default search action
Ziqiang Li 0001
Person information
- affiliation: University of Science and Technology of China, Hefei, Anhui, China
Other persons with the same name
- Ziqiang Li — disambiguation page
- Ziqiang Li 0002 — Xiangtan University, Xiangtan, China
- Ziqiang Li 0003 — Southeast University, Nanjing, China
- Ziqiang Li 0004 — Fudan University, Shanghai, China
- Ziqiang Li 0005 — Southern University of Science and Technology, Shenzhen, Guangdong, China
- Ziqiang Li 0006 — Virginia Polytechnic Institute and State University, Blacksburg, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Ziqiang Li, Hong Sun, Pengfei Xia, Beihao Xia, Xue Rui, Wei Zhang, Qinglang Guo, Zhangjie Fu, Bin Li:
A Proxy Attack-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks. IEEE Trans. Inf. Forensics Secur. 19: 9730-9743 (2024) - [c9]Pengfei Xia, Ziqiang Li, Bin Li:
Tightening the Approximation Error of Adversarial Risk with Auto Loss Function Search. GECCO Companion 2024: 1563-1572 - [c8]Ziqiang Li, Hong Sun, Pengfei Xia, Heng Li, Beihao Xia, Yi Wu, Bin Li:
Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios. ICLR 2024 - [i20]Hong Sun, Ziqiang Li, Lei Liu, Bin Li:
Real is not True: Backdoor Attacks Against Deepfake Detection. CoRR abs/2403.06610 (2024) - [i19]Yi Wu, Ziqiang Li, Heliang Zheng, Chaoyue Wang, Bin Li:
Infinite-ID: Identity-preserved Personalization via ID-semantics Decoupling Paradigm. CoRR abs/2403.11781 (2024) - [i18]Ziqiang Li, Yueqi Zeng, Pengfei Xia, Lei Liu, Zhangjie Fu, Bin Li:
Large Language Models are Good Attackers: Efficient and Stealthy Textual Backdoor Attacks. CoRR abs/2408.11587 (2024) - 2023
- [j7]Ziqiang Li, Muhammad Usman, Rentuo Tao, Pengfei Xia, Chaoyue Wang, Huanhuan Chen, Bin Li:
A Systematic Survey of Regularization and Normalization in GANs. ACM Comput. Surv. 55(11): 232:1-232:37 (2023) - [j6]Pengfei Xia, Hongjing Niu, Ziqiang Li, Bin Li:
Enhancing Backdoor Attacks With Multi-Level MMD Regularization. IEEE Trans. Dependable Secur. Comput. 20(2): 1675-1686 (2023) - [j5]Ziqiang Li, Pengfei Xia, Rentuo Tao, Hongjing Niu, Bin Li:
A New Perspective on Stabilizing GANs Training: Direct Adversarial Training. IEEE Trans. Emerg. Top. Comput. Intell. 7(1): 178-189 (2023) - [j4]Ziqiang Li, Pengfei Xia, Xue Rui, Bin Li:
Exploring the Effect of High-frequency Components in GANs Training. ACM Trans. Multim. Comput. Commun. Appl. 19(5): 153:1-153:22 (2023) - [c7]Yi Wu, Ziqiang Li, Chaoyue Wang, Heliang Zheng, Shanshan Zhao, Bin Li, Dacheng Tao:
Domain Re-Modulation for Few-Shot Generative Domain Adaptation. NeurIPS 2023 - [i17]Yi Wu, Ziqiang Li, Chaoyue Wang, Heliang Zheng, Shanshan Zhao, Bin Li, Dacheng Tao:
Domain Re-Modulation for Few-Shot Generative Domain Adaptation. CoRR abs/2302.02550 (2023) - [i16]Ziqiang Li, Hong Sun, Pengfei Xia, Beihao Xia, Xue Rui, Wei Zhang, Bin Li:
A Proxy-Free Strategy for Practically Improving the Poisoning Efficiency in Backdoor Attacks. CoRR abs/2306.08313 (2023) - [i15]Hong Sun, Ziqiang Li, Pengfei Xia, Heng Li, Beihao Xia, Yi Wu, Bin Li:
Efficient Backdoor Attacks for Deep Neural Networks in Real-world Scenarios. CoRR abs/2306.08386 (2023) - [i14]Ziqiang Li, Pengfei Xia, Hong Sun, Yueqi Zeng, Wei Zhang, Bin Li:
Explore the Effect of Data Selection on Poison Efficiency in Backdoor Attacks. CoRR abs/2310.09744 (2023) - [i13]Ziqiang Li, Chaoyue Wang, Xue Rui, Chao Xue, Jiaxu Leng, Bin Li:
Peer is Your Pillar: A Data-unbalanced Conditional GANs for Few-shot Image Generation. CoRR abs/2311.08217 (2023) - [i12]Yueqi Zeng, Ziqiang Li, Pengfei Xia, Lei Liu, Bin Li:
Efficient Trigger Word Insertion. CoRR abs/2311.13957 (2023) - 2022
- [c6]Ziqiang Li, Chaoyue Wang, Heliang Zheng, Jing Zhang, Bin Li:
FakeCLR: Exploring Contrastive Learning for Solving Latent Discontinuity in Data-Efficient GANs. ECCV (15) 2022: 598-615 - [c5]Pengfei Xia, Ziqiang Li, Wei Zhang, Bin Li:
Data-Efficient Backdoor Attacks. IJCAI 2022: 3992-3998 - [i11]Ziqiang Li, Xintian Wu, Beihao Xia, Jing Zhang, Chaoyue Wang, Bin Li:
A Comprehensive Survey on Data-Efficient GANs in Image Generation. CoRR abs/2204.08329 (2022) - [i10]Pengfei Xia, Ziqiang Li, Wei Zhang, Bin Li:
Data-Efficient Backdoor Attacks. CoRR abs/2204.12281 (2022) - [i9]Ziqiang Li, Chaoyue Wang, Heliang Zheng, Jing Zhang, Bin Li:
FakeCLR: Exploring Contrastive Learning for Solving Latent Discontinuity in Data-Efficient GANs. CoRR abs/2207.08630 (2022) - 2021
- [j3]Pengfei Xia, Hongjing Niu, Ziqiang Li, Bin Li:
On the receptive field misalignment in CAM-based visual explanations. Pattern Recognit. Lett. 152: 275-282 (2021) - [j2]Ziqiang Li, Rentuo Tao, Jie Wang, Fu Li, Hongjing Niu, Mingdao Yue, Bin Li:
Interpreting the Latent Space of GANs via Measuring Decoupling. IEEE Trans. Artif. Intell. 2(1): 58-70 (2021) - [i8]Pengfei Xia, Ziqiang Li, Hongjing Niu, Bin Li:
Understanding the Error in Evaluating Adversarial Robustness. CoRR abs/2101.02325 (2021) - [i7]Ziqiang Li, Pengfei Xia, Xue Rui, Yanghui Hu, Bin Li:
Are High-Frequency Components Beneficial for Training of Generative Adversarial Networks. CoRR abs/2103.11093 (2021) - [i6]Pengfei Xia, Ziqiang Li, Bin Li:
Tightening the Approximation Error of Adversarial Risk with Auto Loss Function Search. CoRR abs/2111.05063 (2021) - [i5]Pengfei Xia, Hongjing Niu, Ziqiang Li, Bin Li:
A Statistical Difference Reduction Method for Escaping Backdoor Detection. CoRR abs/2111.05077 (2021) - 2020
- [c4]Ziqiang Li, Rentuo Tao, Qianrun Wu, Bin Li:
DA-RefineNet: Dual-inputs Attention RefineNet for Whole Slide Image Segmentation. ICPR 2020: 1918-1925 - [c3]Ziqiang Li, Rentuo Tao, Hongjing Niu, Mingdao Yue, Bin Li:
Interpreting the Latent Space of GANs via Correlation Analysis for Controllable Concept Manipulation. ICPR 2020: 1942-1948 - [i4]Ziqiang Li, Rentuo Tao, Hongjing Niu, Bin Li:
Interpreting the Latent Space of GANs via Correlation Analysis for Controllable Concept Manipulation. CoRR abs/2006.10132 (2020) - [i3]Ziqiang Li, Rentuo Tao, Bin Li:
Regularization And Normalization For Generative Adversarial Networks: A Review. CoRR abs/2008.08930 (2020) - [i2]Ziqiang Li, Pengfei Xia, Mingdao Yue, Bin Li:
Direct Adversarial Training for GANs. CoRR abs/2008.09041 (2020)
2010 – 2019
- 2019
- [j1]Rentuo Tao, Ziqiang Li, Renshuai Tao, Bin Li:
ResAttr-GAN: Unpaired Deep Residual Attributes Learning for Multi-Domain Face Image Translation. IEEE Access 7: 132594-132608 (2019) - [i1]Ziqiang Li, Rentuo Tao, Qianrun Wu, Bin Li:
DA-RefineNet:A Dual Input Whole Slide Image Segmentation Algorithm Based on Attention. CoRR abs/1907.06358 (2019) - 2017
- [c2]Wen Zhang, Ziqiang Li, Bin Li:
Developer Teams on Bug Resolution: An Empirical Study on Mozilla Firefox and Eclipse JDT Projects. APSEC Workshops 2017: 32-40 - [c1]Gongming Zhao, Liusheng Huang, Ziqiang Li, Hongli Xu:
Load-Balancing Software-Defined Networking Through Hybrid Routing. WASA 2017: 96-108
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint