Chaowei Xiao
Orcid: 0000-0002-7043-4926
According to our database1,
Chaowei Xiao
authored at least 129 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Trans. Mach. Learn. Res., 2024
Trans. Mach. Learn. Res., 2024
IEEE Trans. Dependable Secur. Comput., 2024
RePD: Defending Jailbreak Attack through a Retrieval-based Prompt Decomposition Process.
CoRR, 2024
CoRR, 2024
CoRR, 2024
System-Level Defense against Indirect Prompt Injection Attacks: An Information Flow Control Perspective.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Consistency Purification: Effective and Efficient Diffusion Purification towards Certified Robustness.
CoRR, 2024
UniGen: A Unified Framework for Textual Dataset Generation Using Large Language Models.
CoRR, 2024
CoRR, 2024
Visual-RolePlay: Universal Jailbreak Attack on MultiModal Large Language Models via Role-playing Image Characte.
CoRR, 2024
CoRR, 2024
JailBreakV-28K: A Benchmark for Assessing the Robustness of MultiModal Large Language Models against Jailbreak Attacks.
CoRR, 2024
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models.
CoRR, 2024
AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting.
CoRR, 2024
CoRR, 2024
A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems.
CoRR, 2024
T-Stitch: Accelerating Sampling in Pre-Trained Diffusion Models with Trajectory Stitching.
CoRR, 2024
CoRR, 2024
A Learning-based Declarative Privacy-Preserving Framework for Federated Data Management.
CoRR, 2024
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
Don't Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024
Cognitive Overload: Jailbreaking Large Language Models with Overloaded Logical Thinking.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024
Instructions as Backdoors: Backdoor Vulnerabilities of Instruction Tuning for Large Language Models.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024
ChatGPT as an Attack Tool: Stealthy Textual Backdoor Attack via Blackbox Generative Model Trigger.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Perada: Parameter-Efficient Federated Learning Personalization with Generalization Guarantees.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
RLHFPoison: Reward Poisoning Attack for Reinforcement Learning with Human Feedback in Large Language Models.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2023
Nat. Mac. Intell., December, 2023
Int. J. High Perform. Comput. Appl., November, 2023
IEEE Trans. Dependable Secur. Comput., 2023
DeceptPrompt: Exploiting LLM-driven Code Generation via Adversarial Natural Language Instructions.
CoRR, 2023
Test-time Backdoor Mitigation for Black-Box Large Language Models with Defensive Demonstrations.
CoRR, 2023
On the Exploitability of Reinforcement Learning with Human Feedback for Large Language Models.
CoRR, 2023
DeepSpeed4Science Initiative: Enabling Large-Scale Scientific Discovery through Sophisticated AI System Technologies.
CoRR, 2023
CoRR, 2023
CoRR, 2023
CoRR, 2023
PerAda: Parameter-Efficient and Generalizable Federated Learning Personalization with Guarantees.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the International Conference on Machine Learning, 2023
A Critical Revisit of Adversarial Robustness in 3D Point Cloud Recognition with Diffusion-Driven Purification.
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Re-ViLM: Retrieval-Augmented Visual Language Model for Zero and Few-Shot Image Captioning.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Shall We Pretrain Autoregressive Language Models with Retrieval? A Comprehensive Study.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 34th British Machine Vision Conference 2023, 2023
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition.
CoRR, 2022
CoRR, 2022
Exploring the Limits of Domain-Adaptive Training for Detoxifying Large-Scale Language Models.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the Conference on Robot Learning, 2022
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022
2021
Invisible for both Camera and LiDAR: Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Can Shape Structure Features Improve Model Robustness under Diverse Adversarial Settings?
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the EWSN '21: Proceedings of the 2021 International Conference on Embedded Wireless Systems and Networks, 2021
2020
Robust Deep Reinforcement Learning against Adversarial Perturbations on Observations.
CoRR, 2020
Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 8th International Conference on Learning Representations, 2020
SemanticAdv: Generating Adversarial Examples via Attribute-Conditioned Image Editing.
Proceedings of the Computer Vision - ECCV 2020, 2020
2019
SemanticAdv: Generating Adversarial Examples via Attribute-conditional Image Editing.
CoRR, 2019
CoRR, 2019
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Mob. Comput., 2018
From Patching Delays to Infection Symptoms: Using Risk Profiles for an Early Discovery of Vulnerabilities Exploited in the Wild.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the 6th International Conference on Learning Representations, 2018
Characterizing Adversarial Examples Based on Spatial Consistency Information for Semantic Segmentation.
Proceedings of the Computer Vision - ECCV 2018, 2018
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018
2017
Patch Me If You Can: A Study on the Effects of Individual User Behavior on the End-Host Vulnerability State.
Proceedings of the Passive and Active Measurement - 18th International Conference, 2017
2015
Static power of mobile devices: Self-updating radio maps for wireless indoor localization.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014