default search action
Kaidi Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Husheng Han, Xing Hu, Yifan Hao, Kaidi Xu, Pucheng Dang, Ying Wang, Yongwei Zhao, Zidong Du, Qi Guo, Yanzhi Wang, Xishan Zhang, Tianshi Chen:
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(1): 366-379 (2024) - [j12]Mengshu Sun, Kaidi Xu, Xue Lin, Yongli Hu, Baocai Yin:
Hardware-Friendly 3-D CNN Acceleration With Balanced Kernel Group Sparsity. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3027-3040 (2024) - [j11]Zijian Chen, Ming-Min Zhao, Kaidi Xu, Yunlong Cai, Minjian Zhao:
Intelligent Reflecting Surface Assisted Full-Duplex Relay Systems: Deployment Design and Beamforming Optimization. IEEE Trans. Commun. 72(7): 4493-4508 (2024) - [c43]Yixin Liu, Kaidi Xu, Xun Chen, Lichao Sun:
Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise. AAAI 2024: 3783-3791 - [c42]Jinhao Duan, Hao Cheng, Shiqi Wang, Alex Zavalny, Chenan Wang, Renjing Xu, Bhavya Kailkhura, Kaidi Xu:
Shifting Attention to Relevance: Towards the Predictive Uncertainty Quantification of Free-Form Large Language Models. ACL (1) 2024: 5050-5063 - [c41]Aref Azizpour, Tai D. Nguyen, Manil Shrestha, Kaidi Xu, Edward Kim, Matthew C. Stamm:
E3: Ensemble of Expert Embedders for Adapting Synthetic Image Detectors to New Generators Using Limited Data. CVPR Workshops 2024: 4334-4344 - [c40]Fei Kong, Jinhao Duan, Lichao Sun, Hao Cheng, Renjing Xu, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, Kaidi Xu:
ACT-Diffusion: Efficient Adversarial Consistency Training for One-Step Diffusion Models. CVPR 2024: 8890-8899 - [c39]Zhengyue Zhao, Jinhao Duan, Kaidi Xu, Chenan Wang, Rui Zhang, Zidong Du, Qi Guo, Xing Hu:
Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion? CVPR 2024: 24398-24407 - [c38]Hao Cheng, Erjia Xiao, Jindong Gu, Le Yang, Jinhao Duan, Jize Zhang, Jiahang Cao, Kaidi Xu, Renjing Xu:
Unveiling Typographic Deceptions: Insights of the Typographic Vulnerability in Large Vision-Language Models. ECCV (59) 2024: 179-196 - [c37]Zhiyuan Wang, Jinhao Duan, Lu Cheng, Yue Zhang, Qingni Wang, Xiaoshuang Shi, Kaidi Xu, Heng Tao Shen, Xiaofeng Zhu:
ConU: Conformal Uncertainty in Large Language Models with Correctness Coverage Guarantees. EMNLP (Findings) 2024: 6886-6898 - [c36]Fei Kong, Jinhao Duan, Ruipeng Ma, Heng Tao Shen, Xiaoshuang Shi, Xiaofeng Zhu, Kaidi Xu:
An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization. ICLR 2024 - [c35]Junyuan Hong, Jinhao Duan, Chenhui Zhang, Zhangheng Li, Chulin Xie, Kelsey Lieberman, James Diffenderfer, Brian R. Bartoldson, Ajay Kumar Jaiswal, Kaidi Xu, Bhavya Kailkhura, Dan Hendrycks, Dawn Song, Zhangyang Wang, Bo Li:
Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient LLMs Under Compression. ICML 2024 - [c34]Yue Huang, Lichao Sun, Haoran Wang, Siyuan Wu, Qihui Zhang, Yuan Li, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Hanchi Sun, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bertie Vidgen, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, Joaquin Vanschoren, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yong Chen, Yue Zhao:
