Zobrazeno 1 - 10
of 216
pro vyhledávání: '"Niu, Wenjia"'
Autor:
Zhang, Qixuan, Wang, Zhifeng, Zhang, Dylan, Niu, Wenjia, Caldwell, Sabrina, Gedeon, Tom, Liu, Yang, Qin, Zhenyue
Vision Large Language Models (VLLMs) are transforming the intersection of computer vision and natural language processing. Nonetheless, the potential of using visual prompts for emotion recognition in these models remains largely unexplored and untap
Externí odkaz:
http://arxiv.org/abs/2410.02244
Nowadays, the open-source software (OSS) ecosystem suffers from security threats of software supply chain (SSC) attacks. Interpreted OSS malware plays a vital role in SSC attacks, as criminals have an arsenal of attack vectors to deceive users into i
Externí odkaz:
http://arxiv.org/abs/2407.08532
Nowadays, attackers target Internet of Things (IoT) devices for security exploitation, and search engines for devices and services compromise user privacy, including IP addresses, open ports, device types, vendors, and products.Typically, application
Externí odkaz:
http://arxiv.org/abs/2406.11515
Autor:
Zhou, Xiaoyan, Liang, Feiran, Xie, Zhaojie, Lan, Yang, Niu, Wenjia, Liu, Jiqiang, Wang, Haining, Li, Qiang
Package managers such as NPM, Maven, and PyPI play a pivotal role in open-source software (OSS) ecosystems, streamlining the distribution and management of various freely available packages. The fine-grained details within software packages can unvei
Externí odkaz:
http://arxiv.org/abs/2404.11467
The open-source software (OSS) ecosystem suffers from various security threats and risks, and malicious packages play a central role in software supply chain (SSC) attacks. Although malware research has a history of over thirty years, less attention
Externí odkaz:
http://arxiv.org/abs/2404.04991
Single-image super-resolution (SR) and multi-frame SR are two ways to super resolve low-resolution images. Single-Image SR generally handles each image independently, but ignores the temporal information implied in continuing frames. Multi-frame SR i
Externí odkaz:
http://arxiv.org/abs/2105.13077
"Feint Attack", as a new type of APT attack, has become the focus of attention. It adopts a multi-stage attacks mode which can be concluded as a combination of virtual attacks and real attacks. Under the cover of virtual attacks, real attacks can ach
Externí odkaz:
http://arxiv.org/abs/1905.03454
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Wang, Yingdi, Niu, Wenjia, Chen, Tong, Xiang, Yingxiao, Liu, Jingjing, Li, Gang, Liu, Jiqiang
With the rapid development of Artificial Intelligence (AI), the problem of AI security has gradually emerged. Most existing machine learning algorithms may be attacked by adversarial examples. An adversarial example is a slightly modified input sampl
Externí odkaz:
http://arxiv.org/abs/1810.08070