default search action
Peizhuo Lv
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma:
DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models. AAAI 2024: 21850-21858 - [c7]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning. NDSS 2024 - [c6]Hualong Ma, Peizhuo Lv, Kai Chen, Jiachen Zhou:
KGDist: A Prompt-Based Distillation Attack against LMs Augmented with Knowledge Graphs. RAID 2024: 480-495 - [c5]Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. SP 2024: 2515-2533 - [i9]Peizhuo Lv, Hualong Ma, Kai Chen, Jiachen Zhou, Shengzhi Zhang, Ruigang Liang, Shenchen Zhu, Pan Li, Yingjun Zhang:
MEA-Defender: A Robust Watermark against Model Extraction Attack. CoRR abs/2401.15239 (2024) - [i8]Yuehan Zhang, Peizhuo Lv, Yinpeng Liu, Yongqiang Ma, Wei Lu, Xiaofeng Wang, Xiaozhong Liu, Jiawei Liu:
PersonaMark: Personalized LLM watermarking for model protection and user attribution. CoRR abs/2409.09739 (2024) - 2023
- [j1]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Hualong Ma, Yue Zhao, Yingjiu Li:
A Robustness-Assured White-Box Watermark in Neural Networks. IEEE Trans. Dependable Secur. Comput. 20(6): 5214-5229 (2023) - [c4]Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen:
Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain. ECAI 2023: 2954-2961 - [c3]Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang:
DBIA: Data-Free Backdoor Attack Against Transformer Networks. ICME 2023: 2819-2824 - [c2]Peizhuo Lv, Chang Yue, Ruigang Liang, Yunfei Yang, Shengzhi Zhang, Hualong Ma, Kai Chen:
A Data-free Backdoor Injection Approach in Neural Networks. USENIX Security Symposium 2023: 2671-2688 - [c1]Cheng'an Wei, Yeonjoon Lee, Kai Chen, Guozhu Meng, Peizhuo Lv:
Aliasing Backdoor Attacks on Pre-trained Models. USENIX Security Symposium 2023: 2707-2724 - [i7]Pan Li, Peizhuo Lv, Kai Chen, Yuling Cai, Fan Xiang, Shengzhi Zhang:
Model Stealing Attack against Multi-Exit Networks. CoRR abs/2305.13584 (2023) - [i6]Jiachen Zhou, Peizhuo Lv, Yibing Lan, Guozhu Meng, Kai Chen, Hualong Ma:
DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models. CoRR abs/2312.11057 (2023) - 2022
- [i5]Chang Yue, Peizhuo Lv, Ruigang Liang, Kai Chen:
Invisible Backdoor Attacks Using Data Poisoning in the Frequency Domain. CoRR abs/2207.04209 (2022) - [i4]Peizhuo Lv, Pan Li, Shenchen Zhu, Shengzhi Zhang, Kai Chen, Ruigang Liang, Chang Yue, Fan Xiang, Yuling Cai, Hualong Ma, Yingjun Zhang, Guozhu Meng:
SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-supervised Learning. CoRR abs/2209.03563 (2022) - [i3]Pan Li, Peizhuo Lv, Shenchen Zhu, Ruigang Liang, Kai Chen:
A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information. CoRR abs/2210.08956 (2022) - 2021
- [i2]Peizhuo Lv, Pan Li, Shengzhi Zhang, Kai Chen, Ruigang Liang, Yue Zhao, Yingjiu Li:
HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks. CoRR abs/2103.13628 (2021) - [i1]Peizhuo Lv, Hualong Ma, Jiachen Zhou, Ruigang Liang, Kai Chen, Shengzhi Zhang, Yunfei Yang:
DBIA: Data-free Backdoor Injection Attack against Transformer Networks. CoRR abs/2111.11870 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-14 23:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint