Nattack: Learning the distributions of adversarial examples for an improved black-box attack on deep neural networks Y Li, L Li, L Wang, T Zhang, B Gong International Conference on Machine Learning, 3866-3876, 2019 | 266 | 2019 |
End-to-end video captioning with multitask reinforcement learning L Li, B Gong 2019 IEEE winter conference on applications of computer vision (WACV), 339-348, 2019 | 74 | 2019 |
Action recognition with spatio-temporal augmented descriptor and fusion method L Li, S Dai Multimedia Tools and Applications 76, 13953-13969, 2017 | 12 | 2017 |
Action recognition based on local fisher discriminant analysis and mix encoding L Li, S Dai 2016 International Conference on Virtual Reality and Visualization (ICVRV …, 2016 | 5 | 2016 |
Renderih: A large-scale synthetic dataset for 3d interacting hand pose estimation L Li, L Tian, X Zhang, Q Wang, B Zhang, L Bo, M Liu, C Chen Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 4 | 2023 |
Action Recognition with deep network features and dimension reduction L Li, S Dai KSII Transactions on Internet and Information Systems (TIIS) 13 (2), 832-854, 2019 | 4 | 2019 |
SALAD-Bench: A Hierarchical and Comprehensive Safety Benchmark for Large Language Models L Li, B Dong, R Wang, X Hu, W Zuo, D Lin, Y Qiao, J Shao arXiv preprint arXiv:2402.05044, 2024 | 3 | 2024 |
From GPT-4 to Gemini and Beyond: Assessing the Landscape of MLLMs on Generalizability, Trustworthiness and Causality through Four Modalities C Lu, C Qian, G Zheng, H Fan, H Gao, J Zhang, J Shao, J Deng, J Fu, ... arXiv preprint arXiv:2401.15071, 2024 | 3 | 2024 |
PsySafe: A Comprehensive Framework for Psychological-based Attack, Defense, and Evaluation of Multi-agent System Safety Z Zhang, Y Zhang, L Li, H Gao, L Wang, H Lu, F Zhao, Y Qiao, J Shao arXiv preprint arXiv:2401.11880, 2024 | 1 | 2024 |
Diffhand: End-to-end hand mesh reconstruction via diffusion models L Li, L Zhuo, B Zhang, L Bo, C Chen arXiv preprint arXiv:2305.13705, 2023 | 1 | 2023 |
Nattack: A strong and universal gaussian black-box adversarial attack Y Li, L Li, L Wang, T Zhang, B Gong | 1 | 2018 |
Bayesian neural network approach to hand gesture recognition system L Li, S Dai Proceedings of 2014 IEEE Chinese Guidance, Navigation and Control Conference …, 2014 | 1 | 2014 |
Assessment of Multimodal Large Language Models in Alignment with Human Values Z Shi, Z Wang, H Fan, Z Zhang, L Li, Y Zhang, Z Yin, L Sheng, Y Qiao, ... arXiv preprint arXiv:2403.17830, 2024 | | 2024 |
EasyJailbreak: A Unified Framework for Jailbreaking Large Language Models W Zhou, X Wang, L Xiong, H Xia, Y Gu, M Chai, F Zhu, C Huang, S Dou, ... arXiv preprint arXiv:2403.12171, 2024 | | 2024 |
One-stage Action Detection Transformer L Li, L Zhuo, B Zhang arXiv preprint arXiv:2206.10080, 2022 | | 2022 |
Supplementary Materials for NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks Y Li, L Li, L Wang, T Zhang, B Gong | | |