Picture for Wenqi Chen

Wenqi Chen

InterMT: Multi-Turn Interleaved Preference Alignment with Human Feedback

Add code
May 29, 2025
Viaarxiv icon

Generative RLHF-V: Learning Principles from Multi-modal Human Preference

Add code
May 24, 2025
Viaarxiv icon

Mitigating Deceptive Alignment via Self-Monitoring

Add code
May 24, 2025
Viaarxiv icon

Align Anything: Training All-Modality Models to Follow Instructions with Language Feedback

Add code
Dec 20, 2024
Figure 1 for Align Anything: Training All-Modality Models to Follow Instructions with Language Feedback
Figure 2 for Align Anything: Training All-Modality Models to Follow Instructions with Language Feedback
Figure 3 for Align Anything: Training All-Modality Models to Follow Instructions with Language Feedback
Figure 4 for Align Anything: Training All-Modality Models to Follow Instructions with Language Feedback
Viaarxiv icon

Representing Affect Information in Word Embeddings

Add code
Sep 21, 2022
Figure 1 for Representing Affect Information in Word Embeddings
Figure 2 for Representing Affect Information in Word Embeddings
Figure 3 for Representing Affect Information in Word Embeddings
Figure 4 for Representing Affect Information in Word Embeddings
Viaarxiv icon

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications

Add code
Sep 23, 2021
Figure 1 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 2 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 3 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Figure 4 for DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications
Viaarxiv icon

Practical Traffic-space Adversarial Attacks on Learning-based NIDSs

Add code
May 15, 2020
Figure 1 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 2 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 3 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Figure 4 for Practical Traffic-space Adversarial Attacks on Learning-based NIDSs
Viaarxiv icon