Kaidi Xu

Orcid: 0000-0003-4437-0671

According to our database1, Kaidi Xu authored at least 79 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., January, 2024

Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient LLMs Under Compression.
CoRR, 2024

Medical Unlearnable Examples: Securing Medical Data from Unauthorized Traning via Sparsity-Aware Local Masking.
CoRR, 2024

Unveiling Typographic Deceptions: Insights of the Typographic Vulnerability in Large Vision-Language Model.
CoRR, 2024

Word-Sequence Entropy: Towards Uncertainty Estimation in Free-Form Medical Question Answering Applications and Beyond.
CoRR, 2024

GTBench: Uncovering the Strategic Reasoning Limitations of LLMs via Game-Theoretic Evaluations.
CoRR, 2024

TrustLLM: Trustworthiness in Large Language Models.
CoRR, 2024

Stable Unlearnable Example: Enhancing the Robustness of Unlearnable Examples via Stable Error-Minimizing Noise.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Distributed-Training-and-Execution Multi-Agent Reinforcement Learning for Power Control in HetNet.
IEEE Trans. Commun., October, 2023

Secrecy Rate Maximization of RIS-Assisted SWIPT Systems: A Two-Timescale Beamforming Design Approach.
IEEE Trans. Wirel. Commun., July, 2023

Why does batch normalization induce the model vulnerability on adversarial images?
World Wide Web (WWW), May, 2023

Dynamic Adversarial Attacks on Autonomous Driving Systems.
CoRR, 2023

A Survey on Large Language Model (LLM) Security and Privacy: The Good, the Bad, and the Ugly.
CoRR, 2023

Can Protective Perturbation Safeguard Personal Data from Being Exploited by Stable Diffusion?
CoRR, 2023

ACT: Adversarial Consistency Models.
CoRR, 2023

PINNs-Based Uncertainty Quantification for Transient Stability Analysis.
CoRR, 2023

Pursing the Sparse Limitation of Spiking Deep Learning Structures.
CoRR, 2023

Federated Reinforcement Learning for Resource Allocation in V2X Networks.
CoRR, 2023

Gaining the Sparse Rewards by Exploring Binary Lottery Tickets in Spiking Neural Network.
CoRR, 2023

RBFormer: Improve Adversarial Robustness of Transformer by Robust Bias.
CoRR, 2023

Communication-Efficient Decentralized Federated Learning via One-Bit Compressive Sensing.
CoRR, 2023

Exposing the Fake: Effective Diffusion-Generated Images Detection.
CoRR, 2023

Shifting Attention to Relevance: Towards the Uncertainty Estimation of Large Language Models.
CoRR, 2023

Flew Over Learning Trap: Learn Unlearnable Samples by Progressive Staged Training.
CoRR, 2023

Unlearnable Examples for Diffusion Models: Protect Data from Unauthorized Exploitation.
CoRR, 2023

An Efficient Membership Inference Attack for the Diffusion Model by Proximal Initialization.
CoRR, 2023

Using Caterpillar to Nibble Small-Scale Images.
CoRR, 2023

Improve Video Representation with Temporal Adversarial Augmentation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Are Diffusion Models Vulnerable to Membership Inference Attacks?
Proceedings of the International Conference on Machine Learning, 2023

Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Semantic Adversarial Attacks via Diffusion Models.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

RBFormer: Improve Adversarial Robustness of Transformers by Robust Bias.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

2022
Intelligent Reflecting Surface Aided Full-Duplex Communication: Passive Beamforming and Deployment Design.
IEEE Trans. Wirel. Commun., 2022

Audit and Improve Robustness of Private Neural Networks on Encrypted Data.
CoRR, 2022

Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks.
CoRR, 2022

More or Less (MoL): Defending against Multiple Perturbation Attacks on Deep Neural Networks through Model Ensemble and Compression.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision Workshops, 2022

General Cutting Planes for Bound-Propagation-Based Neural Network Verification.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Toward Robust Spiking Neural Network Against Adversarial Perturbation.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Beamforming Design for Intelligent Reflecting Surface Aided Full-Duplex Relay Systems.
Proceedings of the 12th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2022

A Branch and Bound Framework for Stronger Adversarial Attacks of ReLU Networks.
Proceedings of the International Conference on Machine Learning, 2022

Poster: On the System-Level Effectiveness of Physical Object-Hiding Adversarial Attack in Autonomous Driving.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Iterative Algorithm Induced Deep-Unfolding Neural Networks: Precoding Design for Multiuser MIMO Systems.
IEEE Trans. Wirel. Commun., 2021

MIMO-Aided Nonlinear Hybrid Transceiver Design for Multiuser Mmwave Systems Relying on Tomlinson-Harashima Precoding.
IEEE Trans. Veh. Technol., 2021

Loss-Based Attention for Interpreting Image-Level Prediction of Convolutional Neural Networks.
IEEE Trans. Image Process., 2021

Low-Complexity Joint Power Allocation and Trajectory Design for UAV-Enabled Secure Communications With Power Splitting.
IEEE Trans. Commun., 2021

Efficient Micro-Structured Weight Unification and Pruning for Neural Network Compression.
CoRR, 2021

Mixture of Robust Experts (MoRE): A Flexible Defense Against Multiple Perturbations.
CoRR, 2021

Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Complete and Incomplete Neural Network Verification.
CoRR, 2021

Beta-CROWN: Efficient Bound Propagation with Per-neuron Split Constraints for Neural Network Robustness Verification.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

ScaleCert: Scalable Certified Defense against Adversarial Patches with Sparse Superficial Layers.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Fast and Complete: Enabling Complete Neural Network Verification with Rapid and Massively Parallel Incomplete Verifiers.
Proceedings of the 9th International Conference on Learning Representations, 2021

On Fast Adversarial Robustness Adaptation in Model-Agnostic Meta-Learning.
Proceedings of the 9th International Conference on Learning Representations, 2021

2020
Two-Timescale Hybrid Analog-Digital Beamforming for mmWave Full-Duplex MIMO Multiple-Relay Aided Systems.
IEEE J. Sel. Areas Commun., 2020

Zeroth-Order Hybrid Gradient Descent: Towards A Principled Black-Box Optimization Framework.
CoRR, 2020

Automatic Perturbation Analysis on General Computational Graphs.
CoRR, 2020

Defending against Backdoor Attack on Deep Neural Networks.
CoRR, 2020

Automatic Perturbation Analysis for Scalable Certified Robustness and Beyond.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Min-Max Optimization without Gradients: Convergence and Applications to Black-Box Evasion and Poisoning Attacks.
Proceedings of the 37th International Conference on Machine Learning, 2020

Towards an Efficient and General Framework of Robust Training for Graph Neural Networks.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Adversarial T-Shirt! Evading Person Detectors in a Physical World.
Proceedings of the Computer Vision - ECCV 2020, 2020

Light-weight Calibrator: A Separable Component for Unsupervised Domain Adaptation.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
Evading Real-Time Person Detectors by Adversarial T-shirt.
CoRR, 2019

Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML.
CoRR, 2019

Brain-inspired reverse adversarial examples.
CoRR, 2019

Interpreting Adversarial Examples by Activation Promotion and Suppression.
CoRR, 2019

Second Rethinking of Network Pruning in the Adversarial Setting.
CoRR, 2019

Progressive DNN Compression: A Key to Achieve Ultra-High Weight Pruning and Quantization Rates using ADMM.
CoRR, 2019

ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Structured Adversarial Attack: Towards General Implementation and Better Interpretability.
Proceedings of the 7th International Conference on Learning Representations, 2019

On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

Adversarial Robustness vs. Model Compression, or Both?
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019

REQ-YOLO: A Resource-Aware, Efficient Quantization Framework for Object Detection on FPGAs.
Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2019

ADMM attack: an enhanced adversarial attack for deep neural networks with undetectable distortions.
Proceedings of the 24th Asia and South Pacific Design Automation Conference, 2019

2018
Progressive Weight Pruning of Deep Neural Networks using ADMM.
CoRR, 2018

Structured Adversarial Attack: Towards General Implementation and Better Interpretability.
CoRR, 2018

Reinforced Adversarial Attacks on Deep Neural Networks Using ADMM.
Proceedings of the 2018 IEEE Global Conference on Signal and Information Processing, 2018

2017
Supervised graph hashing for histopathology image retrieval and classification.
Medical Image Anal., 2017

Asymmetric Discrete Graph Hashing.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017


  Loading...