Picture for Weiping Wen

Weiping Wen

ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models

Add code
Nov 17, 2025
Figure 1 for ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models
Figure 2 for ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models
Figure 3 for ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models
Figure 4 for ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models
Viaarxiv icon

SPBA: Utilizing Speech Large Language Model for Backdoor Attacks on Speech Classification Models

Add code
Jun 10, 2025
Viaarxiv icon

Pureformer-VC: Non-parallel Voice Conversion with Pure Stylized Transformer Blocks and Triplet Discriminative Training

Add code
Jun 10, 2025
Viaarxiv icon

EmoAttack: Utilizing Emotional Voice Conversion for Speech Backdoor Attacks on Deep Speech Classification Models

Add code
Sep 06, 2024
Figure 1 for EmoAttack: Utilizing Emotional Voice Conversion for Speech Backdoor Attacks on Deep Speech Classification Models
Figure 2 for EmoAttack: Utilizing Emotional Voice Conversion for Speech Backdoor Attacks on Deep Speech Classification Models
Figure 3 for EmoAttack: Utilizing Emotional Voice Conversion for Speech Backdoor Attacks on Deep Speech Classification Models
Figure 4 for EmoAttack: Utilizing Emotional Voice Conversion for Speech Backdoor Attacks on Deep Speech Classification Models
Viaarxiv icon

Pureformer-VC: Non-parallel One-Shot Voice Conversion with Pure Transformer Blocks and Triplet Discriminative Training

Add code
Sep 03, 2024
Figure 1 for Pureformer-VC: Non-parallel One-Shot Voice Conversion with Pure Transformer Blocks and Triplet Discriminative Training
Figure 2 for Pureformer-VC: Non-parallel One-Shot Voice Conversion with Pure Transformer Blocks and Triplet Discriminative Training
Figure 3 for Pureformer-VC: Non-parallel One-Shot Voice Conversion with Pure Transformer Blocks and Triplet Discriminative Training
Figure 4 for Pureformer-VC: Non-parallel One-Shot Voice Conversion with Pure Transformer Blocks and Triplet Discriminative Training
Viaarxiv icon

Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition

Add code
Jun 16, 2024
Figure 1 for Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition
Figure 2 for Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition
Figure 3 for Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition
Figure 4 for Imperceptible Rhythm Backdoor Attacks: Exploring Rhythm Transformation for Embedding Undetectable Vulnerabilities on Speech Recognition
Viaarxiv icon

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation

Add code
Apr 24, 2020
Figure 1 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 2 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 3 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 4 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Viaarxiv icon