


default search action
Xinfeng Li
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j13]Xinyue Deng, Dongliang Wang, Xinfeng Li, Yuying Zhu, Yanan Li, Zhenwen Ren
:
Multi-view clustering with tensor-aligned dynamic anchor graphs. Neurocomputing 664: 132087 (2026)
[i47]Lionel Z. Wang, Yusheng Zhao, Jiabin Luo, Xinfeng Li, Lixu Wang, Yinan Peng, Haoyang Li, XiaoFeng Wang, Wei Dong:
DP-MGTD: Privacy-Preserving Machine-Generated Text Detection via Adaptive Differentially Private Entity Sanitization. CoRR abs/2601.04641 (2026)
[i46]Yinqi Liu, Yueqi Zhu, Yongkang Zhang, Xinfeng Li, Feiran Liu, Yufei Sun, Xin Wang, Renzhao Liang, Yidong Wang, Cunxiang Wang:
MVSS: A Unified Framework for Multi-View Structured Survey Generation. CoRR abs/2601.09504 (2026)- 2025
[j12]Xinfeng Li, Yameng Bai:
Automation and intelligent optimization of financial processes using deep reinforcement learning and ERP integration. Discov. Artif. Intell. 5(1): 396 (2025)
[c42]Cheng Wang, Yue Liu, Baolong Bi, Duzhen Zhang, Zhong-Zhi Li, Yingwei Ma, Yufei He, Shengju Yu, Xinfeng Li, Junfeng Fang, Jiaheng Zhang, Bryan Hooi:
Safety in Large Reasoning Models: A Survey. EMNLP (Findings) 2025: 3468-3482
[c41]Haoming Huang, Yibo Yan, Jiahao Huo, Xin Zou, Xinfeng Li, Kun Wang, Xuming Hu:
Pierce the Mists, Greet the Sky: Decipher Knowledge Overshadowing via Knowledge Circuit Analysis. EMNLP 2025: 15460-15479
[c40]Hanjun Luo, Yingbin Jin, Yiran Wang, Xinfeng Li, Tong Shang, Xuecheng Liu, Ruizhe Chen, Kun Wang, Hanan Salam, Qingsong Wen, Zuozhu Liu:
DynamicNER: A Dynamic, Multilingual, and Fine-Grained Dataset for LLM-based Named Entity Recognition. EMNLP 2025: 16511-16535
[c39]Dong Huang, Jie Li, Hongyi Cai, Xinfeng Li, Yijia Xu
, Wenbin Tang, Jie Zhang, Yang Liu:
A Vision for Access Control in LLM Agent Systems. ICECCS 2025: 467-472
[c38]Qiang Zhang, Pei Yan, Yijia Xu
, Xinfeng Li, Hongyi Cai, Chuanpo Fu, Yong Fang, Yang Liu:
Agent Behavior: The Regulatory Object of the Agent-Centric Online Ecosystem in Digital Age. ICECCS 2025: 473-479
[c37]Wenbing Tang, Meilin Zhu, Fenghua Wu, Xinfeng Li, Yang Liu:
Empowering Embodied Agents with Semantic Intelligence. ICECCS 2025: 480-485
[c36]Miao Yu, Fanci Meng
, Xinyun Zhou, Shilong Wang, Junyuan Mao, Linsey Pang, Tianlong Chen
, Kun Wang
, Xinfeng Li
, Yongfeng Zhang
, Bo An, Qingsong Wen:
A Survey on Trustworthy LLM Agents: Threats and Countermeasures. KDD (2) 2025: 6216-6226
[c35]Feiran Liu
, Yuzhe Zhang
, Xinyi Huang
, Yinan Peng
, Xinfeng Li
, Lixu Wang
, Yutong Shen
, Ranjie Duan
, Simeng Qin
, Xiaojun Jia
, Qingsong Wen
, Wei Dong
:
The Eye of Sherlock Holmes: Uncovering User Private Attribute Profiling via Vision-Language Model Agentic Framework. ACM Multimedia 2025: 4875-4883
[c34]Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. NDSS 2025
[c33]Fengchen Yang, Wenze Cui, Xinfeng Li, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
