Fingerprint
Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
-
Advancing Session-Based Recommendations with Atten-Mixer+: Dynamic and Adaptive Multi-Level Intent Mining
Zhang, P., Guo, J., Li, C., Kang, L., Kim, J., Xu, J., Zhang, X., Zhang, Y., Wang, H. & Kim, S., Aug 19 2025, In: ACM Transactions on Intelligent Systems and Technology. 16, 5, 101.Research output: Contribution to journal › Article › peer-review
Open Access -
An Investigation on LLMs' Visual Understanding Ability Using SVG for Image-Text Bridging
Cai, M., Huang, Z., Li, Y., Ojha, U., Wang, H. & Lee, Y. J., 2025, Proceedings - 2025 IEEE Winter Conference on Applications of Computer Vision, WACV 2025. Institute of Electrical and Electronics Engineers Inc., p. 5377-5386 10 p. (Proceedings - 2025 IEEE Winter Conference on Applications of Computer Vision, WACV 2025).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Approximate Nullspace Augmented Finetuning for Robust Vision Transformers
Liu, H., Singh, A., Li, Y. & Wang, H., 2025, In: Proceedings of Machine Learning Research. 280, p. 1-23 23 p.Research output: Contribution to journal › Conference article › peer-review
-
CatchBackdoor: Backdoor Detection via Critical Trojan Neural Path Fuzzing
Jin, H., Chen, R., Chen, J., Zheng, H., Zhang, Y. & Wang, H., 2025, Computer Vision – ECCV 2024 - 18th European Conference, Proceedings. Leonardis, A., Ricci, E., Roth, S., Russakovsky, O., Sattler, T. & Varol, G. (eds.). Springer, p. 90-106 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15105 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
EditShield: Protecting Unauthorized Image Editing by Instruction-Guided Diffusion Models
Chen, R., Jin, H., Liu, Y., Chen, J., Wang, H. & Sun, L., 2025, Computer Vision – ECCV 2024 - 18th European Conference, Proceedings. Leonardis, A., Ricci, E., Roth, S., Russakovsky, O., Sattler, T. & Varol, G. (eds.). Springer, p. 126-142 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15121 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Press/Media
-
Illinois information sciences researchers develop AI safety testing methods
8/12/25
1 Media contribution
Press/Media: Research