default search action
Han Xu 0002
Person information
- affiliation: Michigan State University, USA
Other persons with the same name
- Han Xu — disambiguation page
- Han Xu 0001 — Wuhan University, China
- Han Xu 0003 — Huazhong University of Science and Technology, Wuhan, China
- Han Xu 0004 — Peking University, Beijing, China
- Han Xu 0005 — South China Agricultural University, Guangzhou, China
- Han Xu 0006 — Tsinghua University, Beijing, China
- Han Xu 0007 — Auckland Tongji Rehabilitation Medical Equipment Research Centre, Tongji Zhejiang College, China
- Han Xu 0008 — National University of Defense Technology, Changsha, China
- Han Xu 0009 — Technische Universität München, Garching, Germany
- Han Xu 0010 — University of New South Wales, Sydney, NSW, Australia
- Han Xu 0011 — CSE, Hong Kong University of Science and Technology
- Han Xu 0012 — Nanjing University of Aeronautics and Astronautics, Nanjing, China
- Han Xu 0013 — Nanyang Technological University, Singapore
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Shenglai Zeng, Yaxin Li, Jie Ren, Yiding Liu, Han Xu, Pengfei He, Yue Xing, Shuaiqiang Wang, Jiliang Tang, Dawei Yin:
Exploring Memorization in Fine-tuned Language Models. ACL (1) 2024: 3917-3948 - [c18]Shenglai Zeng, Jiankun Zhang, Pengfei He, Yiding Liu, Yue Xing, Han Xu, Jie Ren, Yi Chang, Shuaiqiang Wang, Dawei Yin, Jiliang Tang:
The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG). ACL (Findings) 2024: 4505-4524 - [c17]Pengfei He, Han Xu, Jie Ren, Yingqian Cui, Shenglai Zeng, Hui Liu, Charu C. Aggarwal, Jiliang Tang:
Sharpness-Aware Data Poisoning Attack. ICLR 2024 - [c16]Jie Ren, Han Xu, Yiding Liu, Yingqian Cui, Shuaiqiang Wang, Dawei Yin, Jiliang Tang:
A Robust Semantics-based Watermark for Large Language Model against Paraphrasing. NAACL-HLT (Findings) 2024: 613-625 - [c15]Yaxin Li, Jie Ren, Han Xu, Hui Liu:
Neural Style Protection: Counteracting Unauthorized Neural Style Transfer. WACV 2024: 3954-3963 - [i27]Pengfei He, Han Xu, Yue Xing, Hui Liu, Makoto Yamada, Jiliang Tang:
Data Poisoning for In-context Learning. CoRR abs/2402.02160 (2024) - [i26]Jie Ren, Han Xu, Pengfei He, Yingqian Cui, Shenglai Zeng, Jiankun Zhang, Hongzhi Wen, Jiayuan Ding, Hui Liu, Yi Chang, Jiliang Tang:
Copyright Protection in Generative AI: A Technical Perspective. CoRR abs/2402.02333 (2024) - [i25]Shenglai Zeng, Jiankun Zhang, Pengfei He, Yue Xing, Yiding Liu, Han Xu, Jie Ren, Shuaiqiang Wang, Dawei Yin, Yi Chang, Jiliang Tang:
The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG). CoRR abs/2402.16893 (2024) - [i24]Jie Ren, Yaxin Li, Shenglai Zeng, Han Xu, Lingjuan Lyu, Yue Xing, Jiliang Tang:
Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention. CoRR abs/2403.11052 (2024) - [i23]Yuping Lin, Pengfei He, Han Xu, Yue Xing, Makoto Yamada, Hui Liu, Jiliang Tang:
Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis. CoRR abs/2406.10794 (2024) - [i22]Shenglai Zeng, Jiankun Zhang, Pengfei He, Jie Ren, Tianqi Zheng, Hanqing Lu, Han Xu, Hui Liu, Yue Xing, Jiliang Tang:
Mitigating the Privacy Issues in Retrieval-Augmented Generation (RAG) via Pure Synthetic Data. CoRR abs/2406.14773 (2024) - 2023
- [c14]Wenqi Fan, Han Xu, Wei Jin, Xiaorui Liu, Xianfeng Tang, Suhang Wang, Qing Li, Jiliang Tang, Jianping Wang, Charu C. Aggarwal:
Jointly Attacking Graph Neural Network and its Explanations. ICDE 2023: 654-667 - [c13]Jie Ren, Han Xu, Yuxuan Wan, Xingjun Ma, Lichao Sun, Jiliang Tang:
Transferable Unlearnable Examples. ICLR 2023 - [c12]Han Xu, Pengfei He, Jie Ren, Yuxuan Wan, Zitao Liu, Hui Liu, Jiliang Tang:
Probabilistic Categorical Adversarial Attack and Adversarial Training. ICML 2023: 38428-38442 - [c11]Han Xu, Xiaorui Liu, Wentao Wang, Zitao Liu, Anil K. Jain, Jiliang Tang:
How does the Memorization of Neural Networks Impact Adversarial Robust Models? KDD 2023: 2801-2812 - [i21]Pengfei He, Han Xu, Jie Ren, Yingqian Cui, Hui Liu, Charu C. Aggarwal, Jiliang Tang:
Sharpness-Aware Data Poisoning Attack. CoRR abs/2305.14851 (2023) - [i20]Yingqian Cui, Jie Ren, Han Xu, Pengfei He, Hui Liu, Lichao Sun, Jiliang Tang:
DiffusionShield: A Watermark for Copyright Protection against Generative Diffusion Models. CoRR abs/2306.04642 (2023) - [i19]Han Xu, Jie Ren, Pengfei He, Shenglai Zeng, Yingqian Cui, Amy Liu, Hui Liu, Jiliang Tang:
On the Generalization of Training-based ChatGPT Detection Methods. CoRR abs/2310.01307 (2023) - [i18]Yingqian Cui, Jie Ren, Yuping Lin, Han Xu, Pengfei He, Yue Xing, Wenqi Fan, Hui Liu, Jiliang Tang:
FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models. CoRR abs/2310.02401 (2023) - [i17]Pengfei He, Han Xu, Yue Xing, Jie Ren, Yingqian Cui, Shenglai Zeng, Jiliang Tang, Makoto Yamada, Mohammad Sabokrou:
Confidence-driven Sampling for Backdoor Attacks. CoRR abs/2310.05263 (2023) - [i16]Shenglai Zeng, Yaxin Li, Jie Ren, Yiding Liu, Han Xu, Pengfei He, Yue Xing, Shuaiqiang Wang, Jiliang Tang, Dawei Yin:
Exploring Memorization in Fine-tuned Language Models. CoRR abs/2310.06714 (2023) - [i15]Jie Ren, Han Xu, Yiding Liu, Yingqian Cui, Shuaiqiang Wang, Dawei Yin, Jiliang Tang:
A Robust Semantics-based Watermark for Large Language Model against Paraphrasing. CoRR abs/2311.08721 (2023) - 2022
- [c10]Wentao Wang, Han Xu, Xiaorui Liu, Yaxin Li, Bhavani Thuraisingham, Jiliang Tang:
Imbalanced Adversarial Training with Reweighting. ICDM 2022: 1209-1214 - [c9]Wentao Wang, Han Xu, Yuxuan Wan, Jie Ren, Jiliang Tang:
Towards Adversarial Learning: From Evasion Attacks to Poisoning Attacks. KDD 2022: 4830-4831 - [c8]Han Xu:
Doctoral Consortium of WSDM'22: Exploring the Bias of Adversarial Defenses. WSDM 2022: 1559-1560 - [i14]Yaxin Li, Xiaorui Liu, Han Xu, Wentao Wang, Jiliang Tang:
Enhancing Adversarial Training with Feature Separability. CoRR abs/2205.00637 (2022) - [i13]Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang:
Defense Against Gradient Leakage Attacks via Learning to Obscure Data. CoRR abs/2206.00769 (2022) - [i12]Wenqi Fan, Xiangyu Zhao, Xiao Chen, Jingran Su, Jingtong Gao, Lin Wang, Qidong Liu, Yiqi Wang, Han Xu, Lei Chen, Qing Li:
A Comprehensive Survey on Trustworthy Recommender Systems. CoRR abs/2209.10117 (2022) - [i11]Pengfei He, Han Xu, Jie Ren, Yuxuan Wan, Zitao Liu, Jiliang Tang:
Probabilistic Categorical Adversarial Attack & Adversarial Training. CoRR abs/2210.09364 (2022) - [i10]Han Xu, Xiaorui Liu, Yuxuan Wan, Jiliang Tang:
Towards Fair Classification against Poisoning Attacks. CoRR abs/2210.09503 (2022) - [i9]Jie Ren, Han Xu, Yuxuan Wan, Xingjun Ma, Lichao Sun, Jiliang Tang:
Transferable Unlearnable Examples. CoRR abs/2210.10114 (2022) - 2021
- [c7]Yaxin Li, Wei Jin, Han Xu, Jiliang Tang:
DeepRobust: a Platform for Adversarial Attacks and Defenses. AAAI 2021: 16078-16080 - [c6]Han Xu, Xiaorui Liu, Yaxin Li, Anil K. Jain, Jiliang Tang:
To be Robust or to be Fair: Towards Fairness in Adversarial Training. ICML 2021: 11492-11501 - [c5]Han Xu, Yaxin Li, Xiaorui Liu, Wentao Wang, Jiliang Tang:
Adversarial Robustness in Deep Learning: From Practices to Theories. KDD 2021: 4086-4087 - [c4]Xiaorui Liu, Jiayuan Ding, Wei Jin, Han Xu, Yao Ma, Zitao Liu, Jiliang Tang:
Graph Neural Networks with Adaptive Residual. NeurIPS 2021: 9720-9733 - [c3]Han Xu, Yaxin Li, Xiaorui Liu, Hui Liu, Jiliang Tang:
Yet Meta Learning Can Adapt Fast, it Can Also Break Easily. SDM 2021: 540-548 - [i8]Han Xu, Xiaorui Liu, Wentao Wang, Wenbiao Ding, Zhongqin Wu, Zitao Liu, Anil K. Jain, Jiliang Tang:
Towards the Memorization Effect of Neural Networks in Adversarial Training. CoRR abs/2106.04794 (2021) - [i7]Wentao Wang, Han Xu, Xiaorui Liu, Yaxin Li, Bhavani Thuraisingham, Jiliang Tang:
Imbalanced Adversarial Training with Reweighting. CoRR abs/2107.13639 (2021) - [i6]Wenqi Fan, Wei Jin, Xiaorui Liu, Han Xu, Xianfeng Tang, Suhang Wang, Qing Li, Jiliang Tang, Jianping Wang, Charu C. Aggarwal:
Jointly Attacking Graph Neural Network and its Explanations. CoRR abs/2108.03388 (2021) - 2020
- [j2]Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain:
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review. Int. J. Autom. Comput. 17(2): 151-178 (2020) - [j1]Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Shuiwang Ji, Charu Aggarwal, Jiliang Tang:
Adversarial Attacks and Defenses on Graphs. SIGKDD Explor. 22(2): 19-34 (2020) - [c2]Han Xu, Yaxin Li, Wei Jin, Jiliang Tang:
Adversarial Attacks and Defenses: Frontiers, Advances and Practice. KDD 2020: 3541-3542 - [c1]Wenqi Fan, Yao Ma, Han Xu, Xiaorui Liu, Jianping Wang, Qing Li, Jiliang Tang:
Deep Adversarial Canonical Correlation Analysis. SDM 2020: 352-360 - [i5]Wei Jin, Yaxin Li, Han Xu, Yiqi Wang, Jiliang Tang:
Adversarial Attacks and Defenses on Graphs: A Review and Empirical Study. CoRR abs/2003.00653 (2020) - [i4]Yaxin Li, Wei Jin, Han Xu, Jiliang Tang:
DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses. CoRR abs/2005.06149 (2020) - [i3]Han Xu, Yaxin Li, Xiaorui Liu, Hui Liu, Jiliang Tang:
Yet Meta Learning Can Adapt Fast, It Can Also Break Easily. CoRR abs/2009.01672 (2020) - [i2]Han Xu, Xiaorui Liu, Yaxin Li, Jiliang Tang:
To be Robust or to be Fair: Towards Fairness in Adversarial Training. CoRR abs/2010.06121 (2020)
2010 – 2019
- 2019
- [i1]Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain:
Adversarial Attacks and Defenses in Images, Graphs and Text: A Review. CoRR abs/1909.08072 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:17 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint