Haiqin Weng

Orcid: 0000-0002-3005-761X

According to our database1, Haiqin Weng authored at least 28 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
CoRR, 2024

Course-Correction: Safety Alignment Using Synthetic Preferences.
CoRR, 2024

A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective.
CoRR, 2024

Multi-round Counterfactual Generation: Interpreting and Improving Models of Text Classification.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Exploring ChatGPT's Capabilities on Vulnerability Management.
Proceedings of the 33rd USENIX Security Symposium, 2024

Sophon: Non-Fine-Tunable Learning to Restrain Task Transferability For Pre-trained Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Course-Correction: Safety Alignment Using Synthetic Preferences.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing: EMNLP 2024, 2024

ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
How ChatGPT is Solving Vulnerability Management Problem.
CoRR, 2023

FDINet: Protecting against DNN Model Extraction via Feature Distortion Index.
CoRR, 2023

VILLAIN: Backdoor Attacks Against Vertical Split Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining.
IEEE Trans. Cybern., 2021

Noise Doesn't Lie: Towards Universal Detection of Deep Inpainting.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

2020
Privacy Leakage of Real-World Vertical Federated Learning.
CoRR, 2020

De-Health: All Your Online Health Information Are Belong to Us.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
De-Health: All Your Online Health Information Are Belong to Us.
CoRR, 2019

FDI: Quantifying Feature-based Data Inferability.
CoRR, 2019

Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019

CATS: Cross-Platform E-Commerce Fraud Detection.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

DeT: Defending Against Adversarial Examples via Decreasing Transferability.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Rare category exploration with noisy labels.
Expert Syst. Appl., 2018

Online E-Commerce Fraud: A Large-Scale Detection and Analysis.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

2015
Rare Category Detection Forest.
Proceedings of the Knowledge Science, Engineering and Management, 2015


  Loading...