


default search action
Qizhang Li
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j3]Zehao Wang, Yiwen Guo, Qizhang Li, Guanglei Yang
, Wangmeng Zuo:
DualAug: Exploiting additional heavy augmentation with OOD data rejection. Neurocomputing 654: 131209 (2025)
[j2]Qizhang Li, Yiwen Guo, Wangmeng Zuo:
Enhancing visual adversarial transferability via affine transformation of intermediate-level perturbations. Pattern Recognit. Lett. 191: 51-57 (2025)
[i16]Yuanze Li, Shihao Yuan, Haolin Wang, Qizhang Li, Ming Liu, Chen Xu, Guangming Shi, Wangmeng Zuo:
Triad: Empowering LMM-based Anomaly Detection with Vision Expert-guided Visual Tokenizer and Manufacturing Process. CoRR abs/2503.13184 (2025)
[i15]Weijun Zhuang, Qizhang Li, Xin Li, Ming Liu, Xiaopeng Hong, Feng Gao, Fan Yang, Wangmeng Zuo:
Grounding-MD: Grounded Video-language Pre-training for Open-World Moment Detection. CoRR abs/2504.14553 (2025)- 2024
[c9]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Improved Generation of Adversarial Examples Against Safety-aligned LLMs. NeurIPS 2024
[i14]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Improved Generation of Adversarial Examples Against Safety-aligned LLMs. CoRR abs/2405.20778 (2024)
[i13]Qizhang Li, Xiaochen Yang, Wangmeng Zuo, Yiwen Guo:
Deciphering the Chaos: Enhancing Jailbreak Attacks via Adversarial Prompt Translation. CoRR abs/2410.11317 (2024)- 2023
[j1]Yiwen Guo
, Qizhang Li
, Wangmeng Zuo
, Hao Chen
:
An Intermediate-Level Attack Framework on the Basis of Linear Regression. IEEE Trans. Pattern Anal. Mach. Intell. 45(3): 2726-2735 (2023)
[c8]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples. ICLR 2023
[c7]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Squeeze Training for Adversarial Robustness. ICLR 2023
[c6]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Improving Adversarial Transferability via Intermediate-level Perturbation Decay. NeurIPS 2023
[c5]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly. NeurIPS 2023
[i12]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Making Substitute Models More Bayesian Can Enhance Transferability of Adversarial Examples. CoRR abs/2302.05086 (2023)
[i11]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Improving Adversarial Transferability by Intermediate-level Perturbation Decay. CoRR abs/2304.13410 (2023)
[i10]Qizhang Li, Yiwen Guo, Xiaochen Yang, Wangmeng Zuo, Hao Chen:
Improving Transferability of Adversarial Examples via Bayesian Attacks. CoRR abs/2307.11334 (2023)
[i9]Zehao Wang, Yiwen Guo, Qizhang Li, Guanglei Yang, Wangmeng Zuo:
DualAug: Exploiting Additional Heavy Augmentation with OOD Data Rejection. CoRR abs/2310.08139 (2023)
[i8]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Towards Evaluating Transfer-based Attacks Systematically, Practically, and Fairly. CoRR abs/2311.01323 (2023)- 2022
[c4]Qiying Yu, Jieming Lou, Xianyuan Zhan
, Qizhang Li, Wangmeng Zuo, Yang Liu, Jingjing Liu:
Adversarial Contrastive Learning via Asymmetric InfoNCE. ECCV (5) 2022: 53-69
[i7]Yuanze Li, Yiwen Guo, Qizhang Li, Hongzhi Zhang, Wangmeng Zuo:
On Steering Multi-Annotations per Sample for Multi-Task Learning. CoRR abs/2203.02946 (2022)
[i6]Yiwen Guo, Qizhang Li, Wangmeng Zuo, Hao Chen:
An Intermediate-level Attack Framework on The Basis of Linear Regression. CoRR abs/2203.10723 (2022)
[i5]Qizhang Li, Yiwen Guo, Wangmeng Zuo, Hao Chen:
Collaborative Adversarial Training. CoRR abs/2205.11156 (2022)
[i4]Qiying Yu, Jieming Lou, Xianyuan Zhan
, Qizhang Li, Wangmeng Zuo, Yang Liu, Jingjing Liu:
Adversarial Contrastive Learning via Asymmetric InfoNCE. CoRR abs/2207.08374 (2022)- 2020
[c3]Qizhang Li, Yiwen Guo, Hao Chen
:
Yet Another Intermediate-Level Attack. ECCV (16) 2020: 241-257
[c2]Yiwen Guo, Qizhang Li, Hao Chen:
Backpropagating Linearly Improves Transferability of Adversarial Examples. NeurIPS 2020
[c1]Qizhang Li, Yiwen Guo, Hao Chen:
Practical No-box Adversarial Attacks against DNNs. NeurIPS 2020
[i3]Qizhang Li, Yiwen Guo, Hao Chen:
Yet Another Intermediate-Level Attack. CoRR abs/2008.08847 (2020)
[i2]Qizhang Li, Yiwen Guo, Hao Chen:
Practical No-box Adversarial Attacks against DNNs. CoRR abs/2012.02525 (2020)
[i1]Yiwen Guo, Qizhang Li, Hao Chen:
Backpropagating Linearly Improves Transferability of Adversarial Examples. CoRR abs/2012.03528 (2020)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-10-07 22:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







