


default search action
Xinlei He 0001
Person information
- affiliation: Hong Kong University of Science and Technology, Hong Kong
- affiliation (PhD 2023): CISPA Helmholtz Center for Information Security, Saarland University, Germany
- affiliation (former): Fudan University, Shanghai, China
Other persons with the same name
- Xinlei He 0002 — Northeast Electric Power University, China
- Xinlei He 0003 — Peking University Third Hospital, Beijing, China
- Xinlei He 0004
— Shanxi University, Taiyuan, China (and 1 more) - Xinlei He 0005 — Mingbo Aquatic Co., Ltd., Laizhou, China
- Xinlei He 0006 — Shanghai Jiao Tong University, Department of Computer Science and Engineering, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j8]Xinlei He, Guowen Xu, Xingshuo Han, Qian Wang, Lingchen Zhao, Chao Shen, Chenhao Lin, Zhengyu Zhao, Qian Li, Le Yang, Shouling Ji, Shaofeng Li, Haojin Zhu, Zhibo Wang, Rui Zheng, Tianqing Zhu, Qi Li, Chaoxiang He, Qifan Wang, Hongsheng Hu, Shuo Wang, Shi-Feng Sun, Hongwei Yao, Qinyu Zhang, Kai Chen, Yue Zhao, Hongwei Li, Xinyi Huang, Dengguo Feng:
Artificial intelligence security and privacy: a survey. Sci. China Inf. Sci. 68(8) (2025)
[j7]Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li:
A Comprehensive Study of Privacy Risks in Curriculum Learning. Proc. Priv. Enhancing Technol. 2025(1): 613-631 (2025)
[c34]Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He:
CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers. AAAI 2025: 26427-26435
[c33]Sibo Yi, Tianshuo Cong, Xinlei He, Qi Li, Jiaxing Song:
Beyond the Tip of Efficiency: Uncovering the Submerged Threats of Jailbreak Attacks in Small Language Models. ACL (Findings) 2025: 17221-17234
[c32]Zhen Sun, Zongmin Zhang, Xinyue Shen, Ziyi Zhang, Yule Liu, Michael Backes, Yang Zhang, Xinlei He:
Are We in the AI-Generated Text World Already? Quantifying and Monitoring AIGT on Social Media. ACL (1) 2025: 22975-23005
[c31]Junjie Chu, Yugeng Liu, Xinlei He, Michael Backes, Yang Zhang, Ahmed Salem:
Neeko: Model Hijacking Attacks Against Generative Adversarial Networks. ICME 2025: 1-6
[c30]Yule Liu, Zhiyuan Zhong
, Yifan Liao
, Zhen Sun, Jingyi Zheng, Jiaheng Wei, Qingyuan Gong
, Fenghua Tong
, Yang Chen, Yang Zhang
, Xinlei He:
On the Generalization and Adaptation Ability of Machine-Generated Text Detectors in Academic Writing. KDD (2) 2025: 5674-5685
[c29]Jingyi Zheng, Junfeng Wang
, Zhen Sun, Wenhan Dong, Yule Liu, Xinlei He:
TH-Bench: Evaluating Evading Attacks via Humanizing AI Text on Machine-Generated Text Detectors. KDD (2) 2025: 5948-5959
[c28]Wenhan Dong, Chao Lin, Xinlei He, Shengmin Xu, Xinyi Huang:
Privacy-Preserving Federated Learning via Homomorphic Adversarial Networks. KSEM (2) 2025: 393-404
[c27]Yichen Gong, Delong Ran, Xinlei He, Tianshuo Cong, Anyu Wang, Xiaoyun Wang:
Safety Misalignment Against Large Language Models. NDSS 2025
[c26]Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. SP 2025: 1713-1731
[c25]Lijin Wang, Jingjing Wang, Tianshuo Cong, Xinlei He, Zhan Qin, Xinyi Huang:
From Purity to Peril: Backdooring Merged Models From "Harmless" Benign Components. USENIX Security Symposium 2025: 6339-6358
[c24]Zeren Luo, Zifan Peng, Yule Liu, Zhen Sun, Mingchen Li, Jingyi Zheng, Xinlei He:
Unsafe LLM-Based Search: Quantitative Analysis and Mitigation of Safety Risks in AI Web Search. USENIX Security Symposium 2025: 8055-8074
[i67]Heyi Zhang, Yule Liu, Xinlei He, Jun Wu, Tianshuo Cong, Xinyi Huang:
SoK: Benchmarking Poisoning Attacks and Defenses in Federated Learning. CoRR abs/2502.03801 (2025)
[i66]Zeren Luo, Zifan Peng, Yule Liu, Zhen Sun, Mingchen Li, Jingyi Zheng, Xinlei He:
The Rising Threat to Emerging AI-Powered Search Engines. CoRR abs/2502.04951 (2025)
[i65]Hao Liang, Wanrong Zhang, Xinlei He, Kaishun Wu, Hong Xing:
