default search action
Weiran Lin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Jiameng Li, Zhen Chen, Weiran Lin, Liangjun Zou, Xin Xie, Yaodong Hu, Dianmo Li:
Mystery Game Script Compose Based on a Large Language Model. AIIoT 2024: 451-455 - [c7]Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Ariel Herbert-Voss, Cort B. Breuer, Andy Zou, Mantas Mazeika, Zifan Wang, Palash Oswal, Weiran Lin, Adam A. Hunt, Justin Tienken-Harder, Kevin Y. Shih, Kemper Talley, John Guan, Ian Steneker, David Campbell, Brad Jokubaitis, Steven Basart, Stephen Fitz, Ponnurangam Kumaraguru, Kallol Krishna Karmakar, Uday Kiran Tupakula, Vijay Varadharajan, Yan Shoshitaishvili, Jimmy Ba, Kevin M. Esvelt, Alexandr Wang, Dan Hendrycks:
The WMDP Benchmark: Measuring and Reducing Malicious Use with Unlearning. ICML 2024 - [c6]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. NDSS 2024 - [i4]Weiran Lin, Anna Gerchanovsky, Omer Akgul, Lujo Bauer, Matt Fredrikson, Zifan Wang:
Sales Whisperer: A Human-Inconspicuous Attack on LLM Brand Recommendations. CoRR abs/2406.04755 (2024) - 2023
- [c5]Keane Lucas, Samruddhi Pai, Weiran Lin, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Adversarial Training for Raw-Binary Malware Classifiers. USENIX Security Symposium 2023: 1163-1180 - [i3]Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Group-based Robustness: A General Framework for Customized Robustness in the Real World. CoRR abs/2306.16614 (2023) - [i2]Mingzhang Yin, Ruijiang Gao, Weiran Lin, Steven M. Shugan:
Nonparametric Discrete Choice Experiments with Machine Learning Guided Adaptive Design. CoRR abs/2310.12026 (2023) - 2022
- [c4]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. ICML 2022: 13405-13430 - 2021
- [i1]Weiran Lin, Keane Lucas, Lujo Bauer, Michael K. Reiter, Mahmood Sharif:
Constrained Gradient Descent: A Powerful and Principled Evasion Attack Against Neural Networks. CoRR abs/2112.14232 (2021) - 2020
- [j4]Xueyong Yu, Weiran Lin, Jinling Wei, Shuoping Wang, Haifeng Ke:
Optimization Design of Oven Shape Based on Heat Distribution Model. J. Adv. Comput. Intell. Intell. Informatics 24(4): 494-501 (2020)
2010 – 2019
- 2018
- [j3]Wen Zhang, Xiang Yue, Weiran Lin, Wenjian Wu, Ruoqi Liu, Feng Huang, Feng Liu:
Predicting drug-disease associations by using similarity constrained matrix factorization. BMC Bioinform. 19(1): 233:1-233:12 (2018) - 2017
- [c3]Wen Zhang, Xiang Yue, Yanlin Chen, Weiran Lin, Bolin Li, Feng Liu, Xiaohong Li:
Predicting drug-disease associations based on the known association bipartite network. BIBM 2017: 503-509 - 2016
- [j2]Hui Cui, Xiuying Wang, Weiran Lin, Jianlong Zhou, Stefan Eberl, Dagan Feng, Michael J. Fulham:
Primary lung tumor segmentation from PET-CT volumes with spatial-topological constraint. Int. J. Comput. Assist. Radiol. Surg. 11(1): 19-29 (2016)
2000 – 2009
- 2001
- [j1]Weiran Lin, Soo Ngee Koh, Xiao Lin:
An 8.0-/8.4-kbps wideband speech coder based on mixed excitation linear prediction. Signal Process. 81(7): 1437-1448 (2001) - 2000
- [c2]Weiran Lin, Soo Ngee Koh, Xiao Lin:
Mixed excitation linear prediction coding of wideband speech at 8 kbps. ICASSP 2000: 1137-1140
1990 – 1999
- 1999
- [c1]Weiran Lin, Soo Ngee Koh, Xiao Lin:
Wideband speech coding using MELP model. ISSPA 1999: 487-490
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint