Qiuling Xu

Orcid: 0000-0002-3464-482X

According to our database1, Qiuling Xu authored at least 31 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Rethinking the Invisible Protection against Unauthorized Image Usage in Stable Diffusion.
Proceedings of the 33rd USENIX Security Symposium, 2024

Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
POSIT: Promotion of Semantic Item Tail via Adversarial Learning.
CoRR, 2023

PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis.
Proceedings of the 32nd USENIX Security Symposium, 2023

ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Exploring the mechanism of action of acupuncture in the treatment of sciatica based on bioinformatics.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023

The Potential Mechanisms of Acupuncture in Cardiac Arrhythmias by Bioinformatics.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023

FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

MEDIC: Remove Model Backdoors via Importance Driven Cloning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
DECK: Model Hardening for Defending Pervasive Backdoors.
CoRR, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense.
CoRR, 2022

Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Data Mining-Based Analysis of Chinese Medicinal Herb Formulae in Metabolic associated fatty liver Disease Treatment.
Proceedings of the 3rd International Symposium on Artificial Intelligence for Medicine Sciences, 2022

A bioinformatics-based approach to study the mechanism of acupuncture for primary dysmenorrhea.
Proceedings of the 3rd International Symposium on Artificial Intelligence for Medicine Sciences, 2022

Analysis of curative effect and point selection of different acupuncture treatments for sciatica based on data mining technology.
Proceedings of the 3rd International Symposium on Artificial Intelligence for Medicine Sciences, 2022

Clinical research progress of acupuncture in the treatment of sciatica.
Proceedings of the 3rd International Symposium on Artificial Intelligence for Medicine Sciences, 2022

Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense.
Proceedings of the International Conference on Machine Learning, 2022

Bounded Adversarial Attack on Deep Content Features.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Better Trigger Inversion Optimization in Backdoor Scanning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
A Le Cam Type Bound for Adversarial Learning and Applications.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Study on the relationship between BDNF and electroacupuncture analgesia under the background of Intelligent Technology.
Proceedings of the ISAIMS 2021: 2nd International Symposium on Artificial Intelligence for Medicine Sciences, Beijing, China, October 29, 2021

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization.
Proceedings of the 38th International Conference on Machine Learning, 2021

GABAergic Neuron-related DNA Methylation Modification and Chronic Pain.
Proceedings of the BIBE 2021: The Fifth International Conference on Biological Information and Biomedical Engineering, 2021

Differences In Acupuncture Treatment Of Dysmenorrhea Between China And Europe.
Proceedings of the BIBE 2021: The Fifth International Conference on Biological Information and Biomedical Engineering, 2021

Towards Feature Space Adversarial Attack by Style Perturbation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Fundamental Limits of Adversarial Learning.
CoRR, 2020

D-square-B: Deep Distribution Bound for Natural-looking Adversarial Attack.
CoRR, 2020

Towards Feature Space Adversarial Attack.
CoRR, 2020

TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020


  Loading...