Picture for Yuanda Wang

Yuanda Wang

Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation

Add code
Sep 04, 2024
Viaarxiv icon

The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs

Add code
Sep 01, 2024
Viaarxiv icon

ViC: Virtual Compiler Is All You Need For Assembly Code Search

Add code
Aug 10, 2024
Viaarxiv icon

Learning Autonomous Race Driving with Action Mapping Reinforcement Learning

Add code
Jun 21, 2024
Figure 1 for Learning Autonomous Race Driving with Action Mapping Reinforcement Learning
Figure 2 for Learning Autonomous Race Driving with Action Mapping Reinforcement Learning
Figure 3 for Learning Autonomous Race Driving with Action Mapping Reinforcement Learning
Figure 4 for Learning Autonomous Race Driving with Action Mapping Reinforcement Learning
Viaarxiv icon

XuanCe: A Comprehensive and Unified Deep Reinforcement Learning Library

Add code
Dec 25, 2023
Viaarxiv icon

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?

Add code
Dec 10, 2023
Viaarxiv icon

Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems

Add code
Nov 20, 2023
Viaarxiv icon

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection

Add code
Sep 13, 2023
Viaarxiv icon

Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots

Add code
Jul 14, 2023
Viaarxiv icon

VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation

Add code
May 09, 2023
Figure 1 for VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Figure 2 for VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Figure 3 for VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Figure 4 for VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation
Viaarxiv icon