Boquan Li

Orcid: 0009-0002-0865-7368

Affiliations:
  • Singapore Management University, Singapore
  • Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China (former)


According to our database1, Boquan Li authored at least 12 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Resilient Watermarking for LLM-Generated Codes.
CoRR, 2024

2023
Hierarchical memory-guided long-term tracking with meta transformer inquiry network.
Knowl. Based Syst., 2023

How Generalizable are Deepfake Detectors? An Empirical Study.
CoRR, 2023

2021
Cloud-Based Data Offloading for Multi-focus and Multi-views Image Fusion in Mobile Applications.
Mob. Networks Appl., 2021

FakeFilter: A cross-distribution Deepfake detection system with domain adaptation.
J. Comput. Secur., 2021

An end-to-end text spotter with text relation networks.
Cybersecur., 2021

Finding disposable domain names: A linguistics-based stacking approach.
Comput. Networks, 2021

Adaptive Smooth L1 Loss: A Better Way to Regress Scene Texts with Extreme Aspect Ratios.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

A Residual Fingerprint-Based Defense Against Adversarial Deepfakes.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2019
Restoration as a Defense Against Adversarial Perturbations for Spam Image Detection.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Image Processing, 2019

2018
AdvRefactor: A Resampling-Based Defense Against Adversarial Attacks.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

2017
XGBoost-Based Android Malware Detection.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017


  Loading...