Yihao Huang
Orcid: 0000-0002-5784-770XAffiliations:
- Nanyang Technological University, School of Computer Science and Engineering, Singapore
- East China Normal University, Shanghai Key Lab of Trustworthy Computing, China (PhD 2022)
According to our database1,
Yihao Huang
authored at least 68 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
CoRR, August, 2025
Seeing It Before It Happens: In-Generation NSFW Detection for Diffusion-Based Text-to-Image Models.
CoRR, August, 2025
CoRR, June, 2025
CoRR, May, 2025
A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment.
CoRR, April, 2025
Privacy Protection Against Personalized Text-to-Image Synthesis via Cross-image Consistency Constraints.
CoRR, April, 2025
Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models.
CoRR, March, 2025
CoRR, January, 2025
IEEE Trans. Inf. Forensics Secur., 2025
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage.
Proceedings of the 48th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2025
Understanding the Effectiveness of Coverage Criteria for Large Language Models: A Special Angle from Jailbreak Attacks.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025
Proceedings of the Thirteenth International Conference on Learning Representations, 2025
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
IEEE Trans. Circuits Syst. Video Technol., August, 2024
IEEE Trans. Multim., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Proc. ACM Manag. Data, 2024
What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context.
CoRR, 2024
Heuristic-Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models.
CoRR, 2024
Semantic-Aligned Adversarial Evolution Triangle for High-Transferability Vision-Language Attack.
CoRR, 2024
Efficient and Effective Universal Adversarial Attack against Vision-Language Pre-training Models.
CoRR, 2024
Investigating Coverage Criteria in Large Language Models: An In-Depth Study Through Jailbreak Attacks.
CoRR, 2024
NeuSemSlice: Towards Effective DNN Model Maintenance via Neuron-level Semantic Slicing.
CoRR, 2024
Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake.
CoRR, 2024
CoRR, 2024
Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective.
CoRR, 2024
Is Aggregation the Only Choice? Federated Learning via Layer-wise Model Recombination.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Architecture-Agnostic Iterative Black-Box Certified Defense Against Adversarial Patches.
Proceedings of the IEEE International Conference on Acoustics, 2024
CFP: A Reinforcement Learning Framework for Comprehensive Fairness-Performance Trade-Off in Machine Learning.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
TranSegPGD: Improving Transferability of Adversarial Examples on Semantic Segmentation.
CoRR, 2023
AdapterFL: Adaptive Heterogeneous Federated Learning for Resource-constrained Mobile Computing Systems.
CoRR, 2023
Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation.
CoRR, 2023
Towards Better Fairness-Utility Trade-off: A Comprehensive Measurement-Based Reinforcement Learning Framework.
CoRR, 2023
CoRR, 2023
GitFL: Uncertainty-Aware Real-Time Asynchronous Federated Learning Using Version Control.
Proceedings of the IEEE Real-Time Systems Symposium, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Int. J. Comput. Vis., 2022
CoRR, 2022
Proceedings of the Computer Vision - ECCV 2022 Workshops, 2022
2021
AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
2020
CoRR, 2020
FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020
FREPA: an automated and formal approach to requirement modeling and analysis in aircraft control domain.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
2019
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
A Domain Experts Centric Approach to Formal Requirements Modeling and V&V of Embedded Control Software.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019