default search action
Xinfeng Li
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Xinfeng Li, Zhicong Zheng, Chen Yan, Chaohao Li, Xiaoyu Ji, Wenyuan Xu:
Toward Pitch-Insensitive Speaker Verification via Soundfield. IEEE Internet Things J. 11(1): 1175-1189 (2024) - [j10]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. IEEE Internet Things J. 11(8): 13108-13124 (2024) - [j9]Ruiwen He, Yushi Cheng, Junning Ze, Xinfeng Li, Xiaoyu Ji, Wenyuan Xu:
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate. IEEE Trans. Dependable Secur. Comput. 21(6): 5582-5599 (2024) - [c29]Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. CCS 2024: 1151-1165 - [c28]Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
SafeEar: Content Privacy-Preserving Audio Deepfake Detection. CCS 2024: 3585-3599 - [c27]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models. CCS 2024: 4807-4821 - [c26]Haoyu Tang, Zhaoyi Liu, Chang Zeng, Xinfeng Li:
Beyond Universal Transformer: Block Reusing with Adaptor in Transformer for Automatic Speech Recognition. ISNN 2024: 69-79 - [c25]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. NDSS 2024 - [i8]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models. CoRR abs/2404.06666 (2024) - [i7]Xuanwang Zhang, Yunze Song, Yidong Wang, Shuyun Tang, Xinfeng Li, Zhengran Zeng, Zhen Wu, Wei Ye, Wenyuan Xu, Yue Zhang, Xinyu Dai, Shikun Zhang, Qingsong Wen:
RAGLAB: A Modular and Research-Oriented Unified Framework for Retrieval-Augmented Generation. CoRR abs/2408.11381 (2024) - [i6]Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen, Jiayang Xu, Xinfeng Li, Wenyuan Xu:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. CoRR abs/2408.15488 (2024) - [i5]Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. CoRR abs/2409.02074 (2024) - [i4]Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
SafeEar: Content Privacy-Preserving Audio Deepfake Detection. CoRR abs/2409.09272 (2024) - 2023
- [j8]Xinfeng Li, Shuai Xiao, Paul Kumar, Bünyamin Demir:
Data-driven few-shot crop pest detection based on object pyramid for smart agriculture. J. Electronic Imaging 32(5) (2023) - [j7]Xinfeng Li, Shuai Xiao, Zhuo Zhang:
Sample selecting method based on feature density for pest identification in smart agriculture. Sustain. Comput. Informatics Syst. 40: 100904 (2023) - [c24]Zhicong Zheng, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems. ACM Multimedia 2023: 7849-7858 - [c23]Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu:
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks. USENIX Security Symposium 2023: 2455-2472 - [i3]Haoyu Tang, Zhaoyi Liu, Chang Zeng, Xinfeng Li:
Beyond Universal Transformer: block reusing with adaptor in Transformer for automatic speech recognition. CoRR abs/2303.13072 (2023) - [i2]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. CoRR abs/2306.16022 (2023) - [i1]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. CoRR abs/2308.01040 (2023) - 2022
- [c22]Junning Ze, Xinfeng Li, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound. ICPADS 2022: 193-200 - [c21]Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu:
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. USENIX Security Symposium 2022: 1131-1148 - 2021
- [c20]Mei Qing Du, Peng Song, Donglin Li, Weipeng Ding, Xinfeng Li:
Design and Implementation of the Integrated Platform of Housing and Land Investigation Based on Geopackage. EBEE 2021: 325-331 - [c19]Liang Zhu, Xinfeng Li, Yonggang Wei, Qin Ma, Weiyi Meng:
Integrating Real-Time Entity Resolution with Top-N Join Query Processing. KSEM 2021: 111-123 - [c18]Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu:
EarArray: Defending against DolphinAttack via Acoustic Attenuation. NDSS 2021 - 2020
- [c17]Guang Yao, Zongxuan Liu, Xufeng Guo, Chaoshi Wei, Xinfeng Li, Zhihao Chen:
Prediction of Weather Radar Images via a Deep LSTM for Nowcasting. IJCNN 2020: 1-8