An Improved Privacy and Utility Analysis of Differentially Private SGD with Bounded Domain and Smooth Losses. CoRR abs/2502.17772 (2025)
[i64]Sibo Yi, Tianshuo Cong, Xinlei He, Qi Li, Jiaxing Song:
Behind the Tip of Efficiency: Uncovering the Submerged Threats of Jailbreak Attacks in Small Language Models. CoRR abs/2502.19883 (2025)
[i63]Ziyi Zhang, Zhen Sun, Zongmin Zhang, Jihui Guo, Xinlei He:
FC-Attack: Jailbreaking Large Vision-Language Models via Auto-Generated Flowcharts. CoRR abs/2502.21059 (2025)
[i62]Jingyi Zheng, Junfeng Wang, Zhen Sun, Wenhan Dong, Yule Liu, Xinlei He:
TH-Bench: Evaluating Evading Attacks via Humanizing AI Text on Machine-Generated Text Detectors. CoRR abs/2503.08708 (2025)
[i61]Yule Liu, Jingyi Zheng, Zhen Sun, Zifan Peng, Wenhan Dong, Zeyang Sha, Shiwen Cui, Weiqiang Wang, Xinlei He:
Thought Manipulation: External Thought Can Be Efficient for Large Reasoning Models. CoRR abs/2504.13626 (2025)
[i60]Wenhan Dong, Yuemeng Zhao, Zhen Sun, Yule Liu, Zifan Peng, Jingyi Zheng, Zongmin Zhang, Ziyi Zhang, Jun Wu, Ruiming Wang, Shengmin Xu, Xinyi Huang, Xinlei He:
Humanizing LLMs: A Survey of Psychological Measurements with Tools, Datasets, and Human-Agent Applications. CoRR abs/2505.00049 (2025)
[i59]Haoran Ou, Gelei Deng, Xingshuo Han, Jie Zhang, Xinlei He, Han Qiu, Shangwei Guo, Tianwei Zhang:
Holmes: Automated Fact Check with Large Language Models. CoRR abs/2505.03135 (2025)
[i58]Ziyi Zhang, Zhen Sun, Zongmin Zhang, Zifan Peng, Yuemeng Zhao, Zichun Wang, Zeren Luo, Ruiting Zuo, Xinlei He:
"I Can See Forever!": Evaluating Real-time VideoLLMs for Assisting Individuals with Visual Impairments. CoRR abs/2505.04488 (2025)
[i57]Zhijie Deng, Chris Yuhao Liu, Zirui Pang, Xinlei He, Lei Feng, Qi Xuan, Zhaowei Zhu, Jiaheng Wei:
GUARD: Generation-time LLM Unlearning via Adaptive Restriction and Detection. CoRR abs/2505.13312 (2025)
[i56]Yiming Huang, Junyan Zhang, Zihao Wang, Biquan Bie, Xuming Hu, Yi R. (May) Fung, Xinlei He:
RePPL: Recalibrating Perplexity by Uncertainty in Semantic Propagation and Language Generation for Explainable QA Hallucination Detection. CoRR abs/2505.15386 (2025)
[i55]Yiming Huang, Biquan Bie, Zuqiu Na, Weilin Ruan, Songxin Lei, Yutao Yue
, Xinlei He:
An Empirical Study of the Anchoring Effect in LLMs: Existence, Mechanism, and Potential Mitigations. CoRR abs/2505.15392 (2025)
[i54]Zhen Sun, Ziyi Zhang, Zeren Luo, Zeyang Sha, Tianshuo Cong, Zheng Li, Shiwen Cui, Weiqiang Wang, Jiaheng Wei, Xinlei He, Qi Li, Qian Wang:
FragFake: A Dataset for Fine-Grained Detection of Edited Images with Vision Language Models. CoRR abs/2505.15644 (2025)
[i53]Zifan Peng, Yule Liu, Zhen Sun, Mingchen Li, Zeren Luo, Jingyi Zheng, Wenhan Dong, Xinlei He, Xuechao Wang, Yingjie Xue, Shengmin Xu, Xinyi Huang:
JALMBench: Benchmarking Jailbreak Vulnerabilities in Audio Language Models. CoRR abs/2505.17568 (2025)
[i52]Wenhan Dong, Tianyi Hu, Jingyi Zheng, Zhen Sun, Yuemeng Zhao, Yule Liu, Xinlei He, Xinyi Huang:
Evaluation Hallucination in Multi-Round Incomplete Information Lateral-Driven Reasoning Tasks. CoRR abs/2505.23843 (2025)
[i51]Sicong Han, Chenhao Lin, Zhengyu Zhao, Xiyuan Wang, Xinlei He, Qian Li, Cong Wang, Qian Wang, Chao Shen:
Prediction Inconsistency Helps Achieve Generalizable Detection of Adversarial Examples. CoRR abs/2506.03765 (2025)
[i50]Zhiyuan Zhong, Zhen Sun, Yepang Liu, Xinlei He, Guanhong Tao:
Backdoor Attack on Vision Language Models with Stealthy Semantic Manipulation. CoRR abs/2506.07214 (2025)
[i49]Jingyi Zheng, Zifan Peng, Yule Liu, Junfeng Wang, Yifan Liao, Wenhan Dong, Xinlei He:
GasAgent: A Multi-Agent Framework for Automated Gas Optimization in Smart Contracts. CoRR abs/2507.15761 (2025)
[i48]Delong Ran, Xinlei He, Tianshuo Cong, Anyu Wang, Qi Li, Xiaