wenbo Su, Tiezheng Ge, Jie Fu, Wenhu Chen, Bo Zheng:
E^2-LLM: Efficient and Extreme Length Extension of Large Language Models. CoRR abs/2401.06951 (2024) - [i25]Xingyu Zheng, Haotong Qin, Xudong Ma, Mingyuan Zhang, Haojie Hao, Jiakai Wang, Zixiang Zhao, Jinyang Guo, Xianglong Liu:
BinaryDM: Towards Accurate Binarization of Diffusion Model. CoRR abs/2404.05662 (2024) - [i24]Ken Deng, Jiaheng Liu, He Zhu, Congnan Liu, Jingxin Li, Jiakai Wang, Peng Zhao, Chenchen Zhang, Yanan Wu, Xueqiao Yin, Yuanxing Zhang, Wenbo Su, Bangyu Xiang, Tiezheng Ge, Bo Zheng:
R2C2-Coder: Enhancing and Benchmarking Real-world Repository-level Code Completion Abilities of Code Large Language Models. CoRR abs/2406.01359 (2024) - [i23]Haoran Que, Jiaheng Liu, Ge Zhang, Chenchen Zhang, Xingwei Qu, Yinghao Ma, Feiyu Duan, Zhiqi Bai, Jiakai Wang, Yuanxing Zhang, Xu Tan, Jie Fu, Wenbo Su, Jiamang Wang, Lin Qu, Bo Zheng:
D-CPT Law: Domain-specific Continual Pre-Training Scaling Law for Large Language Models. CoRR abs/2406.01375 (2024) - [i22]Jiaheng Liu, Chenchen Zhang, Jinyang Guo, Yuanxing Zhang, Haoran Que, Ken Deng, Zhiqi Bai, Jie Liu, Ge Zhang, Jiakai Wang, Yanan Wu, Congnan Liu, Wenbo Su, Jiamang Wang, Lin Qu, Bo Zheng:
DDK: Distilling Domain Knowledge for Efficient Large Language Models. CoRR abs/2407.16154 (2024) - [i21]Aishan Liu, Yuguang Zhou, Xianglong Liu, Tianyuan Zhang, Siyuan Liang, Jiakai Wang, Yanjun Pu, Tianlin Li, Junqi Zhang, Wenbo Zhou, Qing Guo, Dacheng Tao:
Compromising Embodied Agents with Contextual Backdoor Attacks. CoRR abs/2408.02882 (2024) - [i20]Yuqi Zhang, Xiaoqian Zhang, Jiakai Wang, Yuancheng Yang, Taiying Peng, Chao Tong:
Mamba2MIL: State Space Duality Based Multiple Instance Learning for Computational Pathology. CoRR abs/2408.15032 (2024) - [i19]Yanni Xue, Haojie Hao, Jiakai Wang, Qiang Sheng, Renshuai Tao, Yu Liang, Pu Feng, Xianglong Liu:
Vision-fused Attack: Advancing Aggressive and Stealthy Adversarial Text against Neural Machine Translation. CoRR abs/2409.05021 (2024) - 2023
- [j5]Haotong Qin, Yifu Ding, Xiangguo Zhang, Jiakai Wang, Xianglong Liu, Jiwen Lu:
Diverse Sample Generation: Pushing the Limit of Generative Data-Free Quantization. IEEE Trans. Pattern Anal. Mach. Intell. 45(10): 11689-11706 (2023) - [j4]Jun Guo, Wei Bao, Jiakai Wang, Yuqing Ma, Xinghai Gao, Gang Xiao, Aishan Liu, Jian Dong, Xianglong Liu, Wenjun Wu:
A comprehensive evaluation framework for deep model robustness. Pattern Recognit. 137: 109308 (2023) - [c11]Simin Li, Shuning Zhang, Gujun Chen, Dong Wang, Pu Feng, Jiakai Wang, Aishan Liu, Xin Yi, Xianglong Liu:
Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks. CVPR 2023: 12324-12333 - [c10]Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao:
X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection. USENIX Security Symposium 2023: 3781-3798 - [i18]Simin Li, Jun Guo, Jingqiao Xiu, Pu Feng, Xin Yu, Jiakai Wang, Aishan Liu, Wenjun Wu, Xianglong Liu:
