Search

Your search keyword '"He, Xinlei"' showing total 189 results

Search Constraints

Start Over You searched for: Author "He, Xinlei" Remove constraint Author: "He, Xinlei"
189 results on '"He, Xinlei"'

Search Results

1. Membership Inference Attack Against Masked Image Modeling

2. On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks

3. Jailbreak Attacks and Defenses Against Large Language Models: A Survey

4. JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models

5. Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models

6. Link Stealing Attacks Against Inductive Graph Neural Networks

7. Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging

8. SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

9. A Comprehensive Study of Privacy Risks in Curriculum Learning

10. Test-Time Poisoning Attacks Against Test-Time Adaptation Models

11. You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content

12. Generated Graph Detection

13. Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis

14. Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models

15. MGTBench: Benchmarking Machine-Generated Text Detection

16. A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots

17. Fine-Tuning Is All You Need to Mitigate Backdoor Attacks

18. On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning

19. Backdoor Attacks in the Supply Chain of Masked Image Modeling

20. Data Poisoning Attacks Against Multimodal Encoders

21. Auditing Membership Leakages of Multi-Exit Networks

22. Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models

23. Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning

24. On Xing Tian and the Perseverance of Anti-China Sentiment Online

25. SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders

26. Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders

27. Model Stealing Attacks Against Inductive Graph Neural Networks

33. Node-Level Membership Inference Attacks Against Graph Neural Networks

34. Quantifying and Mitigating Privacy Risks of Contrastive Learning

35. ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models

38. Stealing Links from Graph Neural Networks

39. Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions

40. On the Influence of Twitter Trolls during the 2016 US Presidential Election

46. A Hybrid Model Coupling Physical Constraints and Machine Learning to Estimate Daily Evapotranspiration in the Heihe River Basin.

50. Hybrid Optimization Method Based on Coupling Local Gradient Information and Global Evolution Mechanism.

Catalog

Books, media, physical & digital resources