Zhenting Wang

ORCID: 0000-0002-7742-6777
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Manufacturing Process and Optimization
  • Robot Manipulation and Learning
  • Robotic Path Planning Algorithms
  • Digital Rights Management and Security
  • Scientific Computing and Data Management
  • Computability, Logic, AI Algorithms
  • Graphene research and applications
  • Anomaly Detection Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Modular Robots and Swarm Intelligence
  • Brain Tumor Detection and Classification
  • Access Control and Trust
  • Surface and Thin Film Phenomena
  • Digital and Cyber Forensics
  • Advanced Manufacturing and Logistics Optimization
  • Virus-based gene therapy research
  • Multi-Agent Systems and Negotiation
  • Web Application Security Vulnerabilities
  • Cell Image Analysis Techniques
  • Topological Materials and Phenomena
  • Medical Imaging Techniques and Applications

Osaka University
2023-2025

Southern University of Science and Technology
2024

National Yang Ming Chiao Tung University
2006

10.1109/sii59315.2025.10871031 article EN 2022 IEEE/SICE International Symposium on System Integration (SII) 2025-01-21

Scientific discovery is poised for rapid advancement through advanced robotics and artificial intelligence. Current scientific practices face substantial limitations as manual experimentation remains time-consuming resource-intensive, while multidisciplinary research demands knowledge integration beyond individual researchers' expertise boundaries. Here, we envision an autonomous generalist scientist (AGS) concept combines agentic AI embodied to automate the entire lifecycle. This system...

10.48550/arxiv.2503.22444 preprint EN arXiv (Cornell University) 2025-03-28

Although LLM-based agents, powered by Large Language Models (LLMs), can use external tools and memory mechanisms to solve complex real-world tasks, they may also introduce critical security vulnerabilities. However, the existing literature does not comprehensively evaluate attacks defenses against agents. To address this, we Agent Security Bench (ASB), a comprehensive framework designed formalize, benchmark, of including 10 scenarios (e.g., e-commerce, autonomous driving, finance), agents...

10.48550/arxiv.2410.02644 preprint EN arXiv (Cornell University) 2024-10-03

10.1016/j.nima.2006.08.072 article EN Nuclear Instruments and Methods in Physics Research Section A Accelerators Spectrometers Detectors and Associated Equipment 2006-09-19

Self-supervised learning models are vulnerable to backdoor attacks. Existing attacks that effective in self-supervised often involve noticeable triggers, like colored patches, which human inspection. In this paper, we propose an imperceptible and attack against models. We first find existing triggers designed for supervised not as compromising then identify ineffectiveness is attributed the overlap distributions between augmented samples used learning. Building on insight, design using...

10.48550/arxiv.2405.14672 preprint EN arXiv (Cornell University) 2024-05-23

Recent advances in code-specific large language models (LLMs) have greatly enhanced code generation and refinement capabilities. However, the safety of LLMs remains under-explored, posing potential risks as insecure generated by these may introduce vulnerabilities into real-world systems. Previous work proposes to collect security-focused instruction-tuning dataset from vulnerabilities. It is constrained data sparsity vulnerable code, has limited applicability iterative post-training...

10.48550/arxiv.2411.12882 preprint EN arXiv (Cornell University) 2024-11-19

To enhance the accuracy of robotic assembly planning by understanding graphical instruction manual, this paper proposes a novel two-step error correction method. While constructing Assembly Task Sequence Graph (ATSG) from we performed an focusing on component, symbol, speech bubble, and model number included in manual. The component symbol information were used to check correctness manipulated components, needed motion tool single step task. bubble was remove repeated drawn components...

10.1109/access.2023.3319822 article EN cc-by-nc-nd IEEE Access 2023-01-01
Coming Soon ...