Author of the publication

Securing Biomedical Images from Unauthorized Training with Anti-Learning Perturbation.

, , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Biomedical Images from Unauthorized Training with Anti-Learning Perturbation., , , and . CoRR, (2023)Coverage Algorithm Based on Perceived Environment Around Nodes in Mobile Wireless Sensor Networks., and . Wirel. Pers. Commun., 128 (4): 2725-2740 (February 2023)BadGPT: Exploring Security Vulnerabilities of ChatGPT via Backdoor Attacks to InstructGPT., , , and . CoRR, (2023)Surfer100: Generating Surveys From Web Resources on Wikipedia-style., , , , , , , , , and . CoRR, (2021)Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise., , , and . CoRR, (2023)DocMath-Eval: Evaluating Numerical Reasoning Capabilities of LLMs in Understanding Long Documents with Tabular Data., , , , , , , , , and . CoRR, (2023)ODSum: New Benchmarks for Open Domain Multi-Document Summarization., , , , , and . CoRR, (2023)On Improving Summarization Factual Consistency from Natural Language Feedback., , , , , and . CoRR, (2022)CLICKER: A Computational LInguistics Classification Scheme for Educational Resources., , , , , , , , , and 4 other author(s). CoRR, (2021)MetaTool Benchmark for Large Language Models: Deciding Whether to Use Tools and Which to Use., , , , , , , , , and 1 other author(s). CoRR, (2023)