Остановите войну!
for scientists:
default search action
Xinlei He
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Mingyuan Zhang, Xiao Cui, Liuwei Zhao, Xinlei He, Yu Shi, Jianhong Yang, YuXin Leng:
A lightweight deep learning based bowel sounds segmentation algorithm for gastrointestinal (GI) monitoring. Eng. Appl. Artif. Intell. 127(Part A): 107446 (2024) - [j15]Guang Huo, Ruyuan Li, Jianlou Lou, Xiaolu Yu, Jiajun Wang, Xinlei He, Yue Wang:
Deep metric learning method for open-set iris recognition. J. Electronic Imaging 33(3) (2024) - [j14]Xiang Li, Feihu Xue, Jianli Ding, Tongren Xu, Lisheng Song, Zijie Pang, Jinjie Wang, Ziwei Xu, Yanfei Ma, Zheng Lu, Dongxing Wu, Jiaxing Wei, Xinlei He, Yuan Zhang:
A Hybrid Model Coupling Physical Constraints and Machine Learning to Estimate Daily Evapotranspiration in the Heihe River Basin. Remote. Sens. 16(12): 2143 (2024) - [i31]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. CoRR abs/2404.05188 (2024) - [i30]Yixin Wu, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Link Stealing Attacks Against Inductive Graph Neural Networks. CoRR abs/2405.05784 (2024) - [i29]Yanling Wang, Haoyang Li, Hao Zou, Jing Zhang, Xinlei He, Qi Li, Ke Xu:
Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models. CoRR abs/2406.05328 (2024) - [i28]Delong Ran, Jinyuan Liu, Yichen Gong, Jingyi Zheng, Xinlei He, Tianshuo Cong, Anyu Wang:
JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models. CoRR abs/2406.09321 (2024) - 2023
- [j13]Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao:
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions. IEEE Trans. Mob. Comput. 22(1): 556-573 (2023) - [c19]Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. CCS 2023: 3403-3417 - [c18]Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders. CVPR 2023: 16373-16383 - [c17]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. ICML 2023: 23412-23428 - [c16]Ziqing Yang, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, Yang Zhang:
Data Poisoning Attacks Against Multimodal Encoders. ICML 2023: 39299-39313 - [c15]Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. SP 2023: 293-310 - [c14]Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang:
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. USENIX Security Symposium 2023: 5289-5306 - [i27]Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang:
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. CoRR abs/2302.11982 (2023) - [i26]Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang:
MGTBench: Benchmarking Machine-Generated Text Detection. CoRR abs/2303.14822 (2023) - [i25]Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. CoRR abs/2305.13873 (2023) - [i24]Yihan Ma, Zhengyu Zhao, Xinlei He, Zheng Li, Michael Backes, Yang Zhang:
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis. CoRR abs/2306.07754 (2023) - [i23]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. CoRR abs/2306.07758 (2023) - [i22]Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang:
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content. CoRR abs/2308.05596 (2023) - [i21]Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang:
Test-Time Poisoning Attacks Against Test-Time Adaptation Models. CoRR abs/2308.08505 (2023) - [i20]Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li:
A Comprehensive Study of Privacy Risks in Curriculum Learning. CoRR abs/2310.10124 (2023) - [i19]Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang:
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models. CoRR abs/2310.12665 (2023) - 2022
- [j12]Yuan Zhang, Shaomin Liu, Lisheng Song, Xiang Li, Zhenzhen Jia, Tongren Xu, Ziwei Xu, Yanfei Ma, Ji Zhou, Xiaofan Yang, Xinlei He, Yunjun Yao, Guangcheng Hu:
Integrated Validation of Coarse Remotely Sensed Evapotranspiration Products over Heterogeneous Land Surfaces. Remote. Sens. 14(14): 3467 (2022) - [j11]Yingze Tian, Tongren Xu, Fei Chen, Xinlei He, Shi Li:
Can Data Assimilation Improve Short-Term Prediction of Land Surface Variables? Remote. Sens. 14(20): 5172 (2022) - [c13]Tianshuo Cong, Xinlei He, Yang Zhang:
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. CCS 2022: 579-593 - [c12]Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Auditing Membership Leakages of Multi-Exit Networks. CCS 2022: 1917-1931 - [c11]Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang:
Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning. ECCV (31) 2022: 365-381 - [c10]Chao Wang, Yi Gu, Jie Li, Xinlei He, Zirui Zhang, Yuting Gao, Chentao Wu:
Iterative Learning for Distorted Image Restoration. ICASSP 2022: 2085-2089 - [c9]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. ICWSM 2022: 944-955 - [c8]Yun Shen, Xinlei He, Yufei Han, Yang Zhang:
Model Stealing Attacks Against Inductive Graph Neural Networks. SP 2022: 1175-1192 - [c7]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. USENIX Security Symposium 2022: 4525-4542 - [c6]Qingyuan Gong, Yang Chen, Xinlei He, Yu Xiao, Pan Hui, Xin Wang, Xiaoming Fu:
Cross-Site Prediction on Social Influence for Cold-Start Users in Online Social Networks. WWW (Companion Volume) 2022: 389 - [i18]Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders. CoRR abs/2201.07513 (2022) - [i17]Tianshuo Cong, Xinlei He, Yang Zhang:
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. CoRR abs/2201.11692 (2022) - [i16]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. CoRR abs/2204.08935 (2022) - [i15]Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang:
Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning. CoRR abs/2207.12535 (2022) - [i14]Xinlei He, Zheng Li, Weilin Xu, Cory Cornelius, Yang Zhang:
Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models. CoRR abs/2208.10445 (2022) - [i13]Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Auditing Membership Leakages of Multi-Exit Networks. CoRR abs/2208.11180 (2022) - [i12]Ziqing Yang, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, Yang Zhang:
Data Poisoning Attacks Against Multimodal Encoders. CoRR abs/2209.15266 (2022) - [i11]Xinyue Shen, Xinlei He, Zheng Li, Yun Shen, Michael Backes, Yang Zhang:
Backdoor Attacks in the Supply Chain of Masked Image Modeling. CoRR abs/2210.01632 (2022) - [i10]Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. CoRR abs/2212.06573 (2022) - [i9]Zeyang Sha, Xinlei He, Pascal Berrang, Mathias Humbert, Yang Zhang:
Fine-Tuning Is All You Need to Mitigate Backdoor Attacks. CoRR abs/2212.09067 (2022) - 2021
- [j10]Huaize Feng, Tongren Xu, Liangyun Liu, Sha Zhou, Jingxue Zhao, Shaomin Liu, Ziwei Xu, Kebiao Mao, Xinlei He, Zhongli Zhu, Linna Chai:
Modeling Transpiration with Sun-Induced Chlorophyll Fluorescence Observations via Carbon-Water Coupling Methods. Remote. Sens. 13(4): 804 (2021) - [j9]Xiang Li, Shaomin Liu, Xiaofan Yang, Yanfei Ma, Xinlei He, Ziwei Xu, Tongren Xu, Lisheng Song, Yuan Zhang, Xiao Hu, Qian Ju, Xiaodong Zhang:
Upscaling Evapotranspiration from a Single-Site to Satellite Pixel Scale. Remote. Sens. 13(20): 4072 (2021) - [j8]Xinlei He, Qingyuan Gong, Yang Chen, Yang Zhang, Xin Wang, Xiaoming Fu:
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network. IEEE Trans. Dependable Secur. Comput. 18(5): 2193-2208 (2021) - [j7]Qingyuan Gong, Yang Chen, Xinlei He, Yu Xiao, Pan Hui, Xin Wang, Xiaoming Fu:
Cross-site Prediction on Social Influence for Cold-start Users in Online Social Networks. ACM Trans. Web 15(2): 6:1-6:23 (2021) - [c5]Xinlei He, Yang Zhang:
Quantifying and Mitigating Privacy Risks of Contrastive Learning. CCS 2021: 845-863 - [c4]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. USENIX Security Symposium 2021: 2669-2686 - [i8]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. CoRR abs/2102.02551 (2021) - [i7]Xinlei He, Yang Zhang:
Quantifying and Mitigating Privacy Risks of Contrastive Learning. CoRR abs/2102.04140 (2021) - [i6]Xinlei He, Rui Wen, Yixin Wu, Michael Backes, Yun Shen, Yang Zhang:
Node-Level Membership Inference Attacks Against Graph Neural Networks. CoRR abs/2102.05429 (2021) - [i5]Yun Shen, Xinlei He, Yufei Han, Yang Zhang:
Model Stealing Attacks Against Inductive Graph Neural Networks. CoRR abs/2112.08331 (2021) - 2020
- [j6]Chen Shi, Qingbin Wang, Xinlei He, Xiaoshuan Zhang, Daoliang Li:
An automatic method of fish length estimation using underwater stereo system based on LabVIEW. Comput. Electron. Agric. 173: 105419 (2020) - [j5]Jingxue Zhao, Tongren Xu, Jingfeng Xiao, Shaomin Liu, Kebiao Mao, Lisheng Song, Yunjun Yao, Xinlei He, Huaize Feng:
Responses of Water Use Efficiency to Drought in Southwest China. Remote. Sens. 12(1): 199 (2020) - [j4]Xinlei He, Tongren Xu, Youlong Xia, Sayed M. Bateni, Zhixia Guo, Shaomin Liu, Kebiao Mao, Yuan Zhang, Huaize Feng, Jingxue Zhao:
A Bayesian Three-Cornered Hat (BTCH) Method: Improving the Terrestrial Evapotranspiration Estimation. Remote. Sens. 12(5): 878 (2020) - [i4]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. CoRR abs/2005.02131 (2020) - [i3]Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos:
Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter. CoRR abs/2006.09938 (2020)
2010 – 2019
- 2019
- [i2]Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos:
On the Influence of Twitter Trolls during the 2016 US Presidential Election. CoRR abs/1910.00531 (2019) - [i1]Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao:
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions. CoRR abs/1912.01328 (2019) - 2018
- [j3]Chenxi Yang, Yang Chen, Qingyuan Gong, Xinlei He, Yu Xiao, Yuhuan Huang, Xiaoming Fu:
Understanding the behavioral differences between american and german users: A data-driven study. Big Data Min. Anal. 1(4): 284-296 (2018) - [j2]Qingyuan Gong, Yang Chen, Xinlei He, Zhou Zhuang, Tianyi Wang, Hong Huang, Xin Wang, Xiaoming Fu:
DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks. IEEE Commun. Mag. 56(11): 21-27 (2018) - [j1]Xinlei He, Tongren Xu, Sayed M. Bateni, Christopher M. U. Neale, Thomas Auligne, Shaomin Liu, Kaicun Wang, Kebiao Mao, Yunjun Yao:
Evaluation of the Weak Constraint Data Assimilation Approach for Estimating Turbulent Heat Fluxes at Six Sites. Remote. Sens. 10(12): 1994 (2018) - [c3]Qingyuan Gong, Yang Chen, Xinlei He, Fei Li, Yu Xiao, Pan Hui, Xin Wang, Xiaoming Fu:
Identification of Influential Users in Emerging Online Social Networks Using Cross-site Linking. ChineseCSCW 2018: 331-341 - [c2]Qingyuan Gong, Xinlei He, Qinge Xie, Shihan Lin, Guozhen She, Ruiyu Fang, Rui Han, Yang Chen, Yu Xiao, Xiaoming Fu, Xin Wang:
LBSLab: A User Data Collection System in Mobile Environments. UbiComp/ISWC Adjunct 2018: 624-629 - [c1]Jiaqi Wang, Xinlei He, Qingyuan Gong, Yang Chen, Tianyi Wang, Xin Wang:
Deep Learning-Based Malicious Account Detection in the Momo Social Network. ICCCN 2018: 1-2
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 23:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint