Xingjun Ma

Orcid: 0000-0003-2099-4973

According to our database1, Xingjun Ma authored at least 112 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy and Robustness in Federated Learning: Attacks and Defenses.
IEEE Trans. Neural Networks Learn. Syst., July, 2024

Imbalanced gradients: a subtle cause of overestimated adversarial robustness.
Mach. Learn., May, 2024

VeriFi: Towards Verifiable Federated Unlearning.
IEEE Trans. Dependable Secur. Comput., 2024

IDEATOR: Jailbreaking Large Vision-Language Models Using Themselves.
CoRR, 2024

BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks.
CoRR, 2024

Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models.
CoRR, 2024

UnSeg: One Universal Unlearnable Example Generator is Enough against All Image Segmentation.
CoRR, 2024

On the Adversarial Transferability of Generalized "Skip Connections".
CoRR, 2024

AnyAttack: Towards Large-scale Self-supervised Generation of Targeted Adversarial Examples for Vision-Language Models.
CoRR, 2024

Towards a Theoretical Understanding of Memorization in Diffusion Models.
CoRR, 2024

BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models.
CoRR, 2024

EnJa: Ensemble Jailbreak on Large Language Models.
CoRR, 2024

Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers.
CoRR, 2024

CHASE: A Causal Heterogeneous Graph based Framework for Root Cause Analysis in Multimodal Microservice Systems.
CoRR, 2024

A Survey of Multimodal-Guided Image Editing with Text-to-Image Diffusion Models.
CoRR, 2024

FedCAda: Adaptive Client-Side Optimization for Accelerated and Stable Federated Learning.
CoRR, 2024

Special Characters Attack: Toward Scalable Training Data Extraction From Large Language Models.
CoRR, 2024

The Dog Walking Theory: Rethinking Convergence in Federated Learning.
CoRR, 2024

The Double-Edged Sword of Input Perturbations to Robust Accurate Fairness.
CoRR, 2024

Whose Side Are You On? Investigating the Political Stance of Large Language Models.
CoRR, 2024

Hufu: A Modality-Agnositc Watermarking System for Pre-Trained Transformers via Permutation Equivariance.
CoRR, 2024

Multi-Trigger Backdoor Attacks: More Triggers, More Threats.
CoRR, 2024

End-to-End Anti-Backdoor Learning on Images and Time Series.
CoRR, 2024

Training Sparse Graph Neural Networks via Pruning and Sprouting.
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024

Unlearnable Examples for Time Series.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

Fake Alignment: Are LLMs Really Aligned Well?
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024

White-box Multimodal Jailbreaks Against Large Vision-Language Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Fuse Your Latents: Video Editing with Multi-source Latent Diffusion Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

ModelLock: Locking Your Model With a Spell.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

AdvQDet: Detecting Query-Based Adversarial Attacks with Adversarial Contrastive Prompt Tuning.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Constrained Intrinsic Motivation for Reinforcement Learning.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

LDReg: Local Dimensionality Regularized Self-Supervised Learning.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Adversarial Prompt Tuning for Vision-Language Models.
Proceedings of the Computer Vision - ECCV 2024, 2024

Toward Evaluating Robustness of Reinforcement Learning with Adversarial Policy.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
QuoTe: Quality-oriented Testing for Deep Learning Systems.
ACM Trans. Softw. Eng. Methodol., September, 2023

Relationships between tail entropies and local intrinsic dimensionality and their use for estimation and feature representation.
Inf. Syst., September, 2023

Query-Efficient Black-Box Adversarial Attacks on Automatic Speech Recognition.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Learning from Heterogeneity: A Dynamic Learning Framework for Hypergraphs.
CoRR, 2023

IMAP: Intrinsically Motivated Adversarial Policy.
CoRR, 2023

Backdoor Attacks on Time Series: A Generative Approach.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023

On the Importance of Spatial Relations for Few-shot Action Recognition.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DEEPJUDGE: A Testing Framework for Copyright Protection of Deep Learning Models.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023

Reconstructive Neuron Pruning for Backdoor Defense.
Proceedings of the International Conference on Machine Learning, 2023

Transferable Unlearnable Examples.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Distilling Cognitive Backdoor Patterns within an Image.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Unlearnable Clusters: Towards Label-Agnostic Unlearnable Examples.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2022

Local Intrinsic Dimensionality, Entropy and Statistical Divergences.
Entropy, 2022

Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

CalFAT: Calibrated Federated Adversarial Training with Label Skewness.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Backdoor Attacks on Crowd Counting.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

ECG-ATK-GAN: Robustness Against Adversarial Attacks on ECGs Using Conditional Generative Adversarial Networks.
Proceedings of the Applications of Medical Artificial Intelligence, 2022

Few-Shot Backdoor Attacks on Visual Object Tracking.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Fine-mixing: Mitigating Backdoors in Fine-tuned Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

2021
Understanding adversarial attacks on deep learning based medical image analysis systems.
Pattern Recognit., 2021

ECG-ATK-GAN: Robustness against Adversarial Attacks on ECG using Conditional Generative Adversarial Networks.
CoRR, 2021

A Lazy Approach for Efficient Index Learning.
CoRR, 2021

Multi-class Classification Based Anomaly Detection of Insider Activities.
CoRR, 2021

What Do Deep Nets Learn? Class-wise Patterns Revealed in the Input Space.
CoRR, 2021

Adversarial Interaction Attack: Fooling AI to Misinterpret Human Intentions.
CoRR, 2021

Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Sub-trajectory Similarity Join with Obfuscation.
Proceedings of the SSDBM 2021: 33rd International Conference on Scientific and Statistical Database Management, 2021

Relationships Between Local Intrinsic Dimensionality and Tail Entropy.
Proceedings of the Similarity Search and Applications - 14th International Conference, 2021

Gradient Driven Rewards to Guarantee Fairness in Collaborative Machine Learning.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Anti-Backdoor Learning: Training Clean Models on Poisoned Data.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

$\alpha$-IoU: A Family of Power Intersection over Union Losses for Bounding Box Regression.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Federated Learning with Extreme Label Skew: A Data Extension Approach.
Proceedings of the International Joint Conference on Neural Networks, 2021

Microwave Link Failures Prediction via LSTM-based Feature Fusion Network.
Proceedings of the International Joint Conference on Neural Networks, 2021

Dual Head Adversarial Training.
Proceedings of the International Joint Conference on Neural Networks, 2021

Neural Architecture Search via Combinatorial Multi-Armed Bandit.
Proceedings of the International Joint Conference on Neural Networks, 2021

Noise Doesn't Lie: Towards Universal Detection of Deep Inpainting.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

RobOT: Robustness-Oriented Testing for Deep Learning Systems.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

ECG-Adv-GAN: Detecting ECG Adversarial Examples with Conditional Generative Adversarial Networks.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks.
Proceedings of the 9th International Conference on Learning Representations, 2021

Unlearnable Examples: Making Personal Data Unexploitable.
Proceedings of the 9th International Conference on Learning Representations, 2021

Improving Adversarial Robustness via Channel-wise Activation Suppressing.
Proceedings of the 9th International Conference on Learning Representations, 2021

Revisiting Adversarial Robustness Distillation: Robust Soft Labels Make Student Better.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

SpineOne: A One-Stage Detection Framework for Degenerative Discs and Vertebrae.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

2020
Towards Fair and Privacy-Preserving Federated Deep Models.
IEEE Trans. Parallel Distributed Syst., 2020

Exploiting patterns to explain individual predictions.
Knowl. Inf. Syst., 2020

Privacy and Robustness in Federated Learning: Attacks and Defenses.
CoRR, 2020

Imbalanced Gradients: A New Cause of Overestimated Adversarial Robustness.
CoRR, 2020

WildDeepfake: A Challenging Real-World Dataset for Deepfake Detection.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Normalized Loss Functions for Deep Learning with Noisy Labels.
Proceedings of the 37th International Conference on Machine Learning, 2020

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets.
Proceedings of the 8th International Conference on Learning Representations, 2020

Improving Adversarial Robustness Requires Revisiting Misclassified Examples.
Proceedings of the 8th International Conference on Learning Representations, 2020

Reflection Backdoor: A Natural Backdoor Attack on Deep Neural Networks.
Proceedings of the Computer Vision - ECCV 2020, 2020

Short-Term and Long-Term Context Aggregation Network for Video Inpainting.
Proceedings of the Computer Vision - ECCV 2020, 2020

Clean-Label Backdoor Attacks on Video Recognition Models.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Adversarial Camouflage: Hiding Physical-World Attacks With Natural Styles.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Transfer of Automated Performance Feedback Models to Different Specimens in Virtual Reality Temporal Bone Surgery.
Proceedings of the Artificial Intelligence in Education - 21st International Conference, 2020

2019
Towards Fair and Decentralized Privacy-Preserving Deep Learning with Blockchain.
CoRR, 2019

Quality Evaluation of GANs Using Cross Local Intrinsic Dimensionality.
CoRR, 2019

Black-box Adversarial Attacks on Video Recognition Models.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

Generative Image Inpainting with Submanifold Alignment.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

On the Convergence and Robustness of Adversarial Training.
Proceedings of the 36th International Conference on Machine Learning, 2019

Symmetric Cross Entropy for Robust Learning With Noisy Labels.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

2018
Machine learning with adversarial perturbations and noisy labels.
PhD thesis, 2018

Dimensionality-Driven Learning with Noisy Labels.
Proceedings of the 35th International Conference on Machine Learning, 2018

Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality.
Proceedings of the 6th International Conference on Learning Representations, 2018

Iterative Learning With Open-Set Noisy Labels.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition, 2018

Development and Validation of a Virtual Reality Tutor to Teach Clinically Oriented Surgical Anatomy of the Ear.
Proceedings of the 31st IEEE International Symposium on Computer-Based Medical Systems, 2018

Providing Automated Real-Time Technical Feedback for Virtual Reality Based Surgical Training: Is the Simpler the Better?
Proceedings of the Artificial Intelligence in Education - 19th International Conference, 2018

2017
Feedback Techniques in Computer-Based Simulation Training: A Survey.
CoRR, 2017

Finding Influentials in Twitter: A Temporal Influence Ranking Model.
CoRR, 2017

Extracting Real-time Feedback with Neural Networks for Simulation-based Learning.
CoRR, 2017

Providing Effective Real-Time Feedback in Simulation-Based Surgical Training.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2017, 2017

Adversarial Generation of Real-time Feedback with Neural Networks for Simulation-based Training.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Design and Evaluation of a Virtual Reality Simulation Module for Training Advanced Temporal Bone Surgery.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

Simulation for Training Cochlear Implant Electrode Insertion.
Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems, 2017

Unbiased Multivariate Correlation Analysis.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017


  Loading...