2010 – 2019
- 2017
- [j6]Sihao Ding, Gang Li, Ying Li, Xinfeng Li, Qiang Zhai, Adam C. Champion, Junda Zhu, Dong Xuan, Yuan F. Zheng:
SurvSurf: human retrieval on large surveillance video data. Multim. Tools Appl. 76(5): 6521-6549 (2017) - [j5]Gang Li, Xinfeng Li, Fan Yang, Jin Teng, Sihao Ding, Yuan F. Zheng, Dong Xuan, Biao Chen, Wei Zhao:
Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data. IEEE Trans. Parallel Distributed Syst. 28(9): 2703-2717 (2017) - [c16]Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao:
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance. ICDCS 2017: 689-698 - 2016
- [c15]Xinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan, Biao Chen:
Traffic at-a-glance: Time-bounded analytics on large visual traffic data. INFOCOM 2016: 1-9 - 2015
- [c14]Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao:
VM-tracking: Visual-motion sensing integration for real-time human tracking. INFOCOM 2015: 711-719 - 2014
- [j4]Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. IEEE Trans. Computers 63(6): 1422-1433 (2014) - [j3]Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:
TurfCast: A Service for Controlling Information Dissemination in Wireless Networks. IEEE Trans. Mob. Comput. 13(2): 250-262 (2014) - [j2]Jin Teng, Boying Zhang, Junda Zhu, Xinfeng Li, Dong Xuan, Yuan F. Zheng:
EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization. IEEE/ACM Trans. Netw. 22(4): 1285-1296 (2014) - [c13]Xinfeng Li, Huiling Shi, Zhenghao Niu, Wenqing Lei, Jin Chen:
Research on loss recovery of application layer multicast. ICDIP 2014: 91590B - 2013
- [c12]Xinfeng Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao:
EV-Human: Human localization via visual estimation of body electronic interference. INFOCOM 2013: 500-504 - [c11]Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion, Zhezhe Chen, Feng Qin, Dong Xuan:
D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources. INFOCOM 2013: 791-799 - [c10]Zuoming Yu, Jin Teng, Xinfeng Li, Dong Xuan:
On wireless network coverage in bounded areas. INFOCOM 2013: 1195-1203 - 2012
- [c9]Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:
TurfCast: A service for controlling information dissemination in wireless networks. INFOCOM 2012: 298-306 - [c8]Boying Zhang, Jin Teng, Junda Zhu, Xinfeng Li, Dong Xuan, Yuan F. Zheng:
EV-Loc: integrating electronic and visual signals for accurate localization. MobiHoc 2012: 25-34 - [c7]Haoting Liu, Wei Wang, Xinfeng Li, Fan Li:
Defect segmentation of fiber splicing on an industrial robot system using GMM and graph cut. ROBIO 2012: 1968-1972 - [c6]Adam C. Champion, Xinfeng Li, Qiang Zhai, Jin Teng, Dong Xuan:
Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World. WASA 2012: 235-247 - 2011
- [b1]Xinfeng Li:
Image based human body rendering via regression & MRF energy minimization. Brunel University London, UK, 2011 - [j1]Yulong Tian, Tao Gao, Weifang Zhai, Yaying Hu, Xinfeng Li:
Niche Genetic Algorithm Based on Sexual Reproduction and Multimodal Function Optimization Problem. Int. J. Adv. Pervasive Ubiquitous Comput. 3(1): 7-15 (2011) - [c5]Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. ICDCS 2011: 909-918 - 2010
- [c4]Stuart Steele, Keni Yip, Xinfeng Li:
Critical Areas of Focus in a First Graduate Software Engineering Course. FECS 2010: 216-220 - [c3]Yulong Tian, Weifang Zhai, Xinfeng Li, Yaying Hu, Tao Gao:
Simulation of Tumor Detection Based on Bioelectrical Impedance Measurement. ISIA 2010: 98-104
2000 – 2009
- 2009
- [c2]Xinfeng Li, Xiaoyuan Wang, Nan Zheng, Zhiguo Wan, Ming Gu:
Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks. MSN 2009: 457-464 - [c1]Xiaoyuan Wang, Xinfeng Li, Zhiguo Wan, Ming Gu:
CLEAR: A confidential and Lifetime-Aware Routing Protocol for wireless sensor network. PIMRC 2009: 2265-2269
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint