Boheng Li
Orcid: 0000-0001-9921-7215
According to our database1,
Boheng Li
authored at least 24 papers
between 2022 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
DREAM: Scalable Red Teaming for Text-to-Image Generative Systems via Distribution Modeling.
CoRR, July, 2025
Towards Resilient Safety-driven Unlearning for Diffusion Models against Downstream Fine-tuning.
CoRR, July, 2025
DATABench: Evaluating Dataset Auditing in Deep Learning from an Adversarial Perspective.
CoRR, July, 2025
Towards Label-Only Membership Inference Attack against Pre-trained Large Language Models.
CoRR, February, 2025
IEEE Trans. Geosci. Remote. Sens., 2025
Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2025
Transfer Learning of Real Image Features with Soft Contrastive Loss for Fake Image Detection.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
CoRR, 2024
Lips Are Lying: Spotting the Temporal Inconsistency between Audio and Visual in Lip-Syncing DeepFakes.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Nearest is Not Dearest: Towards Practical Defense Against Quantization-Conditioned Backdoor Attacks.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
CoRR, 2022
CoRR, 2022
Optimized Design Method for Satellite Constellation Configuration Based on Real-time Coverage Area Evaluation.
Proceedings of the 29th International Conference on Geoinformatics, 2022
Proceedings of the 29th International Conference on Geoinformatics, 2022