Universal adversarial attack on attention and the resulting dataset damagenet S Chen, Z He, C Sun, J Yang, X Huang IEEE Transactions on Pattern Analysis and Machine Intelligence 44 (4), 2188-2197, 2022 | 112* | 2022 |
Subspace adversarial training T Li, Y Wu, S Chen, K Fang, X Huang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 63 | 2022 |
Adversarial Attack on Attackers: Post-Process to Mitigate Black-Box Score-Based Query Attacks S Chen, Z Huang, Q Tao, Y Wu, C Xie, X Huang Annual Conference on Neural Information Processing Systems (NeurIPS), 2022 | 23 | 2022 |
One-pixel shortcut: on the learning preference of deep neural networks S Wu*, S Chen*, C Xie, X Huang International Conference on Learning Representations (ICLR), Spotlight, 2023 | 22 | 2023 |
Jatmo: Prompt injection defense by task-specific finetuning J Piet, M Alrashed, C Sitawarin, S Chen, Z Wei, E Sun, B Alomair, ... arXiv preprint arXiv:2312.17673, 2023 | 21 | 2023 |
Self-Ensemble Protection: Training Checkpoints Are Good Data Protectors S Chen, G Yuan, X Cheng, Y Gong, M Qin, Y Wang, X Huang International Conference on Learning Representations (ICLR), 2023 | 18 | 2023 |
Relevance attack on detectors S Chen, F He, X Huang, K Zhang Pattern Recognition 124, 108491, 2022 | 17 | 2022 |
StruQ: Defending against prompt injection with structured queries S Chen, J Piet, C Sitawarin, D Wagner arXiv preprint arXiv:2402.06363, 2024 | 15 | 2024 |
Colonoscopic image synthesis for polyp detector enhancement via gan and adversarial training F He, S Chen, S Li, L Zhou, H Zhang, H Peng, X Huang 2021 IEEE 18th International Symposium on Biomedical Imaging (ISBI), 1887-1891, 2021 | 12 | 2021 |
Can LLMs Follow Simple Rules? N Mu, S Chen, Z Wang, S Chen, D Karamardian, L Aljeraisy, D Hendrycks, ... arXiv preprint arXiv:2311.04235, 2023 | 9 | 2023 |
Type I attack for generative models C Sun, S Chen, J Cai, X Huang 2020 IEEE international conference on image processing (ICIP), 593-597, 2020 | 9 | 2020 |
Double backpropagation for training autoencoders against adversarial attack C Sun, S Chen, X Huang arXiv preprint arXiv:2003.01895, 2020 | 8 | 2020 |
Query Attack by Multi-Identity Surrogates S Chen, Z Huang, Q Tao, X Huang IEEE Transactions on Artificial Intelligence 5 (2), 684-697, 2023 | 5 | 2023 |
Measuring the Transferability of ℓ∞ Attacks by the ℓ2 Norm S Chen, Q Tao, Z Ye, X Huang ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 4* | 2023 |
Investigating Catastrophic Overfitting in Fast Adversarial Training: A Self-fitting Perspective Z He, T Li, S Chen, X Huang The IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops …, 2023 | 4 | 2023 |
Unifying gradients to improve real-world robustness for deep networks Y Wu, S Chen, K Fang, X Huang ACM Transactions on Intelligent Systems and Technology (TIST), 2023 | 3 | 2023 |