default search action
Ruoxi Chen
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng, Shilian Zheng, Xiaoniu Yang, Xing Yang:
AdvCheck: Characterizing adversarial examples via local gradient checking. Comput. Secur. 136: 103540 (2024) - [j7]Jinyin Chen, Zhiqi Cao, Ruoxi Chen, Haibin Zheng, Xiao Li, Qi Xuan, Xing Yang:
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation. Comput. Secur. 146: 104041 (2024) - [c5]Haibo Jin, Ruoxi Chen, Jinyin Chen, Haibin Zheng, Yang Zhang, Haohan Wang:
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path Fuzzing. ECCV (47) 2024: 90-106 - [c4]Ruoxi Chen, Haibo Jin, Yixin Liu, Jinyin Chen, Haohan Wang, Lichao Sun:
EditShield: Protecting Unauthorized Image Editing by Instruction-Guided Diffusion Models. ECCV (63) 2024: 126-142 - [c3]Dongping Chen, Ruoxi Chen, Shilin Zhang, Yaochen Wang, Yinuo Liu, Huichi Zhou, Qihui Zhang, Yao Wan, Pan Zhou, Lichao Sun:
MLLM-as-a-Judge: Assessing Multimodal LLM-as-a-Judge with Vision-Language Benchmark. ICML 2024 - [i11]Haibo Jin, Ruoxi Chen, Andy Zhou, Jinyin Chen, Yang Zhang, Haohan Wang:
GUARD: Role-playing to Generate Natural-language Jailbreakings to Test Guideline Adherence of Large Language Models. CoRR abs/2402.03299 (2024) - [i10]Dongping Chen, Ruoxi Chen, Shilin Zhang, Yinuo Liu, Yaochen Wang, Huichi Zhou, Qihui Zhang, Pan Zhou, Yao Wan, Lichao Sun:
MLLM-as-a-Judge: Assessing Multimodal LLM-as-a-Judge with Vision-Language Benchmark. CoRR abs/2402.04788 (2024) - [i9]Yixin Liu, Kai Zhang, Yuan Li, Zhiling Yan, Chujie Gao, Ruoxi Chen, Zhengqing Yuan, Yue Huang, Hanchi Sun, Jianfeng Gao, Lifang He, Lichao Sun:
Sora: A Review on Background, Technology, Limitations, and Opportunities of Large Vision Models. CoRR abs/2402.17177 (2024) - [i8]Zhengqing Yuan, Ruoxi Chen, Zhaoxu Li, Haolong Jia, Lifang He, Chi Wang, Lichao Sun:
Mora: Enabling Generalist Video Generation via A Multi-Agent Framework. CoRR abs/2403.13248 (2024) - [i7]Yixin Liu, Ruoxi Chen, Lichao Sun:
Investigating and Defending Shortcut Learning in Personalized Diffusion Models. CoRR abs/2406.18944 (2024) - 2023
- [j6]Haibo Jin, Ruoxi Chen, Haibin Zheng, Jinyin Chen, Yao Cheng, Yue Yu, Tieming Chen, Xianglong Liu:
Excitement surfeited turns to errors: Deep learning testing framework based on excitable neurons. Inf. Sci. 637: 118936 (2023) - [j5]Jinyin Chen, Chengyu Jia, Haibin Zheng, Ruoxi Chen, Chenbo Fu:
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-Modal Fake News Detection. IEEE Trans. Netw. Sci. Eng. 10(6): 3144-3158 (2023) - [c2]Qinying Liu, Zilei Wang, Ruoxi Chen, Zhilin Li:
Unleashing the Potential of Adjacent Snippets for Weakly-supervised Temporal Action Localization. ICME 2023: 1032-1037 - [i6]Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng:
AdvCheck: Characterizing Adversarial Examples via Local Gradient Checking. CoRR abs/2303.18131 (2023) - [i5]Ruoxi Chen, Haibo Jin, Jinyin Chen, Lichao Sun:
EditShield: Protecting Unauthorized Image Editing by Instruction-guided Diffusion Models. CoRR abs/2311.12066 (2023) - 2022
- [j4]Ruoxi Chen, Jinyin Chen, Haibin Zheng, Qi Xuan, Zhaoyan Ming, Wenrong Jiang, Chen Cui:
Salient feature extractor for adversarial defense on deep neural networks. Inf. Sci. 600: 118-143 (2022) - [i4]Haibo Jin, Ruoxi Chen, Haibin Zheng, Jinyin Chen, Zhenguang Liu, Qi Xuan, Yue Yu, Yao Cheng:
DeepSensor: Deep Learning Testing Framework Based on Neuron Sensitivity. CoRR abs/2202.07464 (2022) - [i3]Qinying Liu, Zilei Wang, Ruoxi Chen, Zhilin Li:
Convex Combination Consistency between Neighbors for Weakly-supervised Action Localization. CoRR abs/2205.00400 (2022) - [i2]Jinyin Chen, Chengyu Jia, Haibin Zheng, Ruoxi Chen, Chenbo Fu:
Is Multi-Modal Necessarily Better? Robustness Evaluation of Multi-modal Fake News Detection. CoRR abs/2206.08788 (2022) - 2021
- [j3]Jinyin Chen, Haibin Zheng, Hui Xiong, Ruoxi Chen, Tianyu Du, Zhen Hong, Shouling Ji:
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique. Comput. Secur. 104: 102220 (2021) - [j2]Zhuo Chen, Ruoxi Chen, Songtao Chen:
Intelligent management information system of urban planning based on GIS. J. Intell. Fuzzy Syst. 40(4): 6007-6016 (2021) - [i1]Jinyin Chen, Ruoxi Chen, Haibin Zheng, Zhaoyan Ming, Wenrong Jiang, Chen Cui:
Salient Feature Extractor for Adversarial Defense on Deep Neural Networks. CoRR abs/2105.06807 (2021) - 2020
- [j1]Jinyin Chen, Haibin Zheng, Ruoxi Chen, Hui Xiong:
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours. Comput. Secur. 96: 101916 (2020)
2010 – 2019
- 2019
- [c1]Jingye Wang, Zhihua Chen, Ping Li, Bin Sheng, Ruoxi Chen:
Real-Time Non-Motor Vehicle Violation Detection in Traffic Scenes. ICPS 2019: 724-728
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint