Zheng Li

Orcid: 0000-0002-4466-7523

Affiliations:
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany
  • Saarland University, Saarbrücken, Germany (PhD 2023)
  • Shandong University, School of Computer Science and Technology, Qingdao, China (former)


According to our database1, Zheng Li authored at least 29 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Comprehensive Study of Privacy Risks in Curriculum Learning.
Proc. Priv. Enhancing Technol., 2025

2024
<i>ModSCAN</i>: Measuring Stereotypical Bias in Large Vision-Language Models from Vision and Language Modalities.
CoRR, 2024

Membership Inference Attack Against Masked Image Modeling.
CoRR, 2024

Jailbreaking Text-to-Image Models with LLM-Based Agents.
CoRR, 2024

SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

PRJack: Pruning-Resistant Model Hijacking Attack Against Deep Learning Models.
Proceedings of the International Joint Conference on Neural Networks, 2024

Detection and Attribution of Models Trained on Generated Data.
Proceedings of the IEEE International Conference on Acoustics, 2024

ModSCAN: Measuring Stereotypical Bias in Large Vision-Language Models from Vision and Language Modalities.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024

Inside the Black Box: Detecting Data Leakage in Pre-Trained Language Encoders.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

BadMerging: Backdoor Attacks Against Model Merging.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Membership Inference Attacks Against In-Context Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SeqMIA: Sequential-Metric Based Membership Inference Attack.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis.
CoRR, 2023

Watermarking Diffusion Model.
CoRR, 2023

UnGANable: Defending Against GAN-based Face Manipulation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Backdoor Attacks Against Dataset Distillation.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Data Poisoning Attacks Against Multimodal Encoders.
Proceedings of the International Conference on Machine Learning, 2023

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Diffusion Models.
CoRR, 2022

Backdoor Attacks in the Supply Chain of Masked Image Modeling.
CoRR, 2022

Membership Inference Attacks Against Text-to-image Generation Models.
CoRR, 2022

Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models.
CoRR, 2022

FuzzGAN: A Generation-Based Fuzzing Framework for Testing Deep Neural Networks.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Auditing Membership Leakages of Multi-Exit Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Membership Leakage in Label-Only Exposures.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Label-Leaks: Membership Inference Attack with Label.
CoRR, 2020

2019
DeepKeyStego: Protecting Communication by Key-Dependent Steganography with Deep Networks.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

How to prove your model belongs to you: a blind-watermark based framework to protect intellectual property of DNN.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019


  Loading...