Yige Li

According to our database1, Yige Li authored at least 18 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BlueSuffix: Reinforced Blue Teaming for Vision-Language Models Against Jailbreak Attacks.
CoRR, 2024

Expose Before You Defend: Unifying and Enhancing Backdoor Defenses via Exposed Models.
CoRR, 2024

AnyAttack: Towards Large-scale Self-supervised Generation of Targeted Adversarial Examples for Vision-Language Models.
CoRR, 2024

Adversarial Suffixes May Be Features Too!
CoRR, 2024

Do Influence Functions Work on Large Language Models?
CoRR, 2024

BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks on Large Language Models.
CoRR, 2024

Multi-Trigger Backdoor Attacks: More Triggers, More Threats.
CoRR, 2024

End-to-End Anti-Backdoor Learning on Images and Time Series.
CoRR, 2024

Defending Large Language Models Against Jailbreak Attacks via Layer-specific Editing.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

2023
Feature Pyramid Networks and Long Short-Term Memory for EEG Feature Map-Based Emotion Recognition.
Sensors, February, 2023

Lightweight Video Frame Interpolation Based on Bidirectional Attention Module.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Reconstructive Neuron Pruning for Backdoor Defense.
Proceedings of the International Conference on Machine Learning, 2023

2022
Tectonic Significances of the Geomorphic Evolution in the Southern Alashan Block to the Outward Expansion of the Northeastern Tibetan Plateau.
Remote. Sens., December, 2022

A Fully Distributed Robust Secure Consensus Protocol for Linear Multi-Agent Systems.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Deep learning-based automated segmentation of eight brain anatomical regions using head CT images in PET/CT.
BMC Medical Imaging, 2022

2021
Anti-Backdoor Learning: Training Clean Models on Poisoned Data.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Neural Attention Distillation: Erasing Backdoor Triggers from Deep Neural Networks.
Proceedings of the 9th International Conference on Learning Representations, 2021

2006
Combining Couvreur's Algorithm with Bitstate-Hashing for Emptiness Check.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006


  Loading...