Changjiang Li

Orcid: 0000-0002-1671-7183

According to our database1, Changjiang Li authored at least 24 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?
CoRR, 2024

2023
An Efficient Channel Attention-Enhanced Lightweight Neural Network Model for Metal Surface Defect Detection.
J. Circuits Syst. Comput., August, 2023

A multi-level analysis method for evaluating the risk of roof caving and its application.
J. Intell. Fuzzy Syst., 2023

On the Difficulty of Defending Contrastive Learning against Backdoor Attacks.
CoRR, 2023

Model Extraction Attacks Revisited.
CoRR, 2023

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
CoRR, 2023

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
CoRR, 2023

On the Security Risks of Knowledge Graph Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

The Dark Side of AutoML: Towards Architectural Backdoor Search.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

An Embarrassingly Simple Backdoor Attack on Self-supervised Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022

Hijack Vertical Federated Learning Models with Adversarial Embedding.
CoRR, 2022

Demystifying Self-supervised Trojan Attacks.
CoRR, 2022

Reasoning over Multi-view Knowledge Graphs.
CoRR, 2022

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022

Residual learning network for accurate and stable reconstruction in Cerenkov luminescence tomography.
Proceedings of the Medical Imaging 2022: Biomedical Applications in Molecular, 2022

2021
Towards Robust Reasoning over Knowledge Graphs.
CoRR, 2021

2020
A Generic Anomaly Detection of Catenary Support Components Based on Generative Adversarial Networks.
IEEE Trans. Instrum. Meas., 2020

Deep learning-based visual ensemble method for high-speed railway catenary clevis fracture detection.
Neurocomputing, 2020

2019
A GAN-Based Anomaly Detection Method for Isoelectric Line in High-Speed Railway.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2019

DeT: Defending Against Adversarial Examples via Decreasing Transferability.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
A High-Precision Loose Strands Diagnosis Approach for Isoelectric Line in High-Speed Railway.
IEEE Trans. Ind. Informatics, 2018


  Loading...