Position: TrustLLM: Trustworthiness in Large Language Models. ICML 2024 - [c33]Jin Sun, Xiaoshuang Shi, Zhiyuan Wang, Kaidi Xu, Heng Tao Shen, Xiaofeng Zhu:
Caterpillar: A Pure-MLP Architecture with Shifted-Pillars-Concatenation. ACM Multimedia 2024: 7123-7132 - [c32]Jinhao Duan, Shiqi Wang, James Diffenderfer, Lichao Sun, Tianlong Chen, Bhavya Kailkhura, Kaidi Xu:
ReTA: Recursively Thinking Ahead to Improve the Strategic Reasoning of Large Language Models. NAACL-HLT 2024: 2232-2246 - [c31]Kaidi Xu, Shenglong Zhou, Geoffrey Ye Li:
Federated Reinforcement Learning for Resource Allocation in V2X Networks. VTC Spring 2024: 1-5 - [c30]Shenglong Zhou, Kaidi Xu, Geoffrey Ye Li:
Communication-Efficient Decentralized Federated Learning via One-Bit Compressive Sensing. VTC Spring 2024: 1-5 - [i66]Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yue Zhao:
TrustLLM: Trustworthiness in Large Language Models. CoRR abs/2401.05561 (2024) - [i65]Jinhao Duan, Renming Zhang, James Diffenderfer, Bhavya Kailkhura, Lichao Sun, Elias Stengel-Eskin, Mohit Bansal, Tianlong Chen, Kaidi Xu:
GTBench: Uncovering the Strategic Reasoning Limitations of LLMs via Game-Theoretic Evaluations. CoRR abs/2402.12348 (2024) - [i64]Zhiyuan Wang, Jinhao Duan, Chenxi Yuan, Qingyu Chen, Tianlong Chen, Huaxiu Yao, Yue Zhang, Ren Wang, Kaidi Xu, Xiaoshuang Shi:
Word-Sequence Entropy: Towards Uncertainty Estimation in Free-Form Medical Question Answering Applications and Beyond. CoRR abs/2402.14259 (2024) - [i63]Hao Cheng, Erjia Xiao, Jindong Gu, Le Yang, Jinhao Duan, Jize Zhang, Jiahang Cao, Kaidi Xu, Renjing Xu:
Unveiling Typographic Deceptions: Insights of the Typographic Vulnerability in Large Vision-Language Model. CoRR abs/2402.19150 (2024) - [i62]Weixiang Sun, Yixin Liu, Zhiling Yan, Kaidi Xu, Lichao Sun:
Medical Unlearnable Examples: Securing Medical Data from Unauthorized Traning via Sparsity-Aware Local Masking. CoRR abs/2403.10573 (2024) - [i61]Junyuan Hong, Jinhao Duan, Chenhui Zhang, Zhangheng Li, Chulin Xie, Kelsey Lieberman, James Diffenderfer, Brian R. Bartoldson, Ajay Jaiswal, Kaidi Xu, Bhavya Kailkhura, Dan Hendrycks, Dawn Song, Zhangyang Wang, Bo Li:
Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient LLMs Under Compression. CoRR abs/2403.15447 (2024) - [i60]Aref Azizpour, Tai D. Nguyen, Manil Shrestha, Kaidi Xu, Edward Kim, Matthew C. Stamm:
E3: Ensemble of Expert Embedders for Adapting Synthetic Image Detectors to New Generators Using Limited Data. CoRR abs/2404.08814 (2024) - [i59]Hao Cheng, Erjia Xiao, Jiahang Cao, Le Yang, Kaidi Xu, Jindong Gu, Renjing Xu:
Typography Leads Semantic Diversifying: Amplifying Adversarial Transferability across Multimodal Large Language Models. CoRR abs/2405.20090 (2024) - [i58]Zhengyue Zhao, Xiaoyun Zhang, Kaidi Xu, Xing Hu, Rui Zhang, Zidong Du, Qi Guo, Yunji Chen:
Adversarial Contrastive Decoding: Boosting Safety Alignment of Large Language Models via Opposite Prompt Optimization. CoRR abs/2406.16743 (2024) - [i57]Zhiyuan Wang, Jinhao Duan, Lu Cheng, Yue Zhang, Qingni Wang, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, Kaidi Xu:
ConU: Conformal Uncertainty in Large Language Models with Correctness Coverage Guarantees. CoRR abs/2407.00499 (2024) - [i56]Pucheng Dang, Xing Hu, Dong Li, Rui Zhang, Qi Guo, Kaidi Xu:
DiffZOO: A Purely Query-Based Black-Box Attack for Red-teaming Text-to-Image Generative Model via Zeroth Order Optimization. CoRR abs/2408.11071 (2024) - [i55]Ningfei Wang, Shaoyuan Xie, Takami Sato, Yunpeng Luo, Kaidi Xu, Qi Alfred Chen:
Revisiting Physical-World Adversarial Attack on Traffic Sign Recognition: A Commercial Systems Perspective. CoRR abs/2409.09860 (2024) - [i54]Hao Cheng, Erjia Xiao, Chengyuan Yu, Zhao Yao, Jiahang Cao, Qiang Zhang, Jiaxu Wang, Mengshu Sun, Kaidi Xu, Jindong Gu, Renjing Xu:
Manipulation Facing Threats: Evaluating Physical Vulnerabilities in End-to-End Vision Language Action Models. CoRR abs/2409.13174 (2024) - 2023
- [j10]Kaidi Xu, Nguyen Van Huynh, Geoffrey Ye Li:
Distributed-Training-and-Execution Multi-Agent Reinforcement Learning for Power Control in HetNet. IEEE Trans. Commun. 71(10): 5893-5903 (2023) - [j9]Ming-Min Zhao, Kaidi Xu, Yunlong Cai, Yong Niu, Lajos Hanzo:
Secrecy Rate Maximization of RIS-Assisted SWIPT Systems: A Two-Timescale Beamforming Design Approach. IEEE Trans. Wirel. Commun. 22(7): 4489-4504 (2023) - [j8]Fei Kong, Fangqi Liu, Kaidi Xu, Xiaoshuang Shi:
Why does batch normalization induce the model vulnerability on adversarial images? World Wide Web (WWW) 26(3): 1073-1091 (2023) - [c29]Chenan Wang, Jinhao Duan, Chaowei Xiao, Edward Kim, Matthew C. Stamm, Kaidi Xu:
Semantic Adversarial Attacks via Diffusion Models. BMVC 2023: 271 - [c28]Hao Cheng, Jinhao Duan, Hui Li, Jiahang Cao, Ping Wang, Lyutianyang Zhang, Jize Zhang, Kaidi Xu, Renjing Xu:
RBFormer: Improve Adversarial Robustness of Transformers by Robust Bias. BMVC 2023: 296 - [c27]Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen:
Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack. ICCV 2023: 4389-4400 - [c26]Jinhao Duan, Fei Kong, Shiqi Wang, Xiaoshuang Shi, Kaidi Xu:
Are Diffusion Models Vulnerable to Membership Inference Attacks? ICML 2023: 8717-8730 - [c25]Jinhao Duan, Quanfu Fan, Hao Cheng, Xiaoshuang Shi, Kaidi Xu:
Improve Video Representation with Temporal Adversarial Augmentation. IJCAI 2023: 708-716 - [i53]Jinhao Duan, Fei Kong, Shiqi Wang, Xiaoshuang Shi, Kaidi Xu:
Are Diffusion Models Vulnerable to Membership Inference Attacks? CoRR abs/2302.01316 (2023) - [i52]Jinhao Duan, Quanfu Fan, Hao Cheng, Xiaoshuang Shi, Kaidi Xu:
Improve Video Representation with Temporal Adversarial Augmentation. CoRR abs/2304.14601 (2023) - [i51]Jin Sun, Xiaoshuang Shi, Zhiyuan Weng, Kaidi Xu, Heng Tao Shen, Xiaofeng Zhu:
Using Caterpillar to Nibble Small-Scale Images. CoRR abs/2305.17644 (2023) - [i50]Fei Kong, Jinhao Duan, Ruipeng Ma, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, Kaidi Xu:
An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization. CoRR abs/2305.18355 (2023) - [i49]Zhengyue Zhao, Jinhao Duan, Xing Hu, Kaidi Xu, Chenan Wang, Rui Zhang, Zidong Du, Qi Guo, Yunji Chen:
Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation. CoRR abs/2306.01902 (2023) - [i48]Pucheng Dang, Xing Hu, Kaidi Xu, Jinhao Duan, Di Huang, Husheng Han, Rui Zhang, Zidong Du, Qi Guo, Yunji Chen:
Flew Over Learning Trap: Learn Unlearnable Samples by Progressive Staged Training. CoRR abs/2306.02064 (2023) - [i47]Jinhao Duan, Hao Cheng, Shiqi Wang, Chenan Wang, Alex Zavalny, Renjing Xu, Bhavya Kailkhura, Kaidi Xu:
Shifting Attention to Relevance: Towards the Uncertainty Estimation of Large Language Models. CoRR abs/2307.01379 (2023) - [i46]Ruipeng Ma, Jinhao Duan, Fei Kong, Xiaoshuang Shi, Kaidi Xu:
Exposing the Fake: Effective Diffusion-Generated Images Detection. CoRR abs/2307.06272 (2023) - [i45]Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen:
Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack. CoRR abs/2308.11894 (2023) - [i44]Shenglong Zhou, Kaidi Xu, Geoffrey Ye Li:
Communication-Efficient Decentralized Federated Learning via One-Bit Compressive Sensing. CoRR abs/2308.16671 (2023) - [i43]Chenan Wang, Jinhao Duan, Chaowei Xiao, Edward Kim, Matthew C. Stamm, Kaidi Xu:
Semantic Adversarial Attacks via Diffusion Models. CoRR abs/2309.07398 (2023) - [i42]Hao Cheng, Jinhao Duan, Hui Li, Lyutianyang Zhang, Jiahang Cao, Ping Wang, Jize Zhang, Kaidi Xu, Renjing Xu:
RBFormer: Improve Adversarial Robustness of Transformer by Robust Bias. CoRR abs/2309.13245 (2023) - [i41]Hao Cheng, Jiahang Cao, Erjia Xiao, Pu Zhao, Mengshu Sun, Jiaxu Wang, Jize Zhang, Xue Lin, Bhavya Kailkhura, Kaidi Xu, Renjing Xu:
Gaining the Sparse Rewards by Exploring Binary Lottery Tickets in Spiking Neural Network. CoRR abs/2309.13302 (2023) - [i40]Kaidi Xu, Shenglong Zhou, Geoffrey Ye Li:
Federated Reinforcement Learning for Resource Allocation in V2X Networks. CoRR abs/2310.09858 (2023) - [i39]Hao Cheng, Jiahang Cao, Erjia Xiao, Mengshu Sun, Le Yang, Jize Zhang, Xue Lin, Bhavya Kailkhura, Kaidi Xu, Renjing Xu:
Pursing the Sparse Limitation of Spiking Deep Learning Structures. CoRR abs/2311.12060 (2023) - [i38]Ren Wang, Ming Zhong, Kaidi Xu, Lola Giráldez Sánchez-Cortés, Ignacio de Cominges Guerra:
PINNs-Based Uncertainty Quantification for Transient Stability Analysis. CoRR abs/2311.12947 (2023) - [i37]Yixin Liu, Kaidi Xu, Xun Chen, Lichao Sun:
Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise. CoRR abs/2311.13091 (2023) - [i36]Fei Kong, Jinhao Duan, Lichao Sun, Hao Cheng, Renjing Xu, Hengtao Shen, Xiaofeng Zhu, Xiaoshuang Shi, Kaidi Xu:
ACT: Adversarial Consistency Models. CoRR abs/2311.14097 (2023) - [i35]Zhengyue Zhao, Jinhao Duan, Kaidi Xu, Chenan Wang, Rui Zhang, Zidong Du, Qi Guo, Xing Hu:
Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion? CoRR abs/2312.00084 (2023) - [i34]Yifan Yao, Jinhao Duan, Kaidi Xu, Yuanfang Cai, Eric Sun, Yue Zhang:
A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly. CoRR abs/2312.02003 (2023) - [i33]Amirhosein Chahe, Chenan Wang, Abhishek Jeyapratap, Kaidi Xu, Lifeng Zhou:
Dynamic Adversarial Attacks on Autonomous Driving Systems. CoRR abs/2312.06701 (2023) - 2022
- [j7]Yunlong Cai, Ming-Min Zhao, Kaidi Xu, Rui Zhang:
Intelligent Reflecting Surface Aided Full-Duplex Communication: Passive Beamforming and Deployment Design. IEEE Trans. Wirel. Commun. 21(1): 383-397 (2022) - [c24]Ningfei Wang, Yunpeng Luo, Takami Sato, Kaidi Xu, Qi Alfred Chen:
Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving. CCS 2022: 3479-3481 - [c23]Huan Zhang, Shiqi Wang, Kaidi Xu, Yihan Wang, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks. ICML 2022: 26591-26604 - [c22]Zijian Chen, Min-Jian Zhao, Kaidi Xu, Yunlong Cai, MinJian Zhao:
Beamforming Design for Intelligent Reflecting Surface Aided Full-Duplex Relay Systems. SAM 2022: 186-190 - [c21]Ling Liang, Kaidi Xu, Xing Hu, Lei Deng, Yuan Xie:
Toward Robust Spiking Neural Network Against Adversarial Perturbation. NeurIPS 2022 - [c20]Huan Zhang, Shiqi Wang, Kaidi Xu, Linyi Li, Bo Li, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
General Cutting Planes for Bound-Propagation-Based Neural Network Verification. NeurIPS 2022 - [c19]Hao Cheng, Kaidi Xu, Zhengang Li, Pu Zhao, Chenan Wang, Xue Lin, Bhavya Kailkhura, Ryan A. Goldhahn:
More or Less (MoL): Defending against Multiple Perturbation Attacks on Deep Neural Networks through Model Ensemble and Compression. WACV (Workshops) 2022: 645-655 - [i32]Ling Liang, Kaidi Xu, Xing Hu, Lei Deng, Yuan Xie:
Toward Robust Spiking Neural Network Against Adversarial Perturbation. CoRR abs/2205.01625 (2022) - [i31]Huan Zhang, Shiqi Wang, Kaidi Xu, Linyi Li, Bo Li, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
General Cutting Planes for Bound-Propagation-Based Neural Network Verification. CoRR abs/2208.05740 (2022) - [i30]Husheng Han, Xing Hu, Kaidi Xu, Pucheng Dang, Ying Wang, Yongwei Zhao, Zidong Du, Qi Guo, Yanzhi Yang, Tianshi Chen:
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks. CoRR abs/2208.09195 (2022) - [i29]Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou:
Audit and Improve Robustness of Private Neural Networks on Encrypted Data. CoRR abs/2209.09996 (2022) - [i28]Ming-Min Zhao, Kaidi Xu, Yunlong Cai, Yong Niu, Lajos Hanzo:
Secrecy Rate Maximization of RIS-assisted SWIPT Systems: A Two-Timescale Beamforming Design Approach. CoRR abs/2211.16666 (2022) - [i27]Kaidi Xu, Nguyen Van Huynh, Geoffrey Ye Li:
Distributed-Training-and-Execution Multi-Agent Reinforcement Learning for Power Control in HetNet. CoRR abs/2212.07967 (2022) - 2021
- [j6]Kaidi Xu, Ming-Min Zhao, Yunlong Cai, Lajos Hanzo:
Low-Complexity Joint Power Allocation and Trajectory Design for UAV-Enabled Secure Communications With Power Splitting. IEEE Trans. Commun. 69(3): 1896-1911 (2021) - [j5]Xiaoshuang Shi, Fuyong Xing, Kaidi Xu, Pingjun Chen, Yun Liang, Zhiyong Lu, Zhenhua Guo:
Loss-Based Attention for Interpreting Image-Level Prediction of Convolutional Neural Networks. IEEE Trans. Image Process. 30: 1662-1675 (2021) - [j4]Kaidi Xu, Yunlong Cai, Min-Jian Zhao, Yong Niu, Lajos Hanzo:
MIMO-Aided Nonlinear Hybrid Transceiver Design for Multiuser Mmwave Systems Relying on Tomlinson-Harashima Precoding. IEEE Trans. Veh. Technol. 70(7): 6943-6957 (2021) - [j3]Qiyu Hu, Yunlong Cai, Qingjiang Shi, Kaidi Xu, Guanding Yu, Zhi Ding:
