Author of the publication

On the Exploitability of Reinforcement Learning with Human Feedback for Large Language Models.

, , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving., , , , , , , , and . ACM Conference on Computer and Communications Security, page 2267-2281. ACM, (2019)Spatially Transformed Adversarial Examples., , , , , and . ICLR (Poster), OpenReview.net, (2018)Generating Adversarial Examples with Adversarial Networks., , , , , and . IJCAI, page 3905-3911. ijcai.org, (2018)CSI: Enhancing the Robustness of 3D Point Cloud Recognition against Corruption., , and . CoRR, (2023)PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition., , , , and . CoRR, (2022)VoxFormer: Sparse Voxel Transformer for Camera-Based 3D Semantic Scene Completion., , , , , , , and . CVPR, page 9087-9098. IEEE, (2023)Exploring the Limits of Domain-Adaptive Training for Detoxifying Large-Scale Language Models., , , , , , , , and . NeurIPS, (2022)RelViT: Concept-guided Vision Transformer for Visual Relational Reasoning., , , , , , , and . ICLR, OpenReview.net, (2022)Understanding The Robustness in Vision Transformers., , , , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 27378-27394. PMLR, (2022)Semantic Adversarial Attacks via Diffusion Models., , , , , and . BMVC, page 271. BMVA Press, (2023)