default search action
Ren Wang 0008
Person information
- affiliation: University of Michigan, Ann Arbor, MI, USA
- affiliation (Ph.D.): Rensselaer Polytechnic Institute, Troy, NY, USA
Other persons with the same name
- Ren Wang — disambiguation page
- Ren Wang 0001 — Intel Labs, Portland, OR, USA
- Ren Wang 0002 — Southwest Jiaotong University, Chengdu, China
- Ren Wang 0003 — Concordia University, Montreal, Quebec, Canada
- Ren Wang 0004 — University of Illinois at Urbana Champaign, IL, USA
- Ren Wang 0005 — University of Electronic Science and Technology of China, Chengdu, China
- Ren Wang 0006 — Chongqing Technology and Business University, Chongqing, China
- Ren Wang 0007 — University of Science and Technology of China, Hefei, Anhui, China
- Ren Wang 0009 — University of Alberta, Edmonton, Canada
- Ren Wang 0010 — Xi'an Jiaotong University, China
- Ren Wang 0011 — Shandong University of Finance and Economics, Jinan, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Ren Wang, Zhe Xu, Alfred O. Hero III:
Multi-Trigger-Key: Toward Multi-Task Privacy Preserving in Deep Learning. IEEE Access 12: 16939-16950 (2024) - [j7]Wenting Li, Deepjyoti Deka, Ren Wang, Mario Roberto Arrieta Paternina:
Physics-Constrained Adversarial Training for Neural Networks in Stochastic Power Grids. IEEE Trans. Artif. Intell. 5(3): 1121-1131 (2024) - [c9]Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu:
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency. ICLR 2024 - [i16]Zhiyuan Wang, Jinhao Duan, Chenxi Yuan, Qingyu Chen, Tianlong Chen, Huaxiu Yao, Yue Zhang, Ren Wang, Kaidi Xu, Xiaoshuang Shi:
Word-Sequence Entropy: Towards Uncertainty Estimation in Free-Form Medical Question Answering Applications and Beyond. CoRR abs/2402.14259 (2024) - [i15]Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu:
Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency. CoRR abs/2403.10717 (2024) - [i14]Wei Li, Pin-Yu Chen, Sijia Liu, Ren Wang:
PSBD: Prediction Shift Uncertainty Unlocks Backdoor Detection. CoRR abs/2406.05826 (2024) - [i13]Hanxiao Lu, Zeyu Huang, Ren Wang:
Purification Of Contaminated Convolutional Neural Networks Via Robust Recovery: An Approach with Theoretical Guarantee in One-Hidden-Layer Case. CoRR abs/2407.11031 (2024) - 2023
- [c8]Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu:
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning. SafeAI@AAAI 2023 - [c7]Ren Wang, Yuxuan Li, Sijia Liu:
Exploring Diversified Adversarial Robustness in Neural Networks via Robust Mode Connectivity. CVPR Workshops 2023: 2346-2352 - [c6]Hanxiao Lu, Zeyu Huang, Ren Wang:
Enhancing Healthcare Model Trustworthiness Through Theoretically Guaranteed One-Hidden-Layer CNN Purification. TML4H 2023: 122-133 - [i12]Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu:
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning. CoRR abs/2301.08751 (2023) - [i11]Ren Wang, Yuxuan Li, Sijia Liu:
Robust Mode Connectivity-Oriented Adversarial Defense: Enhancing Neural Network Robustness Against Diversified 𝓁p Attacks. CoRR abs/2303.10225 (2023) - [i10]Ren Wang, Ming Zhong, Kaidi Xu, Lola Giráldez Sánchez-Cortés, Ignacio de Cominges Guerra:
PINNs-Based Uncertainty Quantification for Transient Stability Analysis. CoRR abs/2311.12947 (2023) - 2022
- [j6]Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Alnawaz Rehemtulla, Indika Rajapakse, Alfred O. Hero III:
