


default search action
Ranjie Duan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j2]Chang Liu
, Wenzhao Xiang, Yinpeng Dong, Xingxing Zhang, Liyuan Wang, Ranjie Duan, Shibao Zheng, Hang Su:
RobustPrompt: Learning to defend against adversarial attacks with adaptive visual prompts. Pattern Recognit. Lett. 190: 161-168 (2025)
[c11]Yichi Zhang, Siyuan Zhang, Yao Huang, Zeyu Xia, Zhengwei Fang, Xiao Yang, Ranjie Duan, Dong Yan, Yinpeng Dong, Jun Zhu:
STAIR: Improving Safety Alignment with Introspective Reasoning. ICML 2025
[c10]Jianyu Liu, Hangyu Guo, Ranjie Duan, Xingyuan Bu, Yancheng He, Shilong Li, Hui Huang, Jiaheng Liu, Yucheng Wang, Chenchen Jing, Xingwei Qu, Xiao Zhang, Pei Wang, Yanan Wu, Jihao Gu, Yangguang Li, Jianke Zhu:
DREAM: Disentangling Risks to Enhance Safety Alignment in Multimodal Large Language Models. NAACL (Long Papers) 2025: 12097-12118
[c9]Yining Wang, Mi Zhang, Junjie Sun, Chenyue Wang, Min Yang, Hui Xue, Jialing Tao, Ranjie Duan, Jiexi Liu:
Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink. USENIX Security Symposium 2025: 3707-3726
[i24]Shiji Zhao, Ranjie Duan, Fengxiang Wang, Chi Chen, Caixin Kang, Jialing Tao, YueFeng Chen, Hui Xue, Xingxing Wei:
Jailbreaking Multimodal Large Language Models via Shuffle Inconsistency. CoRR abs/2501.04931 (2025)
[i23]Yining Wang, Mi Zhang, Junjie Sun, Chenyue Wang, Min Yang, Hui Xue, Jialing Tao, Ranjie Duan, Jiexi Liu:
Mirage in the Eyes: Hallucination Attack on Multi-modal Large Language Models with Only Attention Sink. CoRR abs/2501.15269 (2025)
[i22]Yichi Zhang, Siyuan Zhang, Yao Huang, Zeyu Xia, Zhengwei Fang, Xiao Yang, Ranjie Duan, Dong Yan, Yinpeng Dong, Jun Zhu:
STAIR: Improving Safety Alignment with Introspective Reasoning. CoRR abs/2502.02384 (2025)
[i21]Jianyu Liu, Hangyu Guo, Ranjie Duan, Xingyuan Bu, Yancheng He, Shilong Li, Hui Huang, Jiaheng Liu, Yucheng Wang, Chenchen Jing, Xingwei Qu, Xiao Zhang, Yingshui Tan, Yanan Wu, Jihao Gu, Yangguang Li, Jianke Zhu:
DREAM: Disentangling Risks to Enhance Safety Alignment in Multimodal Large Language Models. CoRR abs/2504.18053 (2025)
[i20]Shiji Zhao, Qihui Zhu, Shukun Xiong, Shouwei Ruan, Yize Fan, Ranjie Duan, Qing Guo, Xingxing Wei:
Enhancing Adversarial Robustness of Vision Language Models via Adversarial Mixture Prompt Tuning. CoRR abs/2505.17509 (2025)
[i19]Feiran Liu, Yuzhe Zhang, Xinyi Huang, Yinan Peng, Xinfeng Li, Lixu Wang, Yutong Shen, Ranjie Duan, Simeng Qin, Xiaojun Jia, Qingsong Wen, Wei Dong:
The Eye of Sherlock Holmes: Uncovering User Private Attribute Profiling via Vision-Language Model Agentic Framework. CoRR abs/2505.19139 (2025)
[i18]Shiji Zhao, Chi Chen, Ranjie Duan, Xizhe Wang, Xingxing Wei:
Towards Class-wise Fair Adversarial Training via Anti-Bias Soft Label Distillation. CoRR abs/2506.08611 (2025)
[i17]Shiji Zhao, Ranjie Duan, Jiexi Liu, Xiaojun Jia, Fengxiang Wang, Cheng Wei, Ruoxi Cheng, Yong Xie, Chang Liu, Qing Guo, Jialing Tao, Hui Xue, Xingxing Wei:
Strata-Sword: A Hierarchical Safety Evaluation towards LLMs based on Reasoning Complexity of Jailbreak Instructions. CoRR abs/2509.01444 (2025)
[i16]Ranjie Duan, Jiexi Liu, Xiaojun Jia, Shiji Zhao, Ruoxi Cheng, Fengxiang Wang, Cheng Wei, Yong Xie, Chang Liu, Defeng Li, Yinpeng Dong, Yichi Zhang, Yuefeng Chen, Chongwen Wang, Xingjun Ma, Xingxing Wei, Yang Liu, Hang Su, Jun Zhu, Xinfeng Li, Yitong Sun, Jie Zhang, Jinzhao Hu, Sha Xu, Wenchao Yang, Yitong Yang, Xingyao Zhang, Yingshui Tan, Jialing Tao, Hui Xue:
Oyster-I: Beyond Refusal - Constructive Safety Alignment for Responsible Language Models. CoRR abs/2509.01909 (2025)
[i15]Yichi Zhang, Yue Ding, Jingwen Yang, Tianwei Luo, Dongbai Li, Ranjie Duan, Qiang Liu, Hang Su, Yinpeng Dong, Jun Zhu:
Towards Safe Reasoning in Large Reasoning Models via Corrective Intervention. CoRR abs/2509.24393 (2025)
[i14]Eric Hanchen Jiang, Weixuan Ou, Run Liu, Shengyuan Pang, Guancheng Wan, Ranjie Duan, Wei Dong, Kai-Wei Chang, XiaoFeng Wang, Ying Nian Wu, Xinfeng Li:
Energy-Driven Steering: Reducing False Refusals in Large Language Models. CoRR abs/2510.08646 (2025)
[i13]Xiaonan Si, Meilin Zhu, Simeng Qin, Lijia Yu, Lijun Zhang, Shuaitong Liu, Xinfeng Li, Ranjie Duan, Yang Liu, Xiaojun Jia:
SeCon-RAG: A Two-Stage Semantic Filtering and Conflict-Free Framework for Trustworthy RAG. CoRR abs/2510.09710 (2025)
[i12]Yitong Sun, Yao Huang, Ruochen Zhang, Huanran Chen, Shouwei Ruan, Ranjie Duan, Xingxing Wei:
NDM: A Noise-driven Detection and Mitigation Framework against Implicit Sexual Intentions in Text-to-Image Generation. CoRR abs/2510.15752 (2025)- 2024
[j1]Xiaojun Jia
, Yuefeng Chen
, Xiaofeng Mao, Ranjie Duan, Jindong Gu
, Rong Zhang
, Hui Xue
, Yang Liu
, Xiaochun Cao
:
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging. IEEE Trans. Inf. Forensics Secur. 19: 8125-8139 (2024)
[c8]Shiji Zhao, Ranjie Duan, Xizhe Wang, Xingxing Wei:
Improving Adversarial Robust Fairness via Anti-Bias Soft Label Distillation. NeurIPS 2024
[i11]Sensen Gao, Xiaojun Jia, Yihao Huang, Ranjie Duan, Jindong Gu, Yang Liu
, Qing Guo:
RT-Attack: Jailbreaking Text-to-Image Models via Random Token. CoRR abs/2408.13896 (2024)
[i10]Fengxiang Wang, Ranjie Duan, Peng Xiao, Xiaojun Jia, Yuefeng Chen, Chongwen Wang, Jialing Tao, Hang Su, Jun Zhu, Hui Xue:
MRJ-Agent: An Effective Jailbreak Agent for Multi-Round Dialogue. CoRR abs/2411.03814 (2024)
[i9]Ruoxi Cheng, Yizhong Ding, Shuirong Cao, Ranjie Duan, Xiaoshuang Jia, Shaowei Yuan, Zhiqiang Wang, Xiaojun Jia:
PBI-Attack: Prior-Guided Bimodal Interactive Black-Box Jailbreak Attack for Toxicity Maximization. CoRR abs/2412.05892 (2024)