Iterative Algorithm Induced Deep-Unfolding Neural Networks: Precoding Design for Multiuser MIMO Systems. IEEE Trans. Wirel. Commun. 20(2): 1394-1410 (2021) - [c18]Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang:
On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning. ICLR 2021 - [c17]Kaidi Xu, Huan Zhang, Shiqi Wang, Yihan Wang, Suman Jana, Xue Lin, Cho-Jui Hsieh:
Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers. ICLR 2021 - [c16]Husheng Han, Kaidi Xu, Xing Hu, Xiaobing Chen, Ling Liang, Zidong Du, Qi Guo, Yanzhi Wang, Yunji Chen:
ScaleCert: Scalable Certified Defense against Adversarial Patches with Sparse Superficial Layers. NeurIPS 2021: 28169-28181 - [c15]Shiqi Wang, Huan Zhang, Kaidi Xu, Xue Lin, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Robustness Verification. NeurIPS 2021: 29909-29921 - [i26]Ren Wang, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Chuang Gan, Meng Wang:
On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning. CoRR abs/2102.10454 (2021) - [i25]Shiqi Wang, Huan Zhang, Kaidi Xu, Xue Lin, Suman Jana, Cho-Jui Hsieh, J. Zico Kolter:
Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification. CoRR abs/2103.06624 (2021) - [i24]Hao Cheng, Kaidi Xu, Chenan Wang, Xue Lin, Bhavya Kailkhura, Ryan A. Goldhahn:
Mixture of Robust Experts (MoRE): A Flexible Defense Against Multiple Perturbations. CoRR abs/2104.10586 (2021) - [i23]Sheng Lin, Wei Jiang, Wei Wang, Kaidi Xu, Yanzhi Wang, Shan Liu, Songnan Li:
Efficient Micro-Structured Weight Unification and Pruning for Neural Network Compression. CoRR abs/2106.08301 (2021) - [i22]Husheng Han, Kaidi Xu, Xing Hu, Xiaobing Chen, Ling Liang, Zidong Du, Qi Guo, Yanzhi Wang, Yunji Chen:
ScaleCert: Scalable Certified Defense against Adversarial Patches with Sparse Superficial Layers. CoRR abs/2110.14120 (2021) - 2020
- [j2]Yunlong Cai, Kaidi Xu, An Liu, MinJian Zhao, Benoît Champagne, Lajos Hanzo:
Two-Timescale Hybrid Analog-Digital Beamforming for mmWave Full-Duplex MIMO Multiple-Relay Aided Systems. IEEE J. Sel. Areas Commun. 38(9): 2086-2103 (2020) - [c14]Shaokai Ye, Kailu Wu, Mu Zhou, Yunfei Yang, Sia Huat Tan, Kaidi Xu, Jiebo Song, Chenglong Bao, Kaisheng Ma:
Light-weight Calibrator: A Separable Component for Unsupervised Domain Adaptation. CVPR 2020: 13733-13742 - [c13]Kaidi Xu, Gaoyuan Zhang, Sijia Liu, Quanfu Fan, Mengshu Sun, Hongge Chen, Pin-Yu Chen, Yanzhi Wang, Xue Lin:
Adversarial T-Shirt! Evading Person Detectors in a Physical World. ECCV (5) 2020: 665-681 - [c12]Kaidi Xu, Sijia Liu, Pin-Yu Chen, Mengshu Sun, Caiwen Ding, Bhavya Kailkhura, Xue Lin:
Towards an Efficient and General Framework of Robust Training for Graph Neural Networks. ICASSP 2020: 8479-8483 - [c11]Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Mingyi Hong, Una-May O'Reilly:
Min-Max Optimization without Gradients: Convergence and Applications to Black-Box Evasion and Poisoning Attacks. ICML 2020: 6282-6293 - [c10]Kaidi Xu, Zhouxing Shi, Huan Zhang, Yihan Wang, Kai-Wei Chang, Minlie Huang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh:
