Picture for Yuanda Wang

Yuanda Wang

DecompileBench: A Comprehensive Benchmark for Evaluating Decompilers in Real-World Scenarios

Add code
May 16, 2025
Viaarxiv icon

GarmentDiffusion: 3D Garment Sewing Pattern Generation with Multimodal Diffusion Transformers

Add code
Apr 30, 2025
Viaarxiv icon

Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation

Add code
Sep 04, 2024
Figure 1 for Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation
Figure 2 for Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation
Figure 3 for Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation
Figure 4 for Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation
Viaarxiv icon

The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs

Add code
Sep 01, 2024
Figure 1 for The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs
Figure 2 for The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs
Figure 3 for The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs
Figure 4 for The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs
Viaarxiv icon

ViC: Virtual Compiler Is All You Need For Assembly Code Search

Add code
Aug 10, 2024
Figure 1 for ViC: Virtual Compiler Is All You Need For Assembly Code Search
Figure 2 for ViC: Virtual Compiler Is All You Need For Assembly Code Search
Figure 3 for ViC: Virtual Compiler Is All You Need For Assembly Code Search
Figure 4 for ViC: Virtual Compiler Is All You Need For Assembly Code Search
Viaarxiv icon

Learning Autonomous Race Driving with Action Mapping Reinforcement Learning

Add code
Jun 21, 2024
Figure 1 for Learning Autonomous Race Driving with Action Mapping Reinforcement Learning
Figure 2 for Learning Autonomous Race Driving with Action Mapping Reinforcement Learning
Figure 3 for Learning Autonomous Race Driving with Action Mapping Reinforcement Learning
Figure 4 for Learning Autonomous Race Driving with Action Mapping Reinforcement Learning
Viaarxiv icon

XuanCe: A Comprehensive and Unified Deep Reinforcement Learning Library

Add code
Dec 25, 2023
Viaarxiv icon

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?

Add code
Dec 10, 2023
Figure 1 for A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Figure 2 for A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Figure 3 for A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Figure 4 for A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
Viaarxiv icon

Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems

Add code
Nov 20, 2023
Figure 1 for Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Figure 2 for Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Figure 3 for Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Figure 4 for Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems
Viaarxiv icon

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection

Add code
Sep 13, 2023
Viaarxiv icon