LightAntenna: Characterizing the Limits of Fluorescent Lamp-Induced Electromagnetic Interference. NDSS 2025
[c32]Wenyi Zhang
, Ju Jia
, Xiaojun Jia
, Yihao Huang
, Xinfeng Li
, Cong Wu
, Lina Wang
:
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage. SIGIR 2025: 403-413
[c31]Wenjun Zhu, Xiaoyu Ji, Xinfeng Li, Qihang Chen, Kun Wang, Xinyu Li, Ruoyan Xu, Wenyuan Xu:
Neural Invisibility Cloak: Concealing Adversary in Images via Compromised AI-driven Image Signal Processing. USENIX Security Symposium 2025: 937-956
[i45]Lingzhi Yuan, Xinfeng Li, Chejian Xu, Guanhong Tao, Xiaojun Jia, Yihao Huang, Wei Dong, Yang Liu, XiaoFeng Wang, Bo Li:
PromptGuard: Soft Prompt-Guided Unsafe Content Moderation for Text-to-Image Models. CoRR abs/2501.03544 (2025)
[i44]Miao Yu, Fanci Meng, Xinyun Zhou, Shilong Wang, Junyuan Mao, Linsey Pang, Tianlong Chen, Kun Wang, Xinfeng Li, Yongfeng Zhang, Bo An, Qingsong Wen:
A Survey on Trustworthy LLM Agents: Threats and Countermeasures. CoRR abs/2503.09648 (2025)
[i43]Xiaojun Jia, Sensen Gao, Simeng Qin, Ke Ma, Xinfeng Li, Yihao Huang, Wei Dong, Yang Liu, Xiaochun Cao:
Evolution-based Region Adversarial Prompt Learning for Robustness Enhancement in Vision-Language Models. CoRR abs/2503.12874 (2025)
[i42]Kai Chen, Xinfeng Li, Tianpei Yang
, Hewei Wang, Wei Dong, Yang Gao:
MDTeamGPT: A Self-Evolving LLM-based Multi-Agent Framework for Multi-Disciplinary Team Medical Consultation. CoRR abs/2503.13856 (2025)
[i41]Bang Liu, Xinfeng Li, Jiayi Zhang, Jinlin Wang, Tanjin He, Sirui Hong, Hongzhang Liu, Shaokun Zhang, Kaitao Song, Kunlun Zhu, Yuheng Cheng, Suyuchen Wang, Xiaoqiang Wang, Yuyu Luo, Haibo Jin, Peiyan Zhang, Ollie Liu, Jiaqi Chen, Huan Zhang, Zhaoyang Yu, Haochen Shi, Boyan Li, Dekun Wu, Fengwei Teng, Xiaojun Jia, Jiawei Xu, Jinyu Xiang, Yizhang Lin, Tianming Liu, Tongliang Liu, Yu Su, Huan Sun, Glen Berseth, Jianyun Nie, Ian T. Foster, Logan T. Ward, Qingyun Wu, Yu Gu, Mingchen Zhuge, Xiangru Tang, Haohan Wang, Jiaxuan You, Chi Wang, Jian Pei, Qiang Yang, Xiaoliang Qi, Chenglin Wu:
Advances and Challenges in Foundation Agents: From Brain-Inspired Intelligence to Evolutionary, Collaborative, and Safe Systems. CoRR abs/2504.01990 (2025)
[i40]Wenyi Zhang, Ju Jia, Xiaojun Jia, Yihao Huang, Xinfeng Li, Cong Wu, Lina Wang:
PATFinger: Prompt-Adapted Transferable Fingerprinting against Unauthorized Multimodal Dataset Usage. CoRR abs/2504.11509 (2025)
[i39]Kun Wang, Guibin Zhang, Zhenhong Zhou, Jiahao Wu, Miao Yu, Shiqian Zhao, Chenlong Yin, Jinhu Fu, Yibo Yan, Hanjun Luo, Liang Lin, Zhihao Xu, Haolang Lu, Xinye Cao, Xinyun Zhou, Weifei Jin, Fanci Meng, Junyuan Mao, Hao Wu, Minghe Wang, Fan Zhang, Junfeng Fang, Chengwei Liu, Yifan Zhang, Qiankun Li, Chongye Guo, Yalan Qin, Yi Ding, Donghai Hong, Jiaming Ji, Xinfeng Li, Yifan Jiang, Dongxia Wang, Yihao Huang, Yufei Guo, Jen-tse Huang, Yanwei Yue, Wenke Huang, Guancheng Wan
, Tianlin Li, Lei Bai, Jie Zhang, Qing Guo, Jingyi Wang, Tianlong Chen, Joey Tianyi Zhou, Xiaojun Jia, Weisong Sun, Cong Wu, Jing Chen, Xuming Hu, Yiming Li, Xiao Wang, Ningyu Zhang, Luu Anh Tuan, Guowen Xu, Tianwei Zhang, Xingjun Ma, Xiang Wang, Bo An, Jun Sun, Mohit Bansal, Shirui Pan, Yuval Elovici, Bhavya Kailkhura
, Bo Li, Yaodong Yang, Hongwei Li, Wenyuan Xu, Yizhou Sun, Wei Wang, Qing Li, Ke Tang, Yu-Gang Jiang, Felix Juefei-Xu, Hui Xiong, Xiaofeng Wang, Shuicheng Yan, Dacheng Tao, Philip S. Yu, Qingsong Wen, Yang Liu:
A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and Deployment. CoRR abs/2504.15585 (2025)
[i38]Chengwei Liu, Chong Wang, Jiayue Cao, Jingquan Ge, Kun Wang, Lvye Zhang, Ming-Ming Cheng, Penghai Zhao, Tianlin Li, Xiaojun Jia, Xiang Li, Xinfeng Li, Yang Liu, Yebo Feng, Yihao Huang, Yijia Xu, Yuqiang Sun, Zhenhong Zhou, Zhengzi Xu:
A Vision for Auto Research with LLM Agents. CoRR abs/2504.18765 (2025)
[i37]Shiqian Zhao, Jiayang Liu, Yiming Li, Runyi Hu, Xiaojun Jia, Wenshu Fan, Xinfeng Li, Jie Zhang, Wei Dong, Tianwei Zhang, Luu Anh Tuan:
Inception: Jailbreak the Memory Mechanism of Text-to-Image Generation Systems. CoRR abs/2504.20376 (2025)
[i36]Yue Liu, Shengfang Zhai, Mingzhe Du, Yulin Chen, Tri Cao, Hongcheng Gao, Cheng Wang, Xinfeng Li, Kun Wang, Junfeng Fang, Jiaheng Zhang, Bryan Hooi:
GuardReasoner-VL: Safeguarding VLMs via Reinforced Reasoning. CoRR abs/2505.11049 (2025)
[i35]Ziyang Ma, Yinghao Ma, Yanqiao Zhu, Chen Yang, Yi-Wen Chao, Ruiyang Xu, Wenxi Chen, Yuanzhe Chen, Zhuo Chen, Jian Cong, Kai Li, Keliang Li, Siyou Li, Xinfeng Li, Xiquan Li, Zheng Lian, Yuzhe Liang, Minghao Liu, Zhikang Niu, Tianrui Wang, Yuping Wang, Yuxuan Wang, Yihao Wu, Guanrou Yang, Jianwei Yu, Ruibin Yuan, Zhisheng Zheng, Ziya Zhou, Haina Zhu, Wei Xue, Emmanouil Benetos, Kai Yu, Chng Eng Siong, Xie Chen:
MMAR: A Challenging Benchmark for Deep Reasoning in Speech, Audio, Music, and Their Mix. CoRR abs/2505.13032 (2025)
[i34]Haoming Huang, Yibo Yan, Jiahao Huo, Xin Zou, Xinfeng Li, Kun Wang, Xuming Hu:
Pierce the Mists, Greet the Sky: Decipher Knowledge Overshadowing via Knowledge Circuit Analysis. CoRR abs/2505.14406 (2025)
[i33]Eric Hanchen Jiang, Haozheng Luo, Shengyuan Pang, Xiaomin Li, Zhenting Qi, Hengli Li, Cheng-Fu Yang, Zongyu Lin, Xinfeng Li, Hao Xu, Kai-Wei Chang, Ying Nian Wu:
Learning to Rank Chain-of-Thought: An Energy-Based Approach with Outcome Supervision. CoRR abs/2505.14999 (2025)
[i32]Miao Yu, Liang Lin, Guibin Zhang, Xinfeng Li, Junfeng Fang, Ningyu Zhang, Kun Wang, Yang Wang:
UniErase: Unlearning Token as a Universal Erasure Primitive for Language Models. CoRR abs/2505.15674 (2025)
[i31]Kai Li, Can Shen, Yile Liu, Jirui Han, Kelong Zheng, Xuechao Zou, Zhe Wang, Xingjian Du, Shun Zhang, Hanjun Luo, Yingbin Jin, Xinxin Xing, Ziyang Ma, Yue Liu, Xiaojun Jia, Yifan Zhang, Junfeng Fang, Kun Wang, Yibo Yan, Haoyang Li, Yiming Li, Xiaobin Zhuang, Yang Liu, Haibo Hu, Zhuo Chen, Zhizheng Wu, Xiaolin Hu, Eng-Siong Chng, XiaoFeng Wang, Wenyuan Xu, Wei Dong, Xinfeng Li:
AudioTrust: Benchmarking the Multifaceted Trustworthiness of Audio Large Language Models. CoRR abs/2505.16211 (2025)
[i30]Wei Zhang, Zhenhong Zhou, Junfeng Fang, Rongwu Xu, Kun Wang, Yuanhe Zhang, Rui Wang, Ge Zhang, Xinfeng Li, Li Sun, Lingjuan Lyu, Yang Liu, Sen Su:
LIFEBench: Evaluating Length Instruction Following in Large Language Models. CoRR abs/2505.16234 (2025)
[i29]Feiran Liu, Yuzhe Zhang, Xinyi Huang, Yinan Peng, Xinfeng Li, Lixu Wang, Yutong Shen, Ranjie Duan, Simeng Qin, Xiaojun Jia, Qingsong Wen, Wei Dong:
The Eye of Sherlock Holmes: Uncovering User Private Attribute Profiling via Vision-Language Model Agentic Framework. CoRR abs/2505.19139 (2025)
[i28]Ruihan Gong, Yue Liu, Wenjie Qu, Mingzhe Du, Yufei He, Yingwei Ma, Yulin Chen, Xiang Liu, Yi Wen, Xinfeng Li, Ruidong Wang, Xinzhong Zhu, Bryan Hooi, Jiaheng Zhang:
Efficient Reasoning via Chain of Unconscious Thought. CoRR abs/2505.19756 (2025)
[i27]Kai Chen, Taihang Zhen, Hewei Wang, Kailai Liu, Xinfeng Li, Jing Huo, Tianpei Yang, Jinfeng Xu, Wei Dong, Yang Gao:
MedSentry: Understanding and Mitigating Safety Risks in Medical LLM Multi-Agent Systems. CoRR abs/2505.20824 (2025)
[i26]Yang Shi, Huanqian Wang, Wulin Xie, Huanyao Zhang, Lijie Zhao, Yifan Zhang, Xinfeng Li, Chaoyou Fu
, Zhuoer Wen, Wenting Liu, Zhuoran Zhang, Xinlong Chen, Bohan Zeng, Sihan Yang, Yuanxing Zhang, Pengfei Wan, Haotian Wang, Wenjing Yang:
MME-VideoOCR: Evaluating OCR-Based Capabilities of Multimodal LLMs in Video Scenarios. CoRR abs/2505.21333 (2025)
[i25]Xiaojun Jia, Sensen Gao, Simeng Qin, Tianyu Pang, Chao Du, Yihao Huang, Xinfeng Li, Yiming Li, Bo Li, Yang Liu:
Adversarial Attacks against Closed-Source MLLMs via Feature Optimal Alignment. CoRR abs/2505.21494 (2025)
[i24]Hanjun Luo, Shenyu Dai
, Chiming Ni, Xinfeng Li, Guibin Zhang, Kun Wang, Tongliang Liu, Hanan Salam:
AgentAuditor: Human-Level Safety and Security Evaluation for LLM Agents. CoRR abs/2506.00641 (2025)
[i23]Lixu Wang, Kaixiang Yao, Xinfeng Li, Dong Yang, Haoyang Li, Xiaofeng Wang, Wei Dong:
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents. CoRR abs/2507.10016 (2025)
[i22]Ranjie Duan, Jiexi Liu, Xiaojun Jia, Shiji Zhao, Ruoxi Cheng, Fengxiang Wang, Cheng Wei, Yong Xie, Chang Liu, Defeng Li, Yinpeng Dong, Yichi Zhang, Yuefeng Chen, Chongwen Wang, Xingjun Ma, Xingxing Wei, Yang Liu, Hang Su, Jun Zhu, Xinfeng Li, Yitong Sun, Jie Zhang, Jinzhao Hu, Sha Xu, Wenchao Yang, Yitong Yang, Xingyao Zhang, Yingshui Tan, Jialing Tao, Hui Xue:
Oyster-I: Beyond Refusal - Constructive Safety Alignment for Responsible Language Models. CoRR abs/2509.01909 (2025)
[i21]Liang Lin, Zhihao Xu, Junhao Dong, Jian Zhao, Yuchen Yuan, Guibin Zhang, Miao Yu, Yiming Zhang, Zhengtao Yao, Huahui Yi, Dongrui Liu, Xinfeng Li, Kun Wang:
OrthAlign: Orthogonal Subspace Decomposition for Non-Interfering Multi-Objective Alignment. CoRR abs/2509.24610 (2025)
[i20]Wenbo Pan, Jie Xu, Qiguang Chen, Junhao Dong, Libo Qin, Xinfeng Li, Haining Yu, Xiaohua Jia:
Can LLMs Refuse Questions They Do Not Know? Measuring Knowledge-Aware Refusal in Factual Tasks. CoRR abs/2510.01782 (2025)
[i19]Qianshan Wei, Tengchao Yang, Yaochen Wang, Xinfeng Li, Lijun Li, Zhenfei Yin, Yi Zhan, Thorsten Holz, Zhiqiang Lin, XiaoFeng Wang:
A-MemGuard: A Proactive Defense Framework for LLM-Based Agent Memory. CoRR abs/2510.02373 (2025)
[i18]Eric Hanchen Jiang, Guancheng Wan, Sophia Yin, Mengting Li, Yuchen Wu, Xiao Liang, Xinfeng Li, Yizhou Sun, Wei Wang, Kai-Wei Chang, Ying Nian Wu:
Dynamic Generation of Multi-LLM Agents Communication Topologies with Graph Diffusion Models. CoRR abs/2510.07799 (2025)
[i17]Eric Hanchen Jiang, Weixuan Ou, Run Liu, Shengyuan Pang, Guancheng Wan, Ranjie Duan, Wei Dong, Kai-Wei Chang, XiaoFeng Wang, Ying Nian Wu, Xinfeng Li:
Energy-Driven Steering: Reducing False Refusals in Large Language Models. CoRR abs/2510.08646 (2025)
[i16]Xiaonan Si, Meilin Zhu
, Simeng Qin, Lijia Yu, Lijun Zhang, Shuaitong Liu, Xinfeng Li, Ranjie Duan, Yang Liu, Xiaojun Jia:
SeCon-RAG: A Two-Stage Semantic Filtering and Conflict-Free Framework for Trustworthy RAG. CoRR abs/2510.09710 (2025)
[i15]Xinfeng Li, Dong Huang, Jie Li, Hongyi Cai, Zhenhong Zhou, Wei Dong, XiaoFeng Wang, Yang Liu:
A Vision for Access Control in LLM-based Agent Systems. CoRR abs/2510.11108 (2025)
[i14]Xinfeng Li, Shengyuan Pang, Jialin Wu, Jiangyi Deng, Huanlong Zhong, Yanjiao Chen
, Jie Zhang, Wenyuan Xu:
Patronus: Safeguarding Text-to-Image Models against White-Box Adversaries. CoRR abs/2510.16581 (2025)
[i13]Jialin Wu, Kecen Li, Zhicong Huang, Xinfeng Li, Xiaofeng Wang, Cheng Hong:
EnchTable: Unified Safety Alignment Transfer in Fine-tuned Large Language Models. CoRR abs/2511.09880 (2025)
[i12]Xinyun Zhou, Xinfeng Li, Yinan Peng, Ming Xu, Xuanwang Zhang, Miao Yu, Yidong Wang, Xiaojun Jia, Kun Wang, Qingsong Wen, XiaoFeng Wang, Wei Dong:
EmoRAG: Evaluating RAG Robustness to Symbolic Perturbations. CoRR abs/2512.01335 (2025)
[i11]Hanjun Luo, Chiming Ni, Jiaheng Wen, Zhimu Huang, Yiran Wang, Bingduo Liao, Sylvia Chung, Yingbin Jin, Xinfeng Li, Wenyuan Xu, XiaoFeng Wang, Hanan Salam:
HAI-Eval: Measuring Human-AI Synergy in Collaborative Coding. CoRR abs/2512.04111 (2025)- 2024
[j11]Xinfeng Li
, Zhicong Zheng
, Chen Yan
, Chaohao Li
, Xiaoyu Ji
, Wenyuan Xu:
Toward Pitch-Insensitive Speaker Verification via Soundfield. IEEE Internet Things J. 11(1): 1175-1189 (2024)
[j10]Xinfeng Li
, Junning Ze, Chen Yan
, Yushi Cheng, Xiaoyu Ji
, Wenyuan Xu:
Enrollment-Stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. IEEE Internet Things J. 11(8): 13108-13124 (2024)
[j9]Ruiwen He
, Yushi Cheng
, Junning Ze
, Xinfeng Li
, Xiaoyu Ji
, Wenyuan Xu
:
Scoring Metrics of Assessing Voiceprint Distinctiveness Based on Speech Content and Rate. IEEE Trans. Dependable Secur. Comput. 21(6): 5582-5599 (2024)
[c30]Jialin Wu
, Jiangyi Deng
, Shengyuan Pang
, Yanjiao Chen
, Jiayang Xu
, Xinfeng Li
, Wenyuan Xu
:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. CCS 2024: 1151-1165
[c29]Xinfeng Li
, Kai Li
, Yifan Zheng
, Chen Yan
, Xiaoyu Ji
, Wenyuan Xu
:
SafeEar: Content Privacy-Preserving Audio Deepfake Detection. CCS 2024: 3585-3599
[c28]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen
, Xiaoyu Ji
, Wenyuan Xu:
SafeGen: Mitigating Sexually Explicit Content Generation in Text-to-Image Models. CCS 2024: 4807-4821
[c27]Xuanwang Zhang, Yunze Song, Yidong Wang, Shuyun Tang, Xinfeng Li, Zhengran Zeng, Zhen Wu, Wei Ye, Wenyuan Xu, Yue Zhang, Xinyu Dai, Shikun Zhang, Qingsong Wen:
RAGLAB: A Modular and Research-Oriented Unified Framework for Retrieval-Augmented Generation. EMNLP (System Demonstrations) 2024: 408-418
[c26]Haoyu Tang, Zhaoyi Liu
, Chang Zeng
, Xinfeng Li:
Beyond Universal Transformer: Block Reusing with Adaptor in Transformer for Automatic Speech Recognition. ISNN 2024: 69-79
[c25]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. NDSS 2024
[i10]Xinfeng Li, Yuchen Yang, Jiangyi Deng, Chen Yan, Yanjiao Chen
, Xiaoyu Ji, Wenyuan Xu:
SafeGen: Mitigating Unsafe Content Generation in Text-to-Image Models. CoRR abs/2404.06666 (2024)
[i9]Xuanwang Zhang, Yunze Song, Yidong Wang
, Shuyun Tang, Xinfeng Li, Zhengran Zeng, Zhen Wu, Wei Ye, Wenyuan Xu, Yue Zhang, Xinyu Dai, Shikun Zhang, Qingsong Wen:
RAGLAB: A Modular and Research-Oriented Unified Framework for Retrieval-Augmented Generation. CoRR abs/2408.11381 (2024)
[i8]Jialin Wu, Jiangyi Deng, Shengyuan Pang, Yanjiao Chen
, Jiayang Xu, Xinfeng Li, Wenyuan Xu:
Legilimens: Practical and Unified Content Moderation for Large Language Model Services. CoRR abs/2408.15488 (2024)
[i7]Jiangyi Deng, Xinfeng Li, Yanjiao Chen
, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu:
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer. CoRR abs/2409.02074 (2024)
[i6]Xinfeng Li, Kai Li, Yifan Zheng, Chen Yan, Xiaoyu Ji, Wenyuan Xu:
SafeEar: Content Privacy-Preserving Audio Deepfake Detection. CoRR abs/2409.09272 (2024)
[i5]Ma Teng, Xiaojun Jia, Ranjie Duan, Xinfeng Li, Yihao Huang, Zhixuan Chu, Yang Liu, Wenqi Ren:
Heuristic-Induced Multimodal Risk Distribution Jailbreak Attack for Multimodal Large Language Models. CoRR abs/2412.05934 (2024)
[i4]Xuancun Lu, Zhengxian Huang, Xinfeng Li, Xiaoyu Ji, Wenyuan Xu:
POEX: Policy Executable Embodied AI Jailbreak Attacks. CoRR abs/2412.16633 (2024)- 2023
[j8]Xinfeng Li, Shuai Xiao, Paul Kumar, Bünyamin Demir:
Data-driven few-shot crop pest detection based on object pyramid for smart agriculture. J. Electronic Imaging 32(5) (2023)
[j7]Xinfeng Li, Shuai Xiao, Zhuo Zhang:
Sample selecting method based on feature density for pest identification in smart agriculture. Sustain. Comput. Informatics Syst. 40: 100904 (2023)
[c24]Zhicong Zheng
, Xinfeng Li
, Chen Yan
, Xiaoyu Ji
, Wenyuan Xu
:
The Silent Manipulator: A Practical and Inaudible Backdoor Attack against Speech Recognition Systems. ACM Multimedia 2023: 7849-7858