Automatic Perturbation Analysis for Scalable Certified Robustness and Beyond. NeurIPS 2020 - [i21]Kaidi Xu, Sijia Liu, Pin-Yu Chen, Mengshu Sun, Caiwen Ding, Bhavya Kailkhura, Xue Lin:
Towards an Efficient and General Framework of Robust Training for Graph Neural Networks. CoRR abs/2002.10947 (2020) - [i20]Hao Cheng, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Pu Zhao, Xue Lin:
Defending against Backdoor Attack on Deep Neural Networks. CoRR abs/2002.12162 (2020) - [i19]Kaidi Xu, Zhouxing Shi, Huan Zhang, Minlie Huang, Kai-Wei Chang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh:
Automatic Perturbation Analysis on General Computational Graphs. CoRR abs/2002.12920 (2020) - [i18]Qiyu Hu, Yunlong Cai, Qingjiang Shi, Kaidi Xu, Guanding Yu, Zhi Ding:
Iterative Algorithm Induced Deep-Unfolding Neural Networks: Precoding Design for Multiuser MIMO Systems. CoRR abs/2006.08099 (2020) - [i17]Kaidi Xu, Yunlong Cai, Min-Jian Zhao, Yong Niu, Lajos Hanzo:
MIMO-Aided Nonlinear Hybrid Transceiver Design for Multiuser mmWave Systems Relying on Tomlinson-Harashima Precoding. CoRR abs/2008.05860 (2020) - [i16]Kaidi Xu, Huan Zhang, Shiqi Wang, Yihan Wang, Suman Jana, Xue Lin, Cho-Jui Hsieh:
Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers. CoRR abs/2011.13824 (2020) - [i15]Yunlong Cai, Ming-Min Zhao, Kaidi Xu, Rui Zhang:
Intelligent Reflecting Surface Aided Full-Duplex Communication: Passive Beamforming and Deployment Design. CoRR abs/2012.07218 (2020) - [i14]Pranay Sharma, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Xue Lin, Pramod K. Varshney:
Zeroth-Order Hybrid Gradient Descent: Towards A Principled Black-Box Optimization Framework. CoRR abs/2012.11518 (2020)
2010 – 2019
- 2019
- [c9]Pu Zhao, Kaidi Xu, Sijia Liu, Yanzhi Wang, Xue Lin:
ADMM attack: an enhanced adversarial attack for deep neural networks with undetectable distortions. ASP-DAC 2019: 499-505 - [c8]Caiwen Ding, Shuo Wang, Ning Liu, Kaidi Xu, Yanzhi Wang, Yun Liang:
REQ-YOLO: A Resource-Aware, Efficient Quantization Framework for Object Detection on FPGAs. FPGA 2019: 33-42 - [c7]Shaokai Ye, Xue Lin, Kaidi Xu, Sijia Liu, Hao Cheng, Jan-Henrik Lambrechts, Huan Zhang, Aojun Zhou, Kaisheng Ma, Yanzhi Wang:
Adversarial Robustness vs. Model Compression, or Both? ICCV 2019: 111-120 - [c6]Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin:
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method. ICCV 2019: 121-130 - [c5]Kaidi Xu, Sijia Liu, Pu Zhao, Pin-Yu Chen, Huan Zhang, Quanfu Fan, Deniz Erdogmus, Yanzhi Wang, Xue Lin:
Structured Adversarial Attack: Towards General Implementation and Better Interpretability. ICLR (Poster) 2019 - [c4]Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin:
Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. IJCAI 2019: 3961-3967 - [c3]Xiangyi Chen, Sijia Liu, Kaidi Xu, Xingguo Li, Xue Lin, Mingyi Hong, David D. Cox:
ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization. NeurIPS 2019: 7202-7213 - [i13]Shaokai Ye, Xiaoyu Feng, Tianyun Zhang, Xiaolong Ma, Sheng Lin, Zhengang Li, Kaidi Xu, Wujie Wen, Sijia Liu, Jian Tang, Makan Fardad, Xue Lin, Yongpan Liu, Yanzhi Wang:
