Xinlei He
Orcid: 0009-0007-3879-9080Affiliations:
- Hong Kong University of Science and Technology, Hong Kong
- CISPA Helmholtz Center for Information Security, Saarland University, Germany (PhD 2023)
- Fudan University, Shanghai, China (former)
According to our database1,
Xinlei He
authored at least 73 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2025
ZPD-SCA: Unveiling the Blind Spots of LLMs in Assessing Students' Cognitive Abilities.
CoRR, August, 2025
CoRR, July, 2025
CoRR, July, 2025
CoRR, June, 2025
Prediction Inconsistency Helps Achieve Generalizable Detection of Adversarial Examples.
CoRR, June, 2025
Evaluation Hallucination in Multi-Round Incomplete Information Lateral-Driven Reasoning Tasks.
CoRR, May, 2025
CoRR, May, 2025
FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models.
CoRR, May, 2025
An Empirical Study of the Anchoring Effect in LLMs: Existence, Mechanism, and Potential Mitigations.
CoRR, May, 2025
RePPL: Recalibrating Perplexity by Uncertainty in Semantic Propagation and Language Generation for Explainable QA Hallucination Detection.
CoRR, May, 2025
CoRR, May, 2025
"I Can See Forever!": Evaluating Real-time VideoLLMs for Assisting Individuals with Visual Impairments.
CoRR, May, 2025
Humanizing LLMs: A Survey of Psychological Measurements with Tools, Datasets, and Human-Agent Applications.
CoRR, May, 2025
CoRR, April, 2025
TH-Bench: Evaluating Evading Attacks via Humanizing AI Text on Machine-Generated Text Detectors.
CoRR, March, 2025
CoRR, February, 2025
Behind the Tip of Efficiency: Uncovering the Submerged Threats of Jailbreak Attacks in Small Language Models.
CoRR, February, 2025
An Improved Privacy and Utility Analysis of Differentially Private SGD with Bounded Domain and Smooth Losses.
CoRR, February, 2025
CoRR, February, 2025
Proc. Priv. Enhancing Technol., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Beyond the Tip of Efficiency: Uncovering the Submerged Threats of Jailbreak Attacks in Small Language Models.
Proceedings of the Findings of the Association for Computational Linguistics, 2025
Are We in the AI-Generated Text World Already? Quantifying and Monitoring AIGT on Social Media.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Proc. Priv. Enhancing Technol., 2024
CoRR, 2024
CoRR, 2024
On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks.
CoRR, 2024
JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models.
CoRR, 2024
Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions.
IEEE Trans. Mob. Comput., 2023
CoRR, 2023
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models.
CoRR, 2022
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Cross-site Prediction on Social Influence for Cold-start Users in Online Social Networks.
ACM Trans. Web, 2021
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network.
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter.
CoRR, 2020
2019
CoRR, 2019
2018
DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks.
IEEE Commun. Mag., 2018
Understanding the behavioral differences between american and german users: A data-driven study.
Big Data Min. Anal., 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers, 2018
Identification of Influential Users in Emerging Online Social Networks Using Cross-site Linking.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2018