default search action
Wenbo Jiang 0001
Person information
- affiliation: University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
Other persons with the same name
- Wenbo Jiang — disambiguation page
- Wenbo Jiang 0002 — Hunan University, College of Electrical and Information Engineering, Changsha, China
- Wenbo Jiang 0003 — Xihua University, School of Electrical Engineering and Electronic Information, Chengdu, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Wenbo Jiang, Tianwei Zhang, Han Qiu, Hongwei Li, Guowen Xu:
Incremental Learning, Incremental Backdoor Threats. IEEE Trans. Dependable Secur. Comput. 21(2): 559-572 (2024) - [j5]Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang, Rongxing Lu:
A Comprehensive Defense Framework Against Model Extraction Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 685-700 (2024) - [j4]Wenshu Fan, Hongwei Li, Wenbo Jiang, Meng Hao, Shui Yu, Xiao Zhang:
Stealthy Targeted Backdoor Attacks Against Image Captioning. IEEE Trans. Inf. Forensics Secur. 19: 5655-5667 (2024) - [c9]Ran Zhang, Hongwei Li, Xinyuan Qian, Wenbo Jiang, Xilin Zhang:
An Efficient and Secure Privacy-Preserving Federated Learning Via Lattice-Based Functional Encryption. ICC 2024: 2185-2190 - [c8]Jiaming He, Hongwei Li, Wenbo Jiang, Yuan Zhang:
Mtisa: Multi-Target Image-Scaling Attack. ICC 2024: 2191-2196 - [c7]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Instruction Backdoor Attacks Against Customized LLMs. USENIX Security Symposium 2024 - [i12]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization. CoRR abs/2402.09179 (2024) - [i11]Jiaming He, Wenbo Jiang, Guanyu Hou, Wenshu Fan, Rui Zhang, Hongwei Li:
Talk Too Much: Poisoning Large Language Models under Token Limit. CoRR abs/2404.14795 (2024) - [i10]Wenshu Fan, Hongwei Li, Wenbo Jiang, Meng Hao, Shui Yu, Xiao Zhang:
Stealthy Targeted Backdoor Attacks against Image Captioning. CoRR abs/2406.05874 (2024) - [i9]Wenbo Jiang, Hongwei Li, Jiaming He, Rui Zhang, Guowen Xu, Tianwei Zhang, Rongxing Lu:
Backdoor Attacks against Image-to-Image Networks. CoRR abs/2407.10445 (2024) - [i8]Wenbo Jiang, Rui Zhang, Hongwei Li, Xiaoyuan Liu, Haomiao Yang, Shui Yu:
DDFAD: Dataset Distillation Framework for Audio Data. CoRR abs/2407.10446 (2024) - [i7]Ji Guo, Wenbo Jiang, Rui Zhang, Wenshu Fan, Jiachen Li, Guoming Lu:
Backdoor Attacks against Hybrid Classical-Quantum Neural Networks. CoRR abs/2407.16273 (2024) - [i6]Shuai Yuan, Hongwei Li, Xingshuo Han, Guowen Xu, Wenbo Jiang, Tao Ni, Qingchuan Zhao, Yuguang Fang:
ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition. CoRR abs/2409.12394 (2024) - [i5]Shuai Yuan, Hongwei Li, Xinyuan Qian, Wenbo Jiang, Guowen Xu:
OnePath: Efficient and Privacy-Preserving Decision Tree Inference in the Cloud. CoRR abs/2409.19334 (2024) - [i4]Ji Guo, Hongwei Li, Wenbo Jiang, Guoming Lu:
Backdoor Attack Against Vision Transformers via Attention Gradient-Based Image Erosion. CoRR abs/2410.22678 (2024) - [i3]Ji Guo, Wenbo Jiang, Rui Zhang, Guoming Lu, Hongwei Li:
One Prompt to Verify Your Models: Black-Box Text-to-Image Models Verification via Non-Transferable Adversarial Attacks. CoRR abs/2410.22725 (2024) - [i2]Ji Guo, Peihong Chen, Wenbo Jiang, Guoming Lu:
TrojanEdit: Backdooring Text-Based Image Editing Models. CoRR abs/2411.14681 (2024) - [i1]Xiaoyang Ning, Qing Xie, Jinyu Xu, Wenbo Jiang, Jiachen Li, Yanchun Ma:
Stealthy and Robust Backdoor Attack against 3D Point Clouds through Additional Point Features. CoRR abs/2412.07511 (2024) - 2023
- [j3]Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang, Rongxing Lu:
Physical Black-Box Adversarial Attacks Through Transformations. IEEE Trans. Big Data 9(3): 964-974 (2023) - [c6]Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang:
Color Backdoor: A Robust Poisoning Attack in Color Space. CVPR 2023: 8133-8142 - 2020
- [j2]Wenbo Jiang, Hongwei Li, Sen Liu, Xizhao Luo, Rongxing Lu:
Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles. IEEE Trans. Veh. Technol. 69(4): 4439-4449 (2020) - [c5]Wenshu Fan, Hongwei Li, Wenbo Jiang, Guowen Xu, Rongxing Lu:
A Practical Black-Box Attack Against Autonomous Speech Recognition Model. GLOBECOM 2020: 1-6 - [c4]Wenbo Jiang, Hongwei Li, Li Gong, Haomiao Yang, Rongxing Lu:
Accelerating Poisoning Attack Through Momentum and Adam Algorithms. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j1]Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI. Future Gener. Comput. Syst. 96: 185-195 (2019) - [c3]Wenbo Jiang, Hongwei Li, Sen Liu, Yanzhi Ren, Miao He:
A Flexible Poisoning Attack Against Machine Learning. ICC 2019: 1-6 - 2018
- [c2]Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI. GLOBECOM 2018: 1-6 - 2016
- [c1]Wenbo Jiang, Huaqi Chai:
Research on big data in business model innovation based on GA-BP model. SOLI 2016: 174-177
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-30 21:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint