Discovery - Top 10
By people
HKU Organizations
- 261 hku musketeers foundation institu...
- 14 faculty of engineering
- 13 school of computing and data science
- 5 department of electrical and elec...
- 3 department of mathematics
- 3 faculty of science
- 3 faculty of social sciences
- 2 department of geography
- 2 school of biological sciences
- 1 department of family medicine and...
Browse
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 261
Title | Author(s) | Issue Date | |
---|---|---|---|
SkillDiffuser: Interpretable Hierarchical Planning via Skill Abstractions in Diffusion-Based Task Execution Proceeding/Conference:2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (17/06/2024-21/06/2024, Seattle) | 17-Jun-2024 | ||
Valkyrie: Improving Fuzzing Performance Through Deterministic Techniques Proceeding/Conference:IEEE International Conference on Software Quality, Reliability and Security, QRS | 2022 | ||
MHCN: A Hyperbolic Neural Network Model for Multi-view Hierarchical Clustering Proceeding/Conference:Proceedings of the IEEE International Conference on Computer Vision | 2023 | ||
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly Proceeding/Conference:Advances in Neural Information Processing Systems | 2023 | ||
Improving Adversarial Transferability via Intermediate-level Perturbation Decay Proceeding/Conference:Advances in Neural Information Processing Systems | 2023 | ||
Hopper: Interpretative Fuzzing for Libraries Proceeding/Conference:CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security | 2023 | ||
Understanding Programs by Exploiting (Fuzzing) Test Cases Proceeding/Conference:Proceedings of the Annual Meeting of the Association for Computational Linguistics | 2023 | ||
MAKING SUBSTITUTE MODELS MORE BAYESIAN CAN ENHANCE TRANSFERABILITY OF ADVERSARIAL EXAMPLES Proceeding/Conference:11th International Conference on Learning Representations, ICLR 2023 | 2023 | ||
Backpropagating linearly improves transferability of adversarial examples Proceeding/Conference:Advances in Neural Information Processing Systems | 2020 | ||
Practical no-box adversarial attacks against DNNs Proceeding/Conference:Advances in Neural Information Processing Systems | 2020 | ||
Integrity: Finding integer errors by targeted fuzzing Proceeding/Conference:Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | 2020 | ||
StyleCAPTCHA: CAPTCHA Based on Stylized Images to Defend against Deep Networks Proceeding/Conference:FODS 2020 - Proceedings of the 2020 ACM-IMS Foundations of Data Science Conference | 2020 | ||
iPhish: Phishing vulnerabilities on consumer electronics Proceeding/Conference:Usability, Psychology, and Security, UPSEC 2008 | 2008 | ||
Task-optimized User Clustering based on Mobile App Usage for Cold-start Recommendations Proceeding/Conference:Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining | 2022 | ||
FOOLING DETECTION ALONE IS NOT ENOUGH: ADVERSARIAL ATTACK AGAINST MULTIPLE OBJECT TRACKING Proceeding/Conference:8th International Conference on Learning Representations, ICLR 2020 | 2020 | ||
Yet Another Intermediate-Level Attack Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2020 | ||
Explore the Transformation Space for Adversarial Images Proceeding/Conference:CODASPY 2020 - Proceedings of the 10th ACM Conference on Data and Application Security and Privacy | 2020 | ||
Informer: Irregular traffic detection for containerized microservices RPC in the real world Proceeding/Conference:Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019 | 2019 | ||
Matryoshka: Fuzzing deeply nested branches Proceeding/Conference:Proceedings of the ACM Conference on Computer and Communications Security | 2019 | ||
Angora: Efficient Fuzzing by Principled Search Proceeding/Conference:Proceedings - IEEE Symposium on Security and Privacy | 2018 |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 261