Follow
Dongxia Wang
Title
Cited by
Cited by
Year
Towards robust and effective trust management for security: A survey
D Wang, T Muller, Y Liu, J Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
922014
Robot: Robustness-oriented testing for deep learning systems
J Wang, J Chen, Y Sun, X Ma, D Wang, J Sun, P Cheng
2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021
752021
Using Information Theory to Improve the Robustness of Trust Systems.
D Wang, T Muller, AA Irissappane, J Zhang, Y Liu
AAMAS, 791-799, 2015
282015
Prompting frameworks for large language models: A survey
X Liu, J Wang, J Sun, X Yuan, G Dong, P Di, W Wang, D Wang
arXiv preprint arXiv:2311.12785, 2023
262023
RobOT: Robustness-oriented testing for deep learning systems. In 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE)
J Wang, J Chen, Y Sun, X Ma, D Wang, J Sun, P Cheng
IEEE, 300ś311, 2021
202021
Quantifying robustness of trust systems against collusive unfair rating attacks using information theory
D Wang, T Muller, J Zhang, Y Liu
Proceedings of the 24th International Joint Conference on Artificial …, 2015
192015
S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models
X Yuan, J Li, D Wang, Y Chen, X Mao, L Huang, H Xue, W Wang, K Ren, ...
arXiv preprint arXiv:2405.14191, 2024
92024
FairRec: Fairness testing for deep recommender systems
H Guo, J Li, J Wang, X Liu, D Wang, Z Hu, R Zhang, H Xue
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
92023
Information theory for subjective logic
T Muller, D Wang, A Jøsang
Modeling Decisions for Artificial Intelligence: 12th International …, 2015
82015
Multi-source trust revision
J Zhang, D Wang
2017 20th International Conference on Information Fusion (Fusion), 1-8, 2017
72017
Is it harmful when advisors only pretend to be honest?
D Wang, T Muller, J Zhang, Y Liu
Proceedings of the AAAI Conference on Artificial Intelligence 30 (1), 2016
72016
Information theoretical analysis of unfair rating attacks under subjectivity
D Wang, T Muller, J Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 15, 816-828, 2019
62019
How to use information theory to mitigate unfair rating attacks
T Muller, D Wang, Y Liu, J Zhang
Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016 …, 2016
42016
Quantifying and Improving the Robustness of Trust Systems.
D Wang
AAMAS, 1997-1998, 2015
32015
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution
Q Zhou, D Wang, T Li, Z Xu, Y Liu, K Ren, W Wang, Q Guo
arXiv preprint arXiv:2402.03705, 2024
22024
Provably robust decisions based on potentially malicious sources of information
T Muller, D Wang, J Sun
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 411-424, 2020
22020
FAMCF: A few-shot Android malware family classification framework
F Zhou, D Wang, Y Xiong, K Sun, W Wang
Computers & Security 146, 104027, 2024
12024
Understanding Code Changes Practically with Small-Scale Language Models
C Li, Z Xu, P Di, D Wang, Z Li, Q Zheng
Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024
12024
Agents4PLC: Automating Closed-loop PLC Code Generation and Verification in Industrial Control Systems using LLM-based Agents
Z Liu, R Zeng, D Wang, G Peng, J Wang, Q Liu, P Liu, W Wang
arXiv preprint arXiv:2410.14209, 2024
12024
Characterizing and Evaluating the Reliability of LLMs against Jailbreak Attacks
K Chen, Y Liu, D Wang, J Chen, W Wang
arXiv preprint arXiv:2408.09326, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20