Search

Your search keyword '"Zhang, Xuhong"' showing total 638 results

Search Constraints

Start Over You searched for: Author "Zhang, Xuhong" Remove constraint Author: "Zhang, Xuhong"
638 results on '"Zhang, Xuhong"'

Search Results

1. HaVen: Hallucination-Mitigated LLM for Verilog Code Generation Aligned with HDL Engineers

2. Multi-resolution Guided 3D GANs for Medical Image Translation

3. CopyrightMeter: Revisiting Copyright Protection in Text-to-image Models

4. HijackRAG: Hijacking Attacks against Retrieval-Augmented Large Language Models

5. CoreGuard: Safeguarding Foundational Capabilities of LLMs Against Model Stealing in Edge Deployment

6. CollabEdit: Towards Non-destructive Collaborative Knowledge Editing

7. Understanding the AI-powered Binary Code Similarity Detection

8. Bridging Context Gaps: Leveraging Coreference Resolution for Long Contextual Understanding

9. SecCoder: Towards Generalizable and Robust Secure Code Generation

10. G-Fuzz: A Directed Fuzzing Framework for gVisor

11. CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models

12. Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization

13. DP-MemArc: Differential Privacy Transfer Learning for Memory Efficient Language Models

14. Tool-Planner: Task Planning with Clusters across Multiple Tools

15. Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting

16. An Inversion-based Measure of Memorization for Diffusion Models

17. TransLinkGuard: Safeguarding Transformer Models Against Model Stealing in Edge Deployment

18. Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks

19. ERA-CoT: Improving Chain-of-Thought through Entity Relationship Analysis

20. RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-Feedback

21. Elements of Social Convoy Theory in Mobile Health for Palliative Care: Scoping Review

23. PRSA: PRompt Stealing Attacks against Large Language Models

24. 3D Volumetric Super-Resolution in Radiology Using 3D RRDB-GAN

25. MEAOD: Model Extraction Attack against Object Detectors

26. Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval

30. AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection

31. Exploring ChatGPT's Capabilities on Vulnerability Management

32. Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection

33. CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code

34. Facial Data Minimization: Shallow Model as Your Privacy Filter

35. SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices

36. Community-Based Hierarchical Positive-Unlabeled (PU) Model Fusion for Chronic Disease Prediction

37. Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting

38. UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware

39. Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization

40. Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection

41. Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models

42. Edge Deep Learning Model Protection via Neuron Authorization

43. MINER: A Hybrid Data-Driven Approach for REST API Fuzzing

44. FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases

45. TextDefense: Adversarial Text Detection based on Word Importance Entropy

46. One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware

47. HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

48. Hijack Vertical Federated Learning Models As One Party

Catalog

Books, media, physical & digital resources