[c23]Xinfeng Li, Xiaoyu Ji, Chen Yan, Chaohao Li, Yichen Li, Zhenning Zhang, Wenyuan Xu:
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks. USENIX Security Symposium 2023: 2455-2472
[i3]Haoyu Tang, Zhaoyi Liu, Chang Zeng, Xinfeng Li:
Beyond Universal Transformer: block reusing with adaptor in Transformer for automatic speech recognition. CoRR abs/2303.13072 (2023)
[i2]Xinfeng Li, Junning Ze, Chen Yan, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
Enrollment-stage Backdoor Attacks on Speaker Recognition Systems via Adversarial Ultrasound. CoRR abs/2306.16022 (2023)
[i1]Xinfeng Li, Chen Yan, Xuancun Lu, Zihan Zeng, Xiaoyu Ji, Wenyuan Xu:
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time. CoRR abs/2308.01040 (2023)- 2022
[c22]Junning Ze, Xinfeng Li, Yushi Cheng, Xiaoyu Ji, Wenyuan Xu:
UltraBD: Backdoor Attack against Automatic Speaker Verification Systems via Adversarial Ultrasound. ICPADS 2022: 193-200
[c21]Ruiwen He, Xiaoyu Ji, Xinfeng Li, Yushi Cheng, Wenyuan Xu:
"OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via Content-based PROLE Score. USENIX Security Symposium 2022: 1131-1148- 2021
[c20]Mei Qing Du, Peng Song, Donglin Li, Weipeng Ding, Xinfeng Li:
Design and Implementation of the Integrated Platform of Housing and Land Investigation Based on Geopackage. EBEE 2021: 325-331
[c19]Liang Zhu, Xinfeng Li, Yonggang Wei, Qin Ma, Weiyi Meng:
Integrating Real-Time Entity Resolution with Top-N Join Query Processing. KSEM 2021: 111-123
[c18]Guoming Zhang, Xiaoyu Ji, Xinfeng Li, Gang Qu, Wenyuan Xu:
EarArray: Defending against DolphinAttack via Acoustic Attenuation. NDSS 2021- 2020
[c17]Guang Yao, Zongxuan Liu, Xufeng Guo, Chaoshi Wei, Xinfeng Li, Zhihao Chen:
Prediction of Weather Radar Images via a Deep LSTM for Nowcasting. IJCNN 2020: 1-8
2010 – 2019
- 2017
[j6]Sihao Ding, Gang Li, Ying Li, Xinfeng Li, Qiang Zhai, Adam C. Champion, Junda Zhu, Dong Xuan, Yuan F. Zheng:
SurvSurf: human retrieval on large surveillance video data. Multim. Tools Appl. 76(5): 6521-6549 (2017)
[j5]Gang Li, Xinfeng Li, Fan Yang, Jin Teng, Sihao Ding, Yuan F. Zheng, Dong Xuan, Biao Chen, Wei Zhao
:
Traffic At-a-Glance: Time-Bounded Analytics on Large Visual Traffic Data. IEEE Trans. Parallel Distributed Syst. 28(9): 2703-2717 (2017)
[c16]Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen, Wei Zhao
:
EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance. ICDCS 2017: 689-698- 2016
[c15]Xinfeng Li, Gang Li, Fan Yang, Jin Teng, Dong Xuan, Biao Chen:
Traffic at-a-glance: Time-bounded analytics on large visual traffic data. INFOCOM 2016: 1-9- 2015
[c14]Qiang Zhai, Sihao Ding, Xinfeng Li, Fan Yang, Jin Teng, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao
:
VM-tracking: Visual-motion sensing integration for real-time human tracking. INFOCOM 2015: 711-719- 2014
[j4]Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. IEEE Trans. Computers 63(6): 1422-1433 (2014)
