Picture for Yulin Chen

Yulin Chen

Monitoring Decomposition Attacks in LLMs with Lightweight Sequential Monitors

Add code
Jun 12, 2025
Viaarxiv icon

Efficient Reasoning via Chain of Unconscious Thought

Add code
May 26, 2025
Viaarxiv icon

GuardReasoner-VL: Safeguarding VLMs via Reinforced Reasoning

Add code
May 16, 2025
Viaarxiv icon

Reasoning Models Know When They're Right: Probing Hidden States for Self-Verification

Add code
Apr 07, 2025
Viaarxiv icon

HexPlane Representation for 3D Semantic Scene Understanding

Add code
Mar 07, 2025
Figure 1 for HexPlane Representation for 3D Semantic Scene Understanding
Figure 2 for HexPlane Representation for 3D Semantic Scene Understanding
Figure 3 for HexPlane Representation for 3D Semantic Scene Understanding
Figure 4 for HexPlane Representation for 3D Semantic Scene Understanding
Viaarxiv icon

Label Distribution Learning-Enhanced Dual-KNN for Text Classification

Add code
Mar 06, 2025
Figure 1 for Label Distribution Learning-Enhanced Dual-KNN for Text Classification
Figure 2 for Label Distribution Learning-Enhanced Dual-KNN for Text Classification
Figure 3 for Label Distribution Learning-Enhanced Dual-KNN for Text Classification
Figure 4 for Label Distribution Learning-Enhanced Dual-KNN for Text Classification
Viaarxiv icon

PrivaCI-Bench: Evaluating Privacy with Contextual Integrity and Legal Compliance

Add code
Feb 24, 2025
Viaarxiv icon

GuardReasoner: Towards Reasoning-based LLM Safeguards

Add code
Jan 30, 2025
Figure 1 for GuardReasoner: Towards Reasoning-based LLM Safeguards
Figure 2 for GuardReasoner: Towards Reasoning-based LLM Safeguards
Figure 3 for GuardReasoner: Towards Reasoning-based LLM Safeguards
Figure 4 for GuardReasoner: Towards Reasoning-based LLM Safeguards
Viaarxiv icon

Decoding EEG Speech Perception with Transformers and VAE-based Data Augmentation

Add code
Jan 08, 2025
Viaarxiv icon

Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory

Add code
Aug 19, 2024
Figure 1 for Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory
Figure 2 for Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory
Figure 3 for Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory
Figure 4 for Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory
Viaarxiv icon