Attacking Cooperative Multi-Agent Reinforcement Learning by Adversarial Minority Influence. CoRR abs/2302.03322 (2023) - [i17]Aishan Liu, Jun Guo, Jiakai Wang, Siyuan Liang, Renshuai Tao, Wenbo Zhou, Cong Liu, Xianglong Liu, Dacheng Tao:
X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection. CoRR abs/2302.09491 (2023) - [i16]Simin Li, Shuing Zhang, Gujun Chen, Dong Wang, Pu Feng, Jiakai Wang, Aishan Liu, Xin Yi, Xianglong Liu:
Towards Benchmarking and Assessing Visual Naturalness of Physical World Adversarial Attacks. CoRR abs/2305.12863 (2023) - [i15]Simin Li, Jun Guo, Jingqiao Xiu, Xini Yu, Jiakai Wang, Aishan Liu, Yaodong Yang, Xianglong Liu:
Byzantine Robust Cooperative Multi-Agent Reinforcement Learning as a Bayesian Game. CoRR abs/2305.12872 (2023) - [i14]Simin Li, Ruixiao Xu, Jun Guo, Pu Feng, Jiakai Wang, Aishan Liu, Yaodong Yang, Xianglong Liu, Weifeng Lv:
MIR2: Towards Provably Robust Multi-Agent Reinforcement Learning by Mutual Information Regularization. CoRR abs/2310.09833 (2023) - [i13]Jiakai Wang, Donghua Wang, Jin Hu, Siyang Wu, Tingsong Jiang, Wen Yao, Aishan Liu, Xianglong Liu:
Adversarial Examples in the Physical World: A Survey. CoRR abs/2311.01473 (2023) - [i12]Aishan Liu, Xinwei Zhang, Yisong Xiao, Yuguang Zhou, Siyuan Liang, Jiakai Wang, Xianglong Liu, Xiaochun Cao, Dacheng Tao:
Pre-trained Trojan Attacks for Visual Recognition. CoRR abs/2312.15172 (2023) - 2022
- [j3]Jiakai Wang, Aishan Liu, Xiao Bai, Xianglong Liu:
Universal Adversarial Patch Attack for Automatic Checkout Using Perceptual and Attentional Bias. IEEE Trans. Image Process. 31: 598-611 (2022) - [c9]Shunchang Liu, Jiakai Wang, Aishan Liu, Yingwei Li, Yijie Gao, Xianglong Liu, Dacheng Tao:
Harnessing Perceptual Adversarial Patches for Crowd Counting. CCS 2022: 2055-2069 - [c8]Jiakai Wang, Zixin Yin, Pengfei Hu, Aishan Liu, Renshuai Tao, Haotong Qin, Xianglong Liu, Dacheng Tao:
Defensive Patches for Robust Recognition in the Physical World. CVPR 2022: 2446-2455 - [c7]Yuxuan Wang, Jiakai Wang, Zixin Yin, Ruihao Gong, Jingyi Wang, Aishan Liu, Xianglong Liu:
Generating Transferable Adversarial Examples against Vision Transformers. ACM Multimedia 2022: 5181-5190 - [i11]Jiakai Wang, Zixin Yin, Pengfei Hu, Aishan Liu, Renshuai Tao, Haotong Qin, Xianglong Liu, Dacheng Tao:
Defensive Patches for Robust Recognition in the Physical World. CoRR abs/2204.06213 (2022) - [i10]Simin Li, Huangxinxin Xu, Jiakai Wang, Aishan Liu, Fazhi He, Xianglong Liu, Dacheng Tao:
Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection. CoRR abs/2208.10688 (2022) - [i9]Haotong Qin, Xudong Ma, Yifu Ding, Xiaoyang Li, Yang Zhang, Zejun Ma, Jiakai Wang, Jie Luo, Xianglong Liu:
BiFSMNv2: Pushing Binary Neural Networks for Keyword Spotting to Real-Network Performance. CoRR abs/2211.06987 (2022) - [i8]Jiakai Wang, Zhendong Chen, Zixin Yin, Qinghong Yang, Xianglong Liu:
Phonemic Adversarial Attack against Audio Recognition in Real World. CoRR abs/2211.10661 (2022) - 2021
