Zhen Xiang

Orcid: 0000-0002-4284-2041

According to our database1, Zhen Xiang authored at least 44 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Correcting the distribution of batch normalization signals for Trojan mitigation.
Neurocomputing, 2025

2024
Evaluation of OpenAI o1: Opportunities and Challenges of AGI.
CoRR, 2024

AgentPoison: Red-teaming LLM Agents via Poisoning Memory or Knowledge Bases.
CoRR, 2024

GuardAgent: Safeguard LLM Agents by a Guard Agent via Knowledge-Enabled Reasoning.
CoRR, 2024

Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models.
CoRR, 2024

MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection.
Proceedings of the 34th IEEE International Workshop on Machine Learning for Signal Processing, 2024

BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
Malicious Agent Detection for Robust Multi-Agent Collaborative Perception.
CoRR, 2023

Backdoor Mitigation by Correcting the Distribution of Neural Activations.
CoRR, 2023

Swift: A modern highly-parallel gravity and smoothed particle hydrodynamics solver for astrophysical and cosmological applications.
CoRR, 2023

CBD: A Certified Backdoor Detector Based on Local Dominant Probability.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers.
Proceedings of the 33rd IEEE International Workshop on Machine Learning for Signal Processing, 2023

UMD: Unsupervised Model Detection for X2X Backdoor Attacks.
Proceedings of the International Conference on Machine Learning, 2023

Training Set Cleansing of Backdoor Poisoning by Self-Supervised Representation Learning.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
Detection of Backdoors in Trained Classifiers Without Access to the Training Set.
IEEE Trans. Neural Networks Learn. Syst., 2022

Training set cleansing of backdoor poisoning by self-supervised representation learning.
CoRR, 2022

Universal Post-Training Backdoor Detection.
CoRR, 2022

Velocity-Free Distributed Robust Nash Equilibrium Seeking By An Uncertainty and Disturbance Estimator Based Algorithm.
Proceedings of the IECON 2022, 2022

Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Detecting Backdoor Attacks against Point Cloud Classifiers.
Proceedings of the IEEE International Conference on Acoustics, 2022

Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks.
Proceedings of the IEEE International Conference on Acoustics, 2022

Distributed Robust Nash Equilibrium Seeking for Double-Integrator-Type Players Without Velocity Measurements.
Proceedings of the 13th Asian Control Conference, 2022

2021
Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set.
Neural Comput., 2021

Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing.
Comput. Secur., 2021

A Backdoor Attack against 3D Point Cloud Classifiers.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

L-Red: Efficient Post-Training Detection of Imperceptible Backdoor Attacks Without Access to the Training Set.
Proceedings of the IEEE International Conference on Acoustics, 2021

2020
Determination of Planetary Boundary Layer height with Lidar Signals Using Maximum Limited Height Initialization and Range Restriction (MLHI-RR).
Remote. Sens., 2020

Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review of Defenses Against Attacks.
Proc. IEEE, 2020

Scanning the Issue.
Proc. IEEE, 2020

Multimedia resource allocation strategy of wireless sensor networks using distributed heuristic algorithm in cloud computing environment.
Multim. Tools Appl., 2020

Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic.
Proceedings of the 30th IEEE International Workshop on Machine Learning for Signal Processing, 2020

Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

A Scalable Mixture Model Based Defense Against Data Poisoning Attacks on Classifiers.
Proceedings of the Dynamic Data Driven Applications Systems, 2020

2019
Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic.
CoRR, 2019

Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks.
CoRR, 2019

A Benchmark Study Of Backdoor Data Poisoning Defenses For Deep Neural Network Classifiers And A Novel Defense.
Proceedings of the 29th IEEE International Workshop on Machine Learning for Signal Processing, 2019

2018
A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters.
CoRR, 2018

Locally optimal, delay-tolerant predictive source coding.
Proceedings of the 52nd Annual Conference on Information Sciences and Systems, 2018

2009
Slope Perception from Monoscopic Field Images: Applications to Mobile Robot Navigation.
J. Intell. Robotic Syst., 2009

2008
Evaluation of the Human Eye Glare after Strong Exposure.
Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, 2008

2006
Intelligent Multimedia Group of Tsinghua University at TRECVID 2006.
Proceedings of the 2006 TREC Video Retrieval Evaluation, 2006

2003
NGG: A Service-Oriented Application Grid Architecture for National Geological Survey.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...