[i8]Ma Teng, Xiaojun Jia, Ranjie Duan, Li Xinfeng, Yihao Huang, Chu Zhixuan, Yang Liu, Wenqi Ren:
Heuristic-Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models. CoRR abs/2412.05934 (2024)- 2023
[c7]Ranjie Duan, Yuefeng Chen, Yao Zhu, Xiaojun Jia, Rong Zhang, Hui Xue:
Inequality phenomenon in l∞-adversarial training, and its unrealized threats. ICLR 2023
[c6]Gege Qi, Yuefeng Chen, Xiaofeng Mao, Xiaojun Jia, Ranjie Duan, Rong Zhang, Hui Xue:
Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training. INTERSPEECH 2023: 561-565
[i7]Gege Qi, Yuefeng Chen, Xiaofeng Mao, Xiaojun Jia, Ranjie Duan, Rong Zhang, Hui Xue:
Robust Automatic Speech Recognition via WavAugment Guided Phoneme Adversarial Training. CoRR abs/2307.12498 (2023)
[i6]Xiaojun Jia, Yuefeng Chen, Xiaofeng Mao, Ranjie Duan, Jindong Gu, Rong Zhang, Hui Xue, Xiaochun Cao:
Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging. CoRR abs/2308.11443 (2023)- 2022
[c5]Xiaofeng Mao
, Gege Qi, Yuefeng Chen, Xiaodan Li, Ranjie Duan, Shaokai Ye, Yuan He, Hui Xue:
Towards Robust Vision Transformer. CVPR 2022: 12032-12041
[c4]Xiaofeng Mao, Yuefeng Chen, Ranjie Duan, Yao Zhu, Gege Qi, Shaokai Ye, Xiaodan Li, Rong Zhang, Hui Xue:
Enhance the Visual Representation via Discrete Adversarial Training. NeurIPS 2022
[i5]Xiaofeng Mao, Yuefeng Chen, Ranjie Duan, Yao Zhu, Gege Qi, Shaokai Ye, Xiaodan Li, Rong Zhang, Hui Xue:
Enhance the Visual Representation via Discrete Adversarial Training. CoRR abs/2209.07735 (2022)- 2021
[c3]Ranjie Duan, Xiaofeng Mao
, A. Kai Qin, Yuefeng Chen, Shaokai Ye, Yuan He, Yun Yang:
Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink. CVPR 2021: 16062-16071
[c2]Ranjie Duan, Yuefeng Chen, Dantong Niu, Yun Yang, A. Kai Qin
, Yuan He:
AdvDrop: Adversarial Attack to DNNs by Dropping Information. ICCV 2021: 7486-7495
[i4]Ranjie Duan, Xiaofeng Mao, A. Kai Qin, Yun Yang, Yuefeng Chen, Shaokai Ye, Yuan He:
Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink. CoRR abs/2103.06504 (2021)
[i3]Xiaofeng Mao, Gege Qi, Yuefeng Chen, Xiaodan Li, Ranjie Duan, Shaokai Ye, Yuan He, Hui Xue:
Towards Robust Vision Transformer. CoRR abs/2105.07926 (2021)
[i2]Ranjie Duan, Yuefeng Chen, Dantong Niu, Yun Yang, A. Kai Qin, Yuan He:
AdvDrop: Adversarial Attack to DNNs by Dropping Information. CoRR abs/2108.09034 (2021)- 2020
[c1]Ranjie Duan, Xingjun Ma
, Yisen Wang, James Bailey, A. Kai Qin
, Yun Yang:
Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles. CVPR 2020: 997-1005
[i1]Ranjie Duan, Xingjun Ma, Yisen Wang, James Bailey, A. Kai Qin, Yun Yang:
Adversarial Camouflage: Hiding Physical-World Attacks with Natural Styles. CoRR abs/2003.08757 (2020)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-23 00:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







