default search action
Zhen Xiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Correcting the distribution of batch normalization signals for Trojan mitigation. Neurocomputing 614: 128752 (2025) - 2024
- [c23]Fengqing Jiang, Zhangchen Xu, Luyao Niu, Zhen Xiang, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran:
ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs. ACL (1) 2024: 15157-15173 - [c22]Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li:
BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models. ICLR 2024 - [c21]Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection. MLSP 2024: 1-6 - [c20]Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic. SP 2024: 1994-2012 - [i25]Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li:
BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models. CoRR abs/2401.12242 (2024) - [i24]Fengqing Jiang, Zhangchen Xu, Luyao Niu, Zhen Xiang, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran:
ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs. CoRR abs/2402.11753 (2024) - [i23]Zhenyang Ni, Rui Ye, Yuxi Wei, Zhen Xiang, Yanfeng Wang, Siheng Chen:
Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models. CoRR abs/2404.12916 (2024) - [i22]Zhen Xiang, Linzhi Zheng, Yanjie Li, Junyuan Hong, Qinbin Li, Han Xie, Jiawei Zhang, Zidi Xiong, Chulin Xie, Carl Yang, Dawn Song, Bo Li:
GuardAgent: Safeguard LLM Agents by a Guard Agent via Knowledge-Enabled Reasoning. CoRR abs/2406.09187 (2024) - [i21]Zhaorun Chen, Zhen Xiang, Chaowei Xiao, Dawn Song, Bo Li:
AgentPoison: Red-teaming LLM Agents via Poisoning Memory or Knowledge Bases. CoRR abs/2407.12784 (2024) - [i20]Tianyang Zhong, Zhengliang Liu, Yi Pan, Yutong Zhang, Yifan Zhou, Shizhe Liang, Zihao Wu, Yanjun Lyu, Peng Shu, Xiaowei Yu, Chao Cao, Hanqi Jiang, Hanxu Chen, Yiwei Li, Junhao Chen, Huawen Hu, Yihen Liu, Huaqin Zhao, Shaochen Xu, Haixing Dai, Lin Zhao, Ruidong Zhang, Wei Zhao, Zhenyuan Yang, Jingyuan Chen, Peilong Wang, Wei Ruan, Hui Wang, Huan Zhao, Jing Zhang, Yiming Ren, Shihuan Qin, Tong Chen, Jiaxi Li, Arif Hassan Zidan, Afrar Jahin, Minheng Chen, Sichen Xia, Jason Holmes, Yan Zhuang, Jiaqi Wang, Bochen Xu, Weiran Xia, Jichao Yu, Kaibo Tang, Yaxuan Yang, Bolun Sun, Tao Yang, Guoyu Lu, Xianqiao Wang, Lilong Chai, He Li, Jin Lu, Lichao Sun, Xin Zhang, Bao Ge, Xintao Hu, Lian Zhang, Hua Zhou, Lu Zhang, Shu Zhang, Ninghao Liu, Bei Jiang, Linglong Kong, Zhen Xiang, Yudan Ren, Jun Liu, Xi Jiang, Yu Bao, Wei Zhang, Xiang Li, Gang Li, Wei Liu, Dinggang Shen, Andrea Sikora, Xiaoming Zhai, Dajiang Zhu, Tianming Liu:
Evaluation of OpenAI o1: Opportunities and Challenges of AGI. CoRR abs/2409.18486 (2024) - 2023
- [c19]Hang Wang, Sahar Karami, Ousmane Dia, Hippolyt Ritter, Ehsan Emamjomeh-Zadeh, Jiahui Chen, Zhen Xiang, David J. Miller, George Kesidis:
Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation Learning. ICASSP 2023: 1-5 - [c18]Zhen Xiang, Zidi Xiong, Bo Li:
UMD: Unsupervised Model Detection for X2X Backdoor Attacks. ICML 2023: 38013-38038 - [c17]Xi Li, David J. Miller, Zhen Xiang, George Kesidis:
A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers. MLSP 2023: 1-6 - [c16]Zhen Xiang, Zidi Xiong, Bo Li:
CBD: A Certified Backdoor Detector Based on Local Dominant Probability. NeurIPS 2023 - [i19]Matthieu Schaller, Josh Borrow, Peter W. Draper, Mladen Ivkovic, Stuart McAlpine, Bert Vandenbroucke, Yannick Bahé, Evgenii Chaikin, Aidan B. G. Chalk, Tsang Keung Chan, Camila Correa, Marcel van Daalen, Willem Elbers, Pedro Gonnet, Loïc Hausammann, John C. Helly, Filip Husko, Jacob A. Kegerreis, Folkert S. J. Nobels, Sylvia Ploeckinger, Yves Revaz, William J. Roper, Sergio Ruiz-Bonilla, Thomas D. Sandnes, Yolan Uyttenhove, James S. Willis, Zhen Xiang:
