Jiaming He

Orcid: 0009-0007-7476-2293

According to our database1, Jiaming He authored at least 38 papers between 2008 and 2026.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Spectral Defense Against Resource-Targeting Attack in 3D Gaussian Splatting.
CoRR, March, 2026

UTOPIA: Unlearnable Tabular Data via Decoupled Shortcut Embedding.
CoRR, February, 2026

LLM-PD: A Large Language Model-Driven Policy Distillation-Based Method for Multi-UAV Path Planning.
IEEE Internet Things J., 2026

TrojanEdit: Multimodal backdoor attack against image editing model.
Neurocomputing, 2026

2025
TEAR: Temporal-aware Automated Red-teaming for Text-to-Video Models.
CoRR, November, 2025

On the Feasibility of Hijacking MLLMs' Decision Chain via One Perturbation.
CoRR, November, 2025

BusAllocVis: towards optimizing bus-to-depot allocation for carbon emission reduction.
J. Vis., June, 2025

Evaluating Robustness of Large Audio Language Models to Audio Injection: An Empirical Study.
CoRR, May, 2025

BadDepth: Backdoor Attacks Against Monocular Depth Estimation in the Physical World.
CoRR, May, 2025

I2I Backdoor: Backdoor Attacks Against Image-to-Image Tasks.
IEEE Trans. Dependable Secur. Comput., 2025

Evaluation of neutrophil gelatinase-associated lipocalin precision in periprosthetic joint infection diagnosis.
Int. J. Data Min. Bioinform., 2025

You Are Out of My Focus: A Defocus-Blur Backdoor Attack against Deep Learning Models.
Proceedings of the 7th ACM International Conference on Multimedia in Asia, 2025

When Hallucinated Concepts Cross Modals: Unveiling Backdoor Vulnerability in Multi-modal In-context Learning.
Proceedings of the 7th ACM International Conference on Multimedia in Asia, 2025

A Hidden Backdoor Attack via Formal Text Style Transfer in Language Models.
Proceedings of the International Joint Conference on Neural Networks, 2025

Weaponizing Tokens: Backdooring Text-to-Image Generation via Token Remapping.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2025

BadRefSR: Backdoor Attacks Against Reference-based Image Super Resolution.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

PRESS: Defending Privacy in Retrieval-Augmented Generation via Embedding Space Shifting.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025

CLBA: A Cross-Lingual Backdoor Attack against Text-to-Image Diffusion Models.
Proceedings of the 2025 IEEE Global Communications Conference, 2025

Evaluating Robustness of Large Audio Language Models to Audio Injection: An Empirical Study.
Proceedings of the 2025 Conference on Empirical Methods in Natural Language Processing, 2025

Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models.
Proceedings of the Thirty-Ninth AAAI Conference on Artificial Intelligence, 2025

2024
Combinational Backdoor Attack against Customized Text-to-Image Models.
CoRR, 2024

Backdoor Attacks against Image-to-Image Networks.
CoRR, 2024

Talk Too Much: Poisoning Large Language Models under Token Limit.
CoRR, 2024

DDN-SLAM: Real-time Dense Dynamic Neural Implicit SLAM with Joint Semantic Encoding.
CoRR, 2024

PLE-SLAM: A Visual-Inertial SLAM Based on Point-Line Features and Efficient IMU Initialization.
CoRR, 2024

Mtisa: Multi-Target Image-Scaling Attack.
Proceedings of the IEEE International Conference on Communications, 2024

BadTTS: Identifying Vulnerabilities in Neural Text-to-Speech Models.
Proceedings of the 2024 IEEE Global Communications Conference, 2024

2023
End-to-End RGB-D SLAM With Multi-MLPs Dense Neural Implicit Representations.
IEEE Robotics Autom. Lett., November, 2023

2020
Hierarchical Matching Network for Heterogeneous Entity Resolution.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

2019
Mobile Gaming on Personal Computers with Direct Android Emulation.
Proceedings of the 25th Annual International Conference on Mobile Computing and Networking, 2019

2015
Congestion Control, Routing, and Scheduling in Wireless Networks With Interference Cancelation Capabilities.
IEEE Trans. Veh. Technol., 2015

2014
A Grey List-Based Privacy Protection for Android.
J. Softw., 2014

A Participation-Based Trust Model for Mobile P2P Networks.
J. Networks, 2014

Distributed link scheduling in wireless networks with interference cancellation capabilities.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Understanding the benefits of successive interference cancellation in multi-rate multi-hop wireless networks.
Proceedings of the IEEE International Conference on Communications, 2014

2010
Low-complexity Grouping Spectrum Management in Multi-user DSL Networks.
J. Next Gener. Inf. Technol., 2010

2009
Research on the Optimization of Encryption and Authentication Mode of EAX about Broadband Wireless Communications Equipment.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Digital Right Management Model Based on Cryptography and Digital Watermarking.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...