Picture for Chejian Xu

Chejian Xu

AdvWeb: Controllable Black-box Attacks on VLM-powered Web Agents

Add code
Oct 22, 2024
Viaarxiv icon

EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage

Add code
Sep 17, 2024
Figure 1 for EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage
Figure 2 for EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage
Figure 3 for EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage
Figure 4 for EIA: Environmental Injection Attack on Generalist Web Agents for Privacy Leakage
Viaarxiv icon

ChatScene: Knowledge-Enabled Safety-Critical Scenario Generation for Autonomous Vehicles

Add code
May 22, 2024
Viaarxiv icon

KnowHalu: Hallucination Detection via Multi-Form Knowledge Based Factual Checking

Add code
Apr 03, 2024
Viaarxiv icon

COMMIT: Certifying Robustness of Multi-Sensor Fusion Systems against Semantic Attacks

Add code
Mar 04, 2024
Viaarxiv icon

DecodingTrust: A Comprehensive Assessment of Trustworthiness in GPT Models

Add code
Jun 20, 2023
Viaarxiv icon

SafeBench: A Benchmarking Platform for Safety Evaluation of Autonomous Vehicles

Add code
Jun 20, 2022
Figure 1 for SafeBench: A Benchmarking Platform for Safety Evaluation of Autonomous Vehicles
Figure 2 for SafeBench: A Benchmarking Platform for Safety Evaluation of Autonomous Vehicles
Figure 3 for SafeBench: A Benchmarking Platform for Safety Evaluation of Autonomous Vehicles
Figure 4 for SafeBench: A Benchmarking Platform for Safety Evaluation of Autonomous Vehicles
Viaarxiv icon

SemAttack: Natural Textual Attacks via Different Semantic Spaces

Add code
May 16, 2022
Figure 1 for SemAttack: Natural Textual Attacks via Different Semantic Spaces
Figure 2 for SemAttack: Natural Textual Attacks via Different Semantic Spaces
Figure 3 for SemAttack: Natural Textual Attacks via Different Semantic Spaces
Figure 4 for SemAttack: Natural Textual Attacks via Different Semantic Spaces
Viaarxiv icon

Copy Motion From One to Another: Fake Motion Video Generation

Add code
May 03, 2022
Figure 1 for Copy Motion From One to Another: Fake Motion Video Generation
Figure 2 for Copy Motion From One to Another: Fake Motion Video Generation
Figure 3 for Copy Motion From One to Another: Fake Motion Video Generation
Figure 4 for Copy Motion From One to Another: Fake Motion Video Generation
Viaarxiv icon

COPA: Certifying Robust Policies for Offline Reinforcement Learning against Poisoning Attacks

Add code
Mar 16, 2022
Figure 1 for COPA: Certifying Robust Policies for Offline Reinforcement Learning against Poisoning Attacks
Figure 2 for COPA: Certifying Robust Policies for Offline Reinforcement Learning against Poisoning Attacks
Figure 3 for COPA: Certifying Robust Policies for Offline Reinforcement Learning against Poisoning Attacks
Figure 4 for COPA: Certifying Robust Policies for Offline Reinforcement Learning against Poisoning Attacks
Viaarxiv icon