[j3]Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:
TurfCast: A Service for Controlling Information Dissemination in Wireless Networks. IEEE Trans. Mob. Comput. 13(2): 250-262 (2014)
[j2]Jin Teng, Boying Zhang, Junda Zhu, Xinfeng Li, Dong Xuan, Yuan F. Zheng:
EV-Loc: Integrating Electronic and Visual Signals for Accurate Localization. IEEE/ACM Trans. Netw. 22(4): 1285-1296 (2014)
[c13]Xinfeng Li, Huiling Shi, Zhenghao Niu, Wenqing Lei, Jin Chen:
Research on loss recovery of application layer multicast. ICDIP 2014: 91590B- 2013
[c12]Xinfeng Li, Jin Teng, Qiang Zhai, Junda Zhu, Dong Xuan, Yuan F. Zheng, Wei Zhao
:
EV-Human: Human localization via visual estimation of body electronic interference. INFOCOM 2013: 500-504
[c11]Boxuan Gu, Xinfeng Li, Gang Li, Adam C. Champion, Zhezhe Chen, Feng Qin, Dong Xuan:
D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources. INFOCOM 2013: 791-799
[c10]Zuoming Yu, Jin Teng, Xinfeng Li, Dong Xuan:
On wireless network coverage in bounded areas. INFOCOM 2013: 1195-1203- 2012
[c9]Xinfeng Li, Jin Teng, Boying Zhang, Adam C. Champion, Dong Xuan:
TurfCast: A service for controlling information dissemination in wireless networks. INFOCOM 2012: 298-306
[c8]Boying Zhang, Jin Teng, Junda Zhu, Xinfeng Li, Dong Xuan, Yuan F. Zheng:
EV-Loc: integrating electronic and visual signals for accurate localization. MobiHoc 2012: 25-34
[c7]Haoting Liu, Wei Wang, Xinfeng Li, Fan Li:
Defect segmentation of fiber splicing on an industrial robot system using GMM and graph cut. ROBIO 2012: 1968-1972
[c6]Adam C. Champion, Xinfeng Li, Qiang Zhai, Jin Teng, Dong Xuan:
Enclave: Promoting Unobtrusive and Secure Mobile Communications with a Ubiquitous Electronic World. WASA 2012: 235-247- 2011
[b1]Xinfeng Li:
Image based human body rendering via regression & MRF energy minimization. Brunel University London, UK, 2011
[j1]Yulong Tian, Tao Gao
, Weifang Zhai, Yaying Hu, Xinfeng Li:
Niche Genetic Algorithm Based on Sexual Reproduction and Multimodal Function Optimization Problem. Int. J. Adv. Pervasive Ubiquitous Comput. 3(1): 7-15 (2011)
[c5]Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai, Dong Xuan:
E-Shadow: Lubricating Social Interaction Using Mobile Phones. ICDCS 2011: 909-918- 2010
[c4]Stuart Steele, Keni Yip, Xinfeng Li:
Critical Areas of Focus in a First Graduate Software Engineering Course. FECS 2010: 216-220
[c3]Yulong Tian, Weifang Zhai, Xinfeng Li, Yaying Hu, Tao Gao:
Simulation of Tumor Detection Based on Bioelectrical Impedance Measurement. ISIA 2010: 98-104
2000 – 2009
- 2009
[c2]Xinfeng Li, Xiaoyuan Wang, Nan Zheng, Zhiguo Wan, Ming Gu:
Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks. MSN 2009: 457-464
[c1]Xiaoyuan Wang, Xinfeng Li, Zhiguo Wan, Ming Gu:
CLEAR: A confidential and Lifetime-Aware Routing Protocol for wireless sensor network. PIMRC 2009: 2265-2269
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-20 02:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