Swift: A modern highly-parallel gravity and smoothed particle hydrodynamics solver for astrophysical and cosmological applications. CoRR abs/2305.13380 (2023) - [i18]Zhen Xiang, Zidi Xiong, Bo Li:
UMD: Unsupervised Model Detection for X2X Backdoor Attacks. CoRR abs/2305.18651 (2023) - [i17]Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection. CoRR abs/2308.04617 (2023) - [i16]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Backdoor Mitigation by Correcting the Distribution of Neural Activations. CoRR abs/2308.09850 (2023) - [i15]Yangheng Zhao, Zhen Xiang, Sheng Yin, Xianghe Pang, Siheng Chen, Yanfeng Wang:
Malicious Agent Detection for Robust Multi-Agent Collaborative Perception. CoRR abs/2310.11901 (2023) - [i14]Zhen Xiang, Zidi Xiong, Bo Li:
CBD: A Certified Backdoor Detector Based on Local Dominant Probability. CoRR abs/2310.17498 (2023) - 2022
- [j8]Zhen Xiang, David J. Miller, George Kesidis:
Detection of Backdoors in Trained Classifiers Without Access to the Training Set. IEEE Trans. Neural Networks Learn. Syst. 33(3): 1177-1191 (2022) - [c15]Danhu Li, Zhen Xiang, Maojiao Ye:
Distributed Robust Nash Equilibrium Seeking for Double-Integrator-Type Players Without Velocity Measurements. ASCC 2022: 1905-1910 - [c14]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
Detecting Backdoor Attacks against Point Cloud Classifiers. ICASSP 2022: 3159-3163 - [c13]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks. ICASSP 2022: 3333-3337 - [c12]Zhen Xiang, David J. Miller, George Kesidis:
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios. ICLR 2022 - [c11]Zhen Xiang, Danhu Li, Guobiao Jia, Maojiao Ye:
Velocity-Free Distributed Robust Nash Equilibrium Seeking By An Uncertainty and Disturbance Estimator Based Algorithm. IECON 2022: 1-6 - [i13]Zhen Xiang, David J. Miller, George Kesidis:
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios. CoRR abs/2201.08474 (2022) - [i12]Hang Wang, Zhen Xiang, David J. Miller, George Kesidis:
Universal Post-Training Backdoor Detection. CoRR abs/2205.06900 (2022) - [i11]Hang Wang, Sahar Karami, Ousmane Dia, H. Ritter, Ehsan Emamjomeh-Zadeh, Jiahui Chen, Zhen Xiang, David J. Miller, George Kesidis:
Training set cleansing of backdoor poisoning by self-supervised representation learning. CoRR abs/2210.10272 (2022) - 2021
- [j7]Zhen Xiang, David J. Miller, George Kesidis:
Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing. Comput. Secur. 106: 102280 (2021) - [j6]Zhen Xiang, David J. Miller, Hang Wang, George Kesidis:
Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set. Neural Comput. 33(5): 1329-1371 (2021) - [c10]Zhen Xiang, David J. Miller, George Kesidis:
L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set. ICASSP 2021: 3745-3749 - [c9]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
A Backdoor Attack against 3D Point Cloud Classifiers. ICCV 2021: 7577-7587 - [i10]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
A Backdoor Attack against 3D Point Cloud Classifiers. CoRR abs/2104.05808 (2021) - [i9]Xi Li, David J. Miller, Zhen Xiang, George Kesidis:
A BIC based Mixture Model Defense against Data Poisoning Attacks on Classifiers. CoRR abs/2105.13530 (2021) - [i8]Zhen Xiang, David J. Miller, Siheng Chen, Xi Li, George Kesidis:
Detecting Backdoor Attacks Against Point Cloud Classifiers. CoRR abs/2110.10354 (2021) - [i7]Xi Li, Zhen Xiang, David J. Miller, George Kesidis:
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks. CoRR abs/2112.03350 (2021) - 2020
- [j5]Jian Yang, Zhen Xiang, Lisha Mou, Shumu Liu:
Multimedia resource allocation strategy of wireless sensor networks using distributed heuristic algorithm in cloud computing environment. Multim. Tools Appl. 79(47): 35353-35367 (2020) - [j4]Weiqiang Liu, Maximilian John, Andreas Karrenbauer, Adam Allerhand, Fabrizio Lombardi, Michael Shulte, David J. Miller, Zhen Xiang, George Kesidis, Antti Oulasvirta, Niraj Ramesh Dayama, Morteza Shiripour:
Scanning the Issue. Proc. IEEE 108(3): 400-401 (2020) - [j3]David J. Miller, Zhen Xiang, George Kesidis:
Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks. Proc. IEEE 108(3): 402-433 (2020) - [j2]Tianfen Zhong, Nanchao Wang, Xue Shen, Da Xiao, Zhen Xiang, Dong Liu:
Determination of Planetary Boundary Layer height with Lidar Signals Using Maximum Limited Height Initialization and Range Restriction (MLHI-RR). Remote. Sens. 12(14): 2272 (2020) - [c8]Xi Li, David J. Miller, Zhen Xiang, George Kesidis:
A Scalable Mixture Model Based Defense Against Data Poisoning Attacks on Classifiers. DDDAS 2020: 262-273 - [c7]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification. ICASSP 2020: 3827-3831 - [c6]Zhen Xiang, David J. Miller, Hang Wang, George Kesidis:
Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic. MLSP 2020: 1-6 - [i6]Zhen Xiang, David J. Miller, George Kesidis:
Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing. CoRR abs/2010.07489 (2020) - [i5]Zhen Xiang, David J. Miller, George Kesidis:
L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set. CoRR abs/2010.09987 (2020)
2010 – 2019
- 2019
- [c5]Zhen Xiang, David J. Miller, George Kesidis:
A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural Network Classifiers And A Novel Defense. MLSP 2019: 1-6 - [i4]David J. Miller, Zhen Xiang, George Kesidis:
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks. CoRR abs/1904.06292 (2019) - [i3]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification. CoRR abs/1908.10498 (2019) - [i2]Zhen Xiang, David J. Miller, George Kesidis:
Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic. CoRR abs/1911.07970 (2019) - 2018
- [c4]Zhen Xiang, David J. Miller:
Locally optimal, delay-tolerant predictive source coding. CISS 2018: 1-6 - [i1]David J. Miller, Xinyi Hu, Zhen Xiang, George Kesidis:
A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters. CoRR abs/1811.00121 (2018)
2000 – 2009
- 2009
- [j1]Zhen Xiang, Geb W. Thomas, Kristopher M. Thornburg, Nathalie Cabrol, Edmond Grin, Robert C. Anderson:
Slope Perception from Monoscopic Field Images: Applications to Mobile Robot Navigation. J. Intell. Robotic Syst. 54(4): 595-612 (2009) - 2008
- [c3]Kai Xiong, Zhen Xiang, Jianhong Ge:
Evaluation of the Human Eye Glare after Strong Exposure. BMEI (1) 2008: 660-663 - 2006
- [c2]Jie Cao, Yanxiang Lan, Jianmin Li, Qiang Li, Xirong Li, Fuzong Lin, Xiaobing Liu, Linjie Luo, Wanli Peng, Dong Wang, Huiyi Wang, Zhikun Wang, Zhen Xiang, Jinhui Yuan, Bo Zhang, Jun Zhang, Leigang Zhang, Xiao Zhang, Wujie Zheng:
Intelligent Multimedia Group of Tsinghua University at TRECVID 2006. TRECVID 2006 - 2003
- [c1]Yu Tang, Kai-Tao He, Zhen Xiang, Yongbo Zhang, Ning Jing:
NGG: A Service-Oriented Application Grid Architecture for National Geological Survey. GCC (1) 2003: 196-199
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint