Traditional adversarial attacks concentrate on manipulating clean exampl...
In light of the challenges and costs of real-world testing, autonomous
v...
Diffusion models have been leveraged to perform adversarial purification...
Instruction tuning is an effective technique to align large language mod...
In recent years, differential privacy has seen significant advancements ...
Perception is crucial in the realm of autonomous driving systems, where
...
We introduce Voyager, the first LLM-powered embodied lifelong learning a...
With the emergence of more powerful large language models (LLMs), such a...
Language models are often at risk of diverse backdoor attacks, especiall...
Instruction-tuned models are trained on crowdsourcing datasets with task...
Textual backdoor attack, as a novel attack model, has been shown to be
e...
Textual backdoor attacks pose a practical threat to existing systems, as...
Large decoder-only language models (LMs) can be largely improved in term...
In this work, we present a data poisoning attack that confounds machine
...
Deep neural networks are proven to be vulnerable to backdoor attacks.
De...
Recent vision-language models have shown impressive multi-modal generati...
Deep learning models have been widely used in commercial acoustic system...
Humans can easily imagine the complete 3D geometry of occluded objects a...
Personalized Federated Learning (pFL) has emerged as a promising solutio...
Augmenting pretrained language models (LMs) with a vision encoder (e.g.,...
Diffusion models have been recently employed to improve certified robust...
Trajectory prediction is essential for autonomous vehicles (AVs) to plan...
Pre-trained vision-language models (e.g., CLIP) have shown promising
zer...
Generating new molecules with specified chemical and biological properti...
3D Point cloud is becoming a critical data representation in many real-w...
Trajectory prediction using deep neural networks (DNNs) is an essential
...
Transfer learning through the use of pre-trained models has become a gro...
Adversarial purification refers to a class of defense methods that remov...
Recent studies show that Vision Transformers(ViTs) exhibit strong robust...
Reasoning about visual relationships is central to how humans interpret ...
Pre-trained language models (LMs) are shown to easily generate toxic
lan...
Data augmentation is a simple yet effective way to improve the robustnes...
Auditing trained deep learning (DL) models prior to deployment is vital ...
Transformers have achieved success in both language and vision domains.
...
In Autonomous Driving (AD) systems, perception is both security and safe...
The open-world deployment of Machine Learning (ML) algorithms in
safety-...
Deep Reinforcement Learning (DRL) is vulnerable to small adversarial
per...
Deep reinforcement learning (DRL) has achieved great success in various
...
In Autonomous Vehicles (AVs), one fundamental pillar is perception, whic...
Deep neural networks (DNNs) are found to be vulnerable against adversari...
Deep neural networks (DNNs) have achieved great success in various
appli...
Training neural networks with verifiable robustness guarantees is
challe...
Recent advances in computing have allowed for the possibility to collect...
Unsupervised node embedding methods (e.g., DeepWalk, LINE, and node2vec)...
Highly expressive models such as deep neural networks (DNNs) have been w...
Deep Neural Networks (DNNs) have been widely applied in various recognit...
Recent studies show that widely used deep neural networks (DNNs) are
vul...
Deep neural networks (DNNs) have been found to be vulnerable to adversar...