Seguir
Ren Wang
Título
Citado por
Citado por
Ano
Practical detection of trojan neural networks: Data-limited and data-free cases
R Wang, G Zhang, S Liu, PY Chen, J Xiong, M Wang
ECCV2020, 2020
1612020
On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning
R Wang, K Xu, S Liu, PY Chen, TW Weng, C Gan, M Wang
The International Conference on Learning Representations (ICLR), 2021
532021
Low-rank matrix recovery from noisy, quantized, and erroneous measurements
P Gao*, R Wang*, M Wang, JH Chow
IEEE Transactions on Signal Processing 66 (11), 2918-2932, 2018
422018
Modelling and solutions of coordinated economic dispatch with wind–hydro–thermal complex power source structure
LB Shi, R Wang, LZ Yao
IET Renewable Power Generation 11 (3), 262-270, 2017
302017
Low-rank matrix recovery from quantized and erroneous measurements: Accuracy-preserved data privatization in power grids
P Gao, R Wang, M Wang, JH Chow
2016 50th Asilomar Conference on Signals, Systems and Computers, 374-378, 2016
132016
Small signal stability analysis with high penetration of grid-connected wind farm of PMSG type considering the wake effect
R Wang, L Shi, L Yao, Y Ni
2014 IEEE PES General Meeting| Conference & Exposition, 1-5, 2014
132014
Data recovery and subspace clustering from quantized and corrupted measurements
R Wang, M Wang, J Xiong
IEEE Journal of Selected Topics in Signal Processing 12 (6), 1547-1560, 2018
102018
Physics-constrained adversarial training for neural networks in stochastic power grids
W Li, D Deka, R Wang, MRA Paternina
IEEE Transactions on Artificial Intelligence 5 (3), 1121-1131, 2023
82023
Rails: A robust adversarial immune-inspired learning system
R Wang, T Chen, S Lindsly, C Stansbury, A Rehemtulla, I Rajapakse, ...
IEEE Access, 2022
72022
Exploring diversified adversarial robustness in neural networks via robust mode connectivity
R Wang, Y Li, S Liu
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
62023
Detecting trojan neural networks
S Liu, PY Chen, JJ Xiong, G Zhang, M Wang, R Wang
US Patent 11,394,742, 2022
62022
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning
S Pal, R Wang, Y Yao, S Liu
The AAAI’s Workshop on Artificial Intelligence Safety, 2023
52023
Ask: Adversarial soft k-nearest neighbor attack and defense
R Wang, T Chen, P Yao, S Liu, I Rajapakse, AO Hero
IEEE Access 10, 103074-103088, 2022
52022
Achieve data privacy and clustering accuracy simultaneously through quantized data recovery
R Wang, M Wang, J Xiong
EURASIP Journal on Advances in Signal Processing 2020 (1), 22, 2020
52020
Physics-constrained backdoor attacks on power system fault localization
J Bai, R Wang, Z Li
IEEE PES General Meeting 2023, 2022
42022
A joint probabilistic analytical model with consideration of wind power and load uncertainties
R Wang, L Shi, Y Liu, J Luo, L Yao
2015 5th International Conference on Electric Utility Deregulation and …, 2015
42015
Securing GNNs: Explanation-Based Identification of Backdoored Training Graphs
J Downer, R Wang, B Wang
arXiv preprint arXiv:2403.18136, 2024
32024
Backdoor secrets unveiled: Identifying backdoor data with optimized scaled prediction consistency
S Pal, Y Yao, R Wang, B Shen, S Liu
International Conference on Learning Representations, 2024
32024
Word-Sequence Entropy: Towards Uncertainty Estimation in Free-Form Medical Question Answering Applications and Beyond
Z Wang, J Duan, C Yuan, Q Chen, T Chen, H Yao, Y Zhang, R Wang, ...
The International Journal of Intelligent Real-Time Automation, 2024
32024
Immuno-mimetic Deep Neural Networks (Immuno-Net)
R Wang, T Chen, S Lindsly, C Stansbury, I Rajapakse, A Hero
ICML-WCB 2021, 2021
32021
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20