Author of the publication

Generated Graph Detection.

, , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 23412-23428. PMLR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models., , , , , and . CoRR, (2023)A Comprehensive Study of Privacy Risks in Curriculum Learning., , , , and . CoRR, (2023)Membership Inference Attack Against Masked Image Modeling., , , and . CoRR, (2024)A Hybrid Model Coupling Physical Constraints and Machine Learning to Estimate Daily Evapotranspiration in the Heihe River Basin., , , , , , , , , and 4 other author(s). Remote. Sens., 16 (12): 2143 (June 2024)JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models., , , , , , and . CoRR, (2024)Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders., , , , and . CoRR, (2022)LBSLab: A User Data Collection System in Mobile Environments., , , , , , , , , and 1 other author(s). UbiComp/ISWC Adjunct, page 624-629. ACM, (2018)ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models., , , , , , , , and . USENIX Security Symposium, page 4525-4542. USENIX Association, (2022)A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots., , , , and . USENIX Security Symposium, page 5289-5306. USENIX Association, (2023)Cross-Site Prediction on Social Influence for Cold-Start Users in Online Social Networks., , , , , , and . WWW (Companion Volume), page 389. ACM, (2022)