Progressive DNN Compression: A Key to Achieve Ultra-High Weight Pruning and Quantization Rates using ADMM. CoRR abs/1903.09769 (2019) - [i12]Shaokai Ye, Kaidi Xu, Sijia Liu, Hao Cheng, Jan-Henrik Lambrechts, Huan Zhang, Aojun Zhou, Kaisheng Ma, Yanzhi Wang, Xue Lin:
Second Rethinking of Network Pruning in the Adversarial Setting. CoRR abs/1903.12561 (2019) - [i11]Kaidi Xu, Sijia Liu, Gaoyuan Zhang, Mengshu Sun, Pu Zhao, Quanfu Fan, Chuang Gan, Xue Lin:
Interpreting Adversarial Examples by Activation Promotion and Suppression. CoRR abs/1904.02057 (2019) - [i10]Shaokai Ye, Sia Huat Tan, Kaidi Xu, Yanzhi Wang, Chenglong Bao, Kaisheng Ma:
Brain-inspired reverse adversarial examples. CoRR abs/1905.12171 (2019) - [i9]Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin:
Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective. CoRR abs/1906.04214 (2019) - [i8]Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin:
On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method. CoRR abs/1907.11684 (2019) - [i7]Caiwen Ding, Shuo Wang, Ning Liu, Kaidi Xu, Yanzhi Wang, Yun Liang:
REQ-YOLO: A Resource-Aware, Efficient Quantization Framework for Object Detection on FPGAs. CoRR abs/1909.13396 (2019) - [i6]Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Mingyi Hong, Una-May O'Reilly:
Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML. CoRR abs/1909.13806 (2019) - [i5]Xiangyi Chen, Sijia Liu, Kaidi Xu, Xingguo Li, Xue Lin, Mingyi Hong, David D. Cox:
ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization. CoRR abs/1910.06513 (2019) - [i4]Kaidi Xu, Gaoyuan Zhang, Sijia Liu, Quanfu Fan, Mengshu Sun, Hongge Chen, Pin-Yu Chen, Yanzhi Wang, Xue Lin:
Evading Real-Time Person Detectors by Adversarial T-shirt. CoRR abs/1910.11099 (2019) - [i3]Shaokai Ye, Kailu Wu, Mu Zhou, Yunfei Yang, Sia Huat Tan, Kaidi Xu, Jiebo Song, Chenglong Bao, Kaisheng Ma:
Light-weight Calibrator: a Separable Component for Unsupervised Domain Adaptation. CoRR abs/1911.12796 (2019) - 2018
- [c2]Pu Zhao, Kaidi Xu, Tianyun Zhang, Makan Fardad, Yanzhi Wang, Xue Lin:
Reinforced Adversarial Attacks on Deep Neural Networks Using ADMM. GlobalSIP 2018: 1169-1173 - [i2]Kaidi Xu, Sijia Liu, Pu Zhao, Pin-Yu Chen, Huan Zhang, Deniz Erdogmus, Yanzhi Wang, Xue Lin:
Structured Adversarial Attack: Towards General Implementation and Better Interpretability. CoRR abs/1808.01664 (2018) - [i1]Shaokai Ye, Tianyun Zhang, Kaiqi Zhang, Jiayu Li, Kaidi Xu, Yunfei Yang, Fuxun Yu, Jian Tang, Makan Fardad, Sijia Liu, Xiang Chen, Xue Lin, Yanzhi Wang:
Progressive Weight Pruning of Deep Neural Networks using ADMM. CoRR abs/1810.07378 (2018) - 2017
- [j1]Xiaoshuang Shi, Fuyong Xing, Kaidi Xu, Yuanpu Xie, Hai Su, Lin Yang:
Supervised graph hashing for histopathology image retrieval and classification. Medical Image Anal. 42: 117-128 (2017) - [c1]Xiaoshuang Shi, Fuyong Xing, Kaidi Xu, Manish Sapkota, Lin Yang:
Asymmetric Discrete Graph Hashing. AAAI 2017: 2541-2547
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint