default search action
Xi Wu 0001
Person information
- affiliation: Google Inc, Mountain View, CA, USA
- affiliation: University of Wisconsin-Madison, Computer Science Department, WI, USA
- affiliation: Fudan University, Parallel Processing Institute, China
Other persons with the same name
- Xi Wu — disambiguation page
- Xi Wu 0002 — North China University of Technology, College of Science, China
- Xi Wu 0003 — Hefei University of Technology, China
- Xi Wu 0004 — Chengdu University of Information Technology, School of Computer Science, China (and 1 more)
- Xi Wu 0005 — University of Queensland, School of Information Technology and Electrical Engineering, Brisbane, QLD, Australia (and 1 more)
- Xi Wu 0006 — Southeast University, School of Electrical Engineering, Nanjing, China
- Xi Wu 0007 — University of Southern Mississippi, School of Computing, Hattiesburg, MS, USA
- Xi Wu 0008 — Beijing University of Posts and Telecommunications, Key Laboratory of Universal Wireless Communications, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c22]Nils Palumbo, Yang Guo, Xi Wu, Jiefeng Chen, Yingyu Liang, Somesh Jha:
Two Heads are Actually Better than One: Towards Better Adversarial Robustness via Transduction and Rejection. ICML 2024 - 2023
- [c21]Zhenmei Shi, Jiefeng Chen, Kunyang Li, Jayaram Raghuram, Xi Wu, Yingyu Liang, Somesh Jha:
The Trade-off between Universality and Label Efficiency of Representations from Contrastive Learning. ICLR 2023 - [c20]Jiefeng Chen, Jayaram Raghuram, Jihye Choi, Xi Wu, Yingyu Liang, Somesh Jha:
Stratified Adversarial Robustness with Rejection. ICML 2023: 4867-4894 - [i23]Xi Wu, Joe Benassi, Yaqi Zhang, Uyeong Jang, James Foster, Stella Kim, Yujing Sun, Somesh Jha, John Cieslewicz, Jeffrey F. Naughton:
Holistic Cube Analysis: A Query Framework for Data Insights. CoRR abs/2302.00120 (2023) - [i22]Zhenmei Shi, Jiefeng Chen, Kunyang Li, Jayaram Raghuram, Xi Wu, Yingyu Liang, Somesh Jha:
The Trade-off between Universality and Label Efficiency of Representations from Contrastive Learning. CoRR abs/2303.00106 (2023) - [i21]Jiefeng Chen, Jayaram Raghuram, Jihye Choi, Xi Wu, Yingyu Liang, Somesh Jha:
Stratified Adversarial Robustness with Rejection. CoRR abs/2305.01139 (2023) - [i20]Nils Palumbo, Yang Guo, Xi Wu, Jiefeng Chen, Yingyu Liang, Somesh Jha:
Two Heads are Better than One: Towards Better Adversarial Robustness by Combining Transduction and Rejection. CoRR abs/2305.17528 (2023) - [i19]Xi Wu, Xiangyao Yu, Shaleen Deep, Ahmed Mahmood, Uyeong Jang, Stratis Viglas, Somesh Jha, John Cieslewicz, Jeffrey F. Naughton:
Bilevel Relations and Their Applications to Data Insights. CoRR abs/2311.04824 (2023) - 2022
- [j9]Yan Hui, Xi Wu, Xiuhua Hu, Huan Liu, Shijie You:
Unsupervised Cross-Domain Person Re-Identification Method Based on Attention Block and Refined Clustering. IEEE Access 10: 105930-105941 (2022) - [j8]Xiuhua Hu, Huan Liu, Yuan Chen, Yan Hui, Yingyu Liang, Xi Wu:
Siamese Network Object Tracking Algorithm Combining Attention Mechanism and Correlation Filter Theory. Int. J. Pattern Recognit. Artif. Intell. 36(1): 2250003:1-2250003:19 (2022) - [j7]Yan Hui, Yingyu Liang, Xiuhua Hu, Xi Wu, Huan Liu:
Person Re-Identification Combined with Style Transfer and Pose Generation. Int. J. Pattern Recognit. Artif. Intell. 36(2): 2256003:1-2256003:18 (2022) - [j6]Xiuhua Hu, Yingyu Liang, Yan Hui, Xi Wu, Huan Liu, Xuyang Hu:
Person Re-Identification Method Based on the Construction of Graph Convolutional Network with Attribute Feature. Int. J. Pattern Recognit. Artif. Intell. 36(12): 2256019:1-2256019:20 (2022) - [j5]Xiuhua Hu, Huan Liu, Yan Hui, Xi Wu, Jing Zhao:
Transformer Feature Enhancement Network with Template Update for Object Tracking. Sensors 22(14): 5219 (2022) - [c19]Jiefeng Chen, Xi Wu, Yang Guo, Yingyu Liang, Somesh Jha:
Towards Evaluating the Robustness of Neural Networks Learned by Transduction. ICLR 2022 - 2021
- [j4]Firas Abuzaid, Peter Kraft, Sahaana Suri, Edward Gan, Eric Xu, Atul Shenoy, Asvin Ananthanarayan, John Sheu, Erik Meijer, Xi Wu, Jeffrey F. Naughton, Peter Bailis, Matei Zaharia:
DIFF: a relational interface for large-scale data explanation. VLDB J. 30(1): 45-70 (2021) - [c18]Jiefeng Chen, Frederick Liu, Besim Avci, Xi Wu, Yingyu Liang, Somesh Jha:
Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles. NeurIPS 2021: 14980-14992 - [c17]Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha:
ATOM: Robustifying Out-of-Distribution Detection Using Outlier Mining. ECML/PKDD (3) 2021: 430-445 - [i18]Jiefeng Chen, Yang Guo, Xi Wu, Tianqi Li, Qicheng Lao, Yingyu Liang, Somesh Jha:
Towards Adversarial Robustness via Transductive Learning. CoRR abs/2106.08387 (2021) - [i17]Jiefeng Chen, Frederick Liu, Besim Avci, Xi Wu, Yingyu Liang, Somesh Jha:
Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles. CoRR abs/2106.15728 (2021) - [i16]Jiefeng Chen, Xi Wu, Yang Guo, Yingyu Liang, Somesh Jha:
Towards Evaluating the Robustness of Neural Networks Learned by Transduction. CoRR abs/2110.14735 (2021) - 2020
- [c16]Prasad Chalasani, Jiefeng Chen, Amrita Roy Chowdhury, Xi Wu, Somesh Jha:
Concise Explanations of Neural Networks using Adversarial Training. ICML 2020: 1383-1391 - [i15]Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha:
Robust Out-of-distribution Detection in Neural Networks. CoRR abs/2003.09711 (2020) - [i14]Xi Wu, Yang Guo, Jiefeng Chen, Yingyu Liang, Somesh Jha, Prasad Chalasani:
Representation Bayesian Risk Decompositions and Multi-Source Domain Adaptation. CoRR abs/2004.10390 (2020) - [i13]Jiefeng Chen, Yixuan Li, Xi Wu, Yingyu Liang, Somesh Jha:
Robust Out-of-distribution Detection via Informative Outlier Mining. CoRR abs/2006.15207 (2020)
2010 – 2019
- 2019
- [c15]Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha:
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks. EuroS&P 2019: 480-495 - [c14]Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha:
Robust Attribution Regularization. NeurIPS 2019: 14300-14310 - [c13]Fengan Li, Lingjiao Chen, Yijing Zeng, Arun Kumar, Xi Wu, Jeffrey F. Naughton, Jignesh M. Patel:
Tuple-oriented Compression for Large-scale Mini-batch Stochastic Gradient Descent. SIGMOD Conference 2019: 1517-1534 - [i12]Jiefeng Chen, Xi Wu, Vaibhav Rastogi, Yingyu Liang, Somesh Jha:
Robust Attribution Regularization. CoRR abs/1905.09957 (2019) - [i11]Varun Chandrasekaran, Brian Tang, Varsha Pendyala, Kassem Fawaz, Somesh Jha, Xi Wu:
Enhancing ML Robustness Using Physical-World Constraints. CoRR abs/1905.10900 (2019) - 2018
- [j3]Firas Abuzaid, Peter Kraft, Sahaana Suri, Edward Gan, Eric Xu, Atul Shenoy, Asvin Anathanaraya, John Sheu, Erik Meijer, Xi Wu, Jeffrey F. Naughton, Peter Bailis, Matei Zaharia:
DIFF: A Relational Interface for Large-Scale Data Explanation. Proc. VLDB Endow. 12(4): 419-432 (2018) - [c12]Xi Wu, Uyeong Jang, Jiefeng Chen, Lingjiao Chen, Somesh Jha:
Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training. ICML 2018: 5330-5338 - [i10]Jiefeng Chen, Xi Wu, Yingyu Liang, Somesh Jha:
Improving Adversarial Robustness by Data-Specific Discretization. CoRR abs/1805.07816 (2018) - [i9]Prasad Chalasani, Jiefeng Chen, Amrita Roy Chowdhury, Somesh Jha, Xi Wu:
Concise Explanations of Neural Networks using Adversarial Training. CoRR abs/1810.06583 (2018) - 2017
- [c11]Uyeong Jang, Xi Wu, Somesh Jha:
Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. ACSAC 2017: 262-277 - [c10]Xi Wu, Fengan Li, Arun Kumar, Kamalika Chaudhuri, Somesh Jha, Jeffrey F. Naughton:
Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics. SIGMOD Conference 2017: 1307-1322 - [i8]Fengan Li, Lingjiao Chen, Arun Kumar, Jeffrey F. Naughton, Jignesh M. Patel, Xi Wu:
When Lempel-Ziv-Welch Meets Machine Learning: A Case Study of Accelerating Machine Learning using Coding. CoRR abs/1702.06943 (2017) - [i7]Xi Wu, Uyeong Jang, Lingjiao Chen, Somesh Jha:
Manifold Assumption and Defenses Against Adversarial Perturbations. CoRR abs/1711.08001 (2017) - 2016
- [c9]Xi Wu, Matthew Fredrikson, Somesh Jha, Jeffrey F. Naughton:
A Methodology for Formalizing Model-Inversion Attacks. CSF 2016: 355-370 - [c8]Nicolas Papernot, Patrick D. McDaniel, Xi Wu, Somesh Jha, Ananthram Swami:
Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks. IEEE Symposium on Security and Privacy 2016: 582-597 - [i6]Xi Wu, Arun Kumar, Kamalika Chaudhuri, Somesh Jha, Jeffrey F. Naughton:
Differentially Private Stochastic Gradient Descent for in-RDBMS Analytics. CoRR abs/1606.04722 (2016) - 2015
- [j2]Danny Hermelin, Stefan Kratsch, Karolina Soltys, Magnus Wahlström, Xi Wu:
A Completeness Theory for Polynomial (Turing) Kernelization. Algorithmica 71(3): 702-730 (2015) - [i5]Nicolas Papernot, Patrick D. McDaniel, Xi Wu, Somesh Jha, Ananthram Swami:
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks. CoRR abs/1511.04508 (2015) - [i4]Xi Wu, Matthew Fredrikson, Wentao Wu, Somesh Jha, Jeffrey F. Naughton:
Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences. CoRR abs/1512.06388 (2015) - 2014
- [j1]Wentao Wu, Xi Wu, Hakan Hacigümüs, Jeffrey F. Naughton:
Uncertainty Aware Query Execution Time Prediction. Proc. VLDB Endow. 7(14): 1857-1868 (2014) - [i3]Wentao Wu, Xi Wu, Hakan Hacigümüs, Jeffrey F. Naughton:
Uncertainty Aware Query Execution Time Prediction. CoRR abs/1408.6589 (2014) - 2013
- [c7]Danny Hermelin, Stefan Kratsch, Karolina Soltys, Magnus Wahlström, Xi Wu:
A Completeness Theory for Polynomial (Turing) Kernelization. IPEC 2013: 202-215 - 2012
- [c6]Danny Hermelin, Xi Wu:
Weak compositions and their applications to polynomial lower bounds for kernelization. SODA 2012: 104-113 - 2011
- [c5]Zhaoguo Wang, Ran Liu, Yufei Chen, Xi Wu, Haibo Chen, Weihua Zhang, Binyu Zang:
COREMU: a scalable and portable parallel full-system emulator. PPoPP 2011: 213-222 - [i2]Danny Hermelin, Stefan Kratsch, Karolina Soltys, Magnus Wahlström, Xi Wu:
Hierarchies of Inefficient Kernelizability. CoRR abs/1110.0976 (2011) - [i1]Danny Hermelin, Xi Wu:
Weak Compositions and Their Applications to Polynomial Lower-Bounds for Kernelization. Electron. Colloquium Comput. Complex. TR11 (2011) - 2010
- [c4]Rudolf Fleischer, Jiong Guo, Rolf Niedermeier, Johannes Uhlmann, Yihui Wang, Mathias Weller, Xi Wu:
Extended Islands of Tractability for Parsimony Haplotyping. CPM 2010: 214-226
2000 – 2009
- 2009
- [c3]Rudolf Fleischer, Xi Wu, Liwei Yuan:
Experimental Study of FPT Algorithms for the Directed Feedback Vertex Set Problem. ESA 2009: 611-622 - [c2]Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huang, Pen-Chung Yew:
Control flow obfuscation with information flow tracking. MICRO 2009: 391-400 - 2008
- [c1]Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chung Yew, Frederic T. Chong:
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware. ISCA 2008: 401-412
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-07 01:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint