default search action
Tianrong Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j6]Fengjun Hu, Fan Wu, Hanjie Gu, Ghulam Abbas, Meshari D. Alanazi, Salwa Othmen, Jingming Wang, Tianrong Zhang:
Transforming Agriculture with Advanced Robotic Decision Systems via Deep Recurrent Learning. Expert Syst. Appl. 259: 125123 (2025) - 2024
- [c12]Ziyi Yin, Muchao Ye, Tianrong Zhang, Jiaqi Wang, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma:
VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models. AAAI 2024: 6755-6763 - [c11]Tianrong Zhang, Zhaohan Xi, Ting Wang, Prasenjit Mitra, Jinghui Chen:
PromptFix: Few-shot Backdoor Removal via Adversarial Prompt Tuning. NAACL-HLT 2024: 3212-3225 - [c10]Haopei Wang, Anubhavnidhi Abhashkumar, Changyu Lin, Tianrong Zhang, Xiaoming Gu, Ning Ma, Chang Wu, Songlin Liu, Wei Zhou, Yongbin Dong, Weirong Jiang, Yi Wang:
NetAssistant: Dialogue Based Network Diagnosis in Data Center Networks. NSDI 2024 - [i5]Ziyi Yin, Muchao Ye, Tianrong Zhang, Jiaqi Wang, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma:
VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models. CoRR abs/2402.11083 (2024) - [i4]Tianrong Zhang, Bochuan Cao, Yuanpu Cao, Lu Lin, Prasenjit Mitra, Jinghui Chen:
WordGame: Efficient & Effective LLM Jailbreak via Simultaneous Obfuscation in Query and Response. CoRR abs/2405.14023 (2024) - [i3]Yuanpu Cao, Tianrong Zhang, Bochuan Cao, Ziyi Yin, Lu Lin, Fenglong Ma, Jinghui Chen:
Personalized Steering of Large Language Models: Versatile Steering Vectors Through Bi-directional Preference Optimization. CoRR abs/2406.00045 (2024) - [i2]Tianrong Zhang, Zhaohan Xi, Ting Wang, Prasenjit Mitra, Jinghui Chen:
PromptFix: Few-shot Backdoor Removal via Adversarial Prompt Tuning. CoRR abs/2406.04478 (2024) - 2023
- [c9]Ziyi Yin, Muchao Ye, Tianrong Zhang, Tianyu Du, Jinguo Zhu, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma:
VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models. NeurIPS 2023 - [c8]Muchao Ye, Ziyi Yin, Tianrong Zhang, Tianyu Du, Jinghui Chen, Ting Wang, Fenglong Ma:
UniT: A Unified Look at Certified Robust Training against Text Adversarial Perturbation. NeurIPS 2023 - [i1]Ziyi Yin, Muchao Ye, Tianrong Zhang, Tianyu Du, Jinguo Zhu, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma:
VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models. CoRR abs/2310.04655 (2023)
2010 – 2019
- 2019
- [c7]Ze Jin, David S. Matteson, Tianrong Zhang:
Independent Component Analysis Based on Mutual Dependence Measures. ICMLA 2019: 573-580 - [c6]Da Yu, Yibo Zhu, Behnaz Arzani, Rodrigo Fonseca, Tianrong Zhang, Karl Deng, Lihua Yuan:
dShark: A General, Easy to Program and Scalable Framework for Analyzing In-network Packet Traces. NSDI 2019: 207-220 - [c5]Cheng Tan, Ze Jin, Chuanxiong Guo, Tianrong Zhang, Haitao Wu, Karl Deng, Dongming Bi, Dong Xiang:
NetBouncer: Active Device and Link Failure Localization in Data Center Networks. NSDI 2019: 599-614 - 2018
- [c4]Tianrong Zhang, Yufeng Xin:
A truthful online auction mechanism for deadline-aware cloud resource allocation. NOMS 2018: 1-9 - 2017
- [j5]Rebecca Lovewell, Qianwen Yin, Tianrong Zhang, Jasleen Kaur, Frank Donelson Smith:
Packet-Scale Congestion Control Paradigm. IEEE/ACM Trans. Netw. 25(1): 306-319 (2017) - 2016
- [j4]Fan Wu, Tianrong Zhang, Chunming Qiao, Guihai Chen:
A Strategy-Proof Auction Mechanism for Adaptive-Width Channel Allocation in Wireless Networks. IEEE J. Sel. Areas Commun. 34(10): 2678-2689 (2016) - 2015
- [j3]Tianrong Zhang, Yufeng Xin:
Towards Designing a Truthful Online Auction Framework for Deadline-aware Cloud Resource Allocation. SIGMETRICS Perform. Evaluation Rev. 43(3): 30-33 (2015) - [j2]Fan Wu, Kai Gong, Tianrong Zhang, Guihai Chen, Chunming Qiao:
COMO: A Game-Theoretic Approach for Joint Multirate Opportunistic Routing and Forwarding in Non-Cooperative Wireless Networks. IEEE Trans. Wirel. Commun. 14(2): 948-959 (2015) - 2014
- [j1]Zuying Wei, Tianrong Zhang, Fan Wu, Xiaofeng Gao, Guihai Chen, Ping Yi:
A truthful auction mechanism for channel allocation in multi-radio, multi-channel non-cooperative wireless networks. Pers. Ubiquitous Comput. 18(4): 925-937 (2014) - [c3]Tianrong Zhang, Fan Wu:
Stimulating traffic information transfer in non-cooperative vehicular ad hoc networks. IWCMC 2014: 225-230 - 2013
- [c2]Tianrong Zhang, Fan Wu, Chunming Qiao:
SPECIAL: A strategy-proof and Efficient multi-channel Auction mechanism for wireless networks. INFOCOM 2013: 525-529 - 2012
- [c1]Zuying Wei, Tianrong Zhang, Fan Wu, Guihai Chen, Xiaofeng Gao:
SHIELD: A Strategy-Proof and Highly Efficient Channel Auction Mechanism for Multi-radio Wireless Networks. WASA 2012: 72-87
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint