


default search action
Hao Fang 0011
Person information
- unicode name: 方豪
- affiliation: Tsinghua University, Shenzhen International Graduate School, China
Other persons with the same name
- Hao Fang — disambiguation page
- Hao Fang 0001
— Beijing Institute of Technology, School of Automation / State Key Laboratory of Intelligent Control and Decision of Complex Systems, China (and 3 more)
- Hao Fang 0002 — University of Washington, Department of Electrical Engineering, Seattle, WA, USA (and 1 more)
- Hao Fang 0003
— Bureau International des Poids et Mesures, Sèvres, France (and 1 more)
- Hao Fang 0004 — LSI Corporation, Shanghai, China
- Hao Fang 0005
— Xi'an Research Institute of High Technology, China
- Hao Fang 0006
— Shandong University, School of Pharmacy, Department of Medicinal Chemistry, Jinan, China
- Hao Fang 0007 — Tongji University, Shanghai, China
- Hao Fang 0008 — Peking University, Beijing, China
- Hao Fang 0009 — University of Côte d'Azur, Nice, France
- Hao Fang 0010
— Shandong University, School of software, Jinan, China
- Hao Fang 0012
— Simon Fraser University, Burnaby, BC, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c7]Xinhao Zhong, Bin Chen, Hao Fang, Xulin Gu, Shu-Tao Xia, En-Hui Yang:
Going Beyond Feature Similarity: Effective Dataset distillation based on Class-aware Conditional Mutual Information. ICLR 2025 - [c6]Tianqu Zhuang, Hongyao Yu, Yixiang Qiu, Hao Fang, Bin Chen, Shu-Tao Xia:
Stealthy Shield Defense: A Conditional Mutual Information-Based Approach against Black-Box Model Inversion Attacks. ICLR 2025 - [i12]Hao Fang, Xiaohang Sui, Hongyao Yu, Jiawei Kong, Sijin Yu, Bin Chen, Hao Wu, Shu-Tao Xia:
Retrievals Can Be Detrimental: A Contrastive Backdoor Attack Paradigm on Retrieval-Augmented Diffusion Models. CoRR abs/2501.13340 (2025) - [i11]Jiawei Kong, Hao Fang, Sihang Guo, Chenxi Qing, Bin Chen, Bin Wang, Shu-Tao Xia:
Neural Antidote: Class-Wise Prompt Tuning for Purifying Backdoors in Pre-trained Vision-Language Models. CoRR abs/2502.19269 (2025) - 2024
- [c5]Hao Fang, Jiawei Kong, Bin Chen, Tao Dai, Hao Wu, Shu-Tao Xia:
CLIP-Guided Generative Networks for Transferable Targeted Adversarial Attacks. ECCV (28) 2024: 1-19 - [c4]Yixiang Qiu, Hao Fang, Hongyao Yu, Bin Chen, Mei Kang Qiu, Shu-Tao Xia:
A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks. ECCV (32) 2024: 109-126 - [c3]Yuqi Tan, Yuang Peng, Hao Fang, Bin Chen, Shu-Tao Xia:
WaterDiff: Perceptual Image Watermarks Via Diffusion Model. ICASSP 2024: 3250-3254 - [c2]Yang Cao, Hao Fang, Bin Chen, Xuan Wang, Shutao Xia:
FedSMW: Server-Side Model Watermark Framework for Model Ownership Verification in Federated Learning. WCSP 2024: 18-23 - [i10]Hao Fang, Yixiang Qiu, Hongyao Yu, Wenbo Yu, Jiawei Kong, Baoli Chong, Bin Chen, Xuan Wang, Shu-Tao Xia:
Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses. CoRR abs/2402.04013 (2024) - [i9]Wenbo Yu, Hao Fang, Bin Chen, Xiaohang Sui, Chuan Chen, Hao Wu, Shu-Tao Xia, Ke Xu:
GI-NAS: Boosting Gradient Inversion Attacks through Adaptive Neural Architecture Search. CoRR abs/2405.20725 (2024) - [i8]Hao Fang, Jiawei Kong, Wenbo Yu, Bin Chen, Jiawei Li, Shutao Xia, Ke Xu:
One Perturbation is Enough: On Generating Universal Adversarial Perturbations against Vision-Language Pre-training Models. CoRR abs/2406.05491 (2024) - [i7]Xinhao Zhong, Hao Fang, Bin Chen, Xulin Gu, Tao Dai, Meikang Qiu, Shu-Tao Xia:
Hierarchical Features Matter: A Deep Exploration of GAN Priors for Improved Dataset Distillation. CoRR abs/2406.05704 (2024) - [i6]Hao Fang, Jiawei Kong, Bin Chen, Tao Dai, Hao Wu, Shu-Tao Xia:
CLIP-Guided Networks for Transferable Targeted Attacks. CoRR abs/2407.10179 (2024) - [i5]Yixiang Qiu, Hao Fang, Hongyao Yu, Bin Chen, Meikang Qiu, Shu-Tao Xia:
A Closer Look at GAN Priors: Exploiting Intermediate Features for Enhanced Model Inversion Attacks. CoRR abs/2407.13863 (2024) - [i4]Yixiang Qiu, Hongyao Yu, Hao Fang, Wenbo Yu, Bin Chen, Xuan Wang, Shu-Tao Xia, Ke Xu:
MIBench: A Comprehensive Benchmark for Model Inversion Attack and Defense. CoRR abs/2410.05159 (2024) - [i3]Hongyao Yu, Yixiang Qiu, Hao Fang, Bin Chen, Sijin Yu, Bin Wang, Shu-Tao Xia, Ke Xu:
CALoR: Towards Comprehensive Model Inversion Defense. CoRR abs/2410.05814 (2024) - [i2]Xinhao Zhong, Bin Chen, Hao Fang, Xulin Gu, Shu-Tao Xia, En-Hui Yang:
Going Beyond Feature Similarity: Effective Dataset distillation based on Class-aware Conditional Mutual Information. CoRR abs/2412.09945 (2024) - 2023
- [c1]Hao Fang, Bin Chen, Xuan Wang, Zhi Wang, Shu-Tao Xia:
GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization. ICCV 2023: 4944-4953 - [i1]Hao Fang, Bin Chen, Xuan Wang, Zhi Wang, Shu-Tao Xia:
GIFD: A Generative Gradient Inversion Method with Feature Domain Optimization. CoRR abs/2308.04699 (2023)
Coauthor Index
aka: Shu-Tao Xia

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-19 21:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint