Towards robust and effective trust management for security: A survey D Wang, T Muller, Y Liu, J Zhang 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 92 | 2014 |
Robot: Robustness-oriented testing for deep learning systems J Wang, J Chen, Y Sun, X Ma, D Wang, J Sun, P Cheng 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 75 | 2021 |
Using Information Theory to Improve the Robustness of Trust Systems. D Wang, T Muller, AA Irissappane, J Zhang, Y Liu AAMAS, 791-799, 2015 | 28 | 2015 |
Prompting frameworks for large language models: A survey X Liu, J Wang, J Sun, X Yuan, G Dong, P Di, W Wang, D Wang arXiv preprint arXiv:2311.12785, 2023 | 26 | 2023 |
RobOT: Robustness-oriented testing for deep learning systems. In 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE) J Wang, J Chen, Y Sun, X Ma, D Wang, J Sun, P Cheng IEEE, 300ś311, 2021 | 20 | 2021 |
Quantifying robustness of trust systems against collusive unfair rating attacks using information theory D Wang, T Muller, J Zhang, Y Liu Proceedings of the 24th International Joint Conference on Artificial …, 2015 | 19 | 2015 |
S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models X Yuan, J Li, D Wang, Y Chen, X Mao, L Huang, H Xue, W Wang, K Ren, ... arXiv preprint arXiv:2405.14191, 2024 | 9 | 2024 |
FairRec: Fairness testing for deep recommender systems H Guo, J Li, J Wang, X Liu, D Wang, Z Hu, R Zhang, H Xue Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 9 | 2023 |
Information theory for subjective logic T Muller, D Wang, A Jøsang Modeling Decisions for Artificial Intelligence: 12th International …, 2015 | 8 | 2015 |
Multi-source trust revision J Zhang, D Wang 2017 20th International Conference on Information Fusion (Fusion), 1-8, 2017 | 7 | 2017 |
Is it harmful when advisors only pretend to be honest? D Wang, T Muller, J Zhang, Y Liu Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016 | 7 | 2016 |
Information theoretical analysis of unfair rating attacks under subjectivity D Wang, T Muller, J Zhang, Y Liu IEEE Transactions on Information Forensics and Security 15, 816-828, 2019 | 6 | 2019 |
How to use information theory to mitigate unfair rating attacks T Muller, D Wang, Y Liu, J Zhang Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016 …, 2016 | 4 | 2016 |
Quantifying and Improving the Robustness of Trust Systems. D Wang AAMAS, 1997-1998, 2015 | 3 | 2015 |
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution Q Zhou, D Wang, T Li, Z Xu, Y Liu, K Ren, W Wang, Q Guo arXiv preprint arXiv:2402.03705, 2024 | 2 | 2024 |
Provably robust decisions based on potentially malicious sources of information T Muller, D Wang, J Sun 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 411-424, 2020 | 2 | 2020 |
FAMCF: A few-shot Android malware family classification framework F Zhou, D Wang, Y Xiong, K Sun, W Wang Computers & Security 146, 104027, 2024 | 1 | 2024 |
Understanding Code Changes Practically with Small-Scale Language Models C Li, Z Xu, P Di, D Wang, Z Li, Q Zheng Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024 | 1 | 2024 |
Agents4PLC: Automating Closed-loop PLC Code Generation and Verification in Industrial Control Systems using LLM-based Agents Z Liu, R Zeng, D Wang, G Peng, J Wang, Q Liu, P Liu, W Wang arXiv preprint arXiv:2410.14209, 2024 | 1 | 2024 |
Characterizing and Evaluating the Reliability of LLMs against Jailbreak Attacks K Chen, Y Liu, D Wang, J Chen, W Wang arXiv preprint arXiv:2408.09326, 2024 | 1 | 2024 |