RAILS: A Robust Adversarial Immune-Inspired Learning System. IEEE Access 10: 22061-22078 (2022) - [j5]Ren Wang, Tianqi Chen, Philip Yao, Sijia Liu, Indika Rajapakse, Alfred O. Hero III:
ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense. IEEE Access 10: 103074-103088 (2022) - 2021
- [c5]Ren Wang, Tianqi Chen, Zhe Xu, Pengzhi Gao:
Robust Low-Rank Tensor Recovery From Quantized and Corrupted Measurements. ACSCC 2021: 1656-1660 - [c4]Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang:
On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning. ICLR 2021 - [i9]Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang:
On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning. CoRR abs/2102.10454 (2021) - [i8]Ren Wang, Tianqi Chen, Philip Yao, Sijia Liu, Indika Rajapakse, Alfred O. Hero III:
ASK: Adversarial Soft k-Nearest Neighbor Attack and Defense. CoRR abs/2106.14300 (2021) - [i7]Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Alnawaz Rehemtulla, Indika Rajapakse, Alfred O. Hero III:
RAILS: A Robust Adversarial Immune-inspired Learning System. CoRR abs/2107.02840 (2021) - [i6]Ren Wang, Tianqi Chen, Stephen Lindsly, Cooper Stansbury, Indika Rajapakse, Alfred Olivier Hero:
Immuno-mimetic Deep Neural Networks (Immuno-Net). CoRR abs/2107.02842 (2021) - [i5]Ren Wang, Tianqi Chen:
Deep Adversarially-Enhanced k-Nearest Neighbors. CoRR abs/2108.06797 (2021) - [i4]Ren Wang, Zhe Xu, Alfred O. Hero III:
Multi-Trigger-Key: Towards Multi-Task Privacy Preserving In Deep Learning. CoRR abs/2110.03106 (2021) - 2020
- [j4]Ren Wang, Meng Wang, Jinjun Xiong:
Achieve data privacy and clustering accuracy simultaneously through quantized data recovery. EURASIP J. Adv. Signal Process. 2020(1): 22 (2020) - [j3]Ren Wang, Meng Wang, Jinjun Xiong:
Tensor recovery from noisy and multi-level quantized measurements. EURASIP J. Adv. Signal Process. 2020(1): 41 (2020) - [c3]Ren Wang, Meng Wang, Jinjun Xiong:
Quantized Higher-Order Tensor Recovery by Exploring Low-Dimensional Structures. ACSSC 2020: 923-928 - [c2]Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, Meng Wang:
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases. ECCV (23) 2020: 222-238 - [i3]Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, Meng Wang:
Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases. CoRR abs/2007.15802 (2020) - [i2]Ren Wang, Tianqi Chen, Stephen Lindsly, Alnawaz Rehemtulla, Alfred O. Hero III, Indika Rajapakse:
RAILS: A Robust Adversarial Immune-inspired Learning System. CoRR abs/2012.10485 (2020)
2010 – 2019
- 2019
- [i1]Ren Wang, Meng Wang, Jinjun Xiong:
Tensor Recovery from Noisy and Multi-Level Quantized Measurements. CoRR abs/1912.02588 (2019) - 2018
- [j2]Ren Wang, Meng Wang, Jinjun Xiong:
Data Recovery and Subspace Clustering From Quantized and Corrupted Measurements. IEEE J. Sel. Top. Signal Process. 12(6): 1547-1560 (2018) - [j1]Pengzhi Gao, Ren Wang, Meng Wang, Joe H. Chow:
Low-Rank Matrix Recovery From Noisy, Quantized, and Erroneous Measurements. IEEE Trans. Signal Process. 66(11): 2918-2932 (2018) - 2016
- [c1]Pengzhi Gao, Ren Wang, Meng Wang, Joe H. Chow:
Low-rank matrix recovery from quantized and erroneous measurements: Accuracy-preserved data privatization in power grids. ACSSC 2016: 374-378
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint