Boheng Li

Orcid: 0000-0001-9921-7215

According to our database1, Boheng Li authored at least 24 papers between 2022 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
DREAM: Scalable Red Teaming for Text-to-Image Generative Systems via Distribution Modeling.
CoRR, July, 2025

Towards Resilient Safety-driven Unlearning for Diffusion Models against Downstream Fine-tuning.
CoRR, July, 2025

DATABench: Evaluating Dataset Auditing in Deep Learning from an Adversarial Perspective.
CoRR, July, 2025

Revisiting Data Auditing in Large Vision-Language Models.
CoRR, April, 2025

Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models.
CoRR, February, 2025

WHU-Synthetic: A Synthetic Perception Dataset for 3-D Multitask Model Research.
IEEE Trans. Geosci. Remote. Sens., 2025

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Invisible Backdoor Attack against Self-supervised Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025

Transfer Learning of Real Image Features with Soft Contrastive Loss for Fake Image Detection.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
VEnvision3D: A Synthetic Perception Dataset for 3D Multi-Task Model Research.
CoRR, 2024

Lips Are Lying: Spotting the Temporal Inconsistency between Audio and Visual in Lip-Syncing DeepFakes.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Nearest is Not Dearest: Towards Practical Defense Against Quantization-Conditioned Backdoor Attacks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023

Dual-level Interaction for Domain Adaptive Semantic Segmentation.
CoRR, 2023

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Dual-level Interaction for Domain Adaptive Semantic Segmentation.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
CoRR, 2022

Comprehensive Evaluation of Emergency Shelters in Wuhan City Based on GIS.
CoRR, 2022

Optimized Design Method for Satellite Constellation Configuration Based on Real-time Coverage Area Evaluation.
Proceedings of the 29th International Conference on Geoinformatics, 2022

Comprehensive Evaluation of Emergency Shelters in Wuhan City Based on GIS.
Proceedings of the 29th International Conference on Geoinformatics, 2022


  Loading...