- [j2]Yan Wu, Jiaxin Fan, Renshuai Tao, Jiakai Wang, Haotong Qin, Aishan Liu, Xianglong Liu:
Sequential alignment attention model for scene text recognition. J. Vis. Commun. Image Represent. 80: 103289 (2021) - [c6]Jiakai Wang, Aishan Liu, Zixin Yin, Shunchang Liu, Shiyu Tang, Xianglong Liu:
Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World. CVPR 2021: 8565-8574 - [c5]Renshuai Tao, Yanlu Wei, Xiangjian Jiang, Hainan Li, Haotong Qin, Jiakai Wang, Yuqing Ma, Libo Zhang, Xianglong Liu:
Towards Real-world X-ray Security Inspection: A High-Quality Benchmark And Lateral Inhibition Module For Prohibited Items Detection. ICCV 2021: 10903-10912 - [c4]Jiakai Wang:
Adversarial Examples in Physical World. IJCAI 2021: 4925-4926 - [c3]Zixin Yin, Jiakai Wang, Yifu Ding, Yisong Xiao, Jun Guo, Renshuai Tao, Haotong Qin:
Improving Generalization of Deepfake Detection with Domain Adaptive Batch Normalization. AdvM @ ACM Multimedia 2021: 21-27 - [i7]Aishan Liu, Xianglong Liu, Jun Guo, Jiakai Wang, Yuqing Ma, Ze Zhao, Xinghai Gao, Gang Xiao:
A Comprehensive Evaluation Framework for Deep Model Robustness. CoRR abs/2101.09617 (2021) - [i6]Jiakai Wang, Aishan Liu, Zixin Yin, Shunchang Liu, Shiyu Tang, Xianglong Liu:
Dual Attention Suppression Attack: Generate Adversarial Camouflage in Physical World. CoRR abs/2103.01050 (2021) - [i5]Renshuai Tao, Yanlu Wei, Xiangjian Jiang, Hainan Li, Haotong Qin, Jiakai Wang, Yuqing Ma, Libo Zhang, Xianglong Liu:
Towards Real-world X-ray Security Inspection: A High-Quality Benchmark and Lateral Inhibition Module for Prohibited Items Detection. CoRR abs/2108.09917 (2021) - [i4]Haotong Qin, Yifu Ding, Xiangguo Zhang, Aoyu Li, Jiakai Wang, Xianglong Liu, Jiwen Lu:
Diverse Sample Generation: Pushing the Limit of Data-free Quantization. CoRR abs/2109.00212 (2021) - [i3]Shiyu Tang, Ruihao Gong, Yan Wang, Aishan Liu, Jiakai Wang, Xinyun Chen, Fengwei Yu, Xianglong Liu, Dawn Song, Alan L. Yuille, Philip H. S. Torr, Dacheng Tao:
RobustART: Benchmarking Robustness on Architecture Design and Training Techniques. CoRR abs/2109.05211 (2021) - [i2]Shunchang Liu, Jiakai Wang, Aishan Liu, Yingwei Li, Yijie Gao, Xianglong Liu, Dacheng Tao:
Harnessing Perceptual Adversarial Patches for Crowd Counting. CoRR abs/2109.07986 (2021) - 2020
- [c2]Aishan Liu, Jiakai Wang, Xianglong Liu, Bowen Cao, Chongzhi Zhang, Hang Yu:
Bias-Based Universal Adversarial Patch Attack for Automatic Check-Out. ECCV (13) 2020: 395-410 - [c1]Lin Wu, Fei Wang, Yongjun Xu, Yu Jiang, Jiakai Wang:
A Parallel Implementation of Hypothesis-Oriented Multiple Hypothesis Tracking. FUSION 2020: 1-8 - [i1]Aishan Liu, Jiakai Wang, Xianglong Liu, Chongzhi Zhang, Bowen Cao, Hang Yu:
Patch Attack for Automatic Check-out. CoRR abs/2005.09257 (2020)
2010 – 2019
- 2018
- [j1]Weimei Zhao, Jiakai Wang:
Research on Electric Micro-Meteorological Disaster Monitoring and Early Warning Technology. J. Comput. 13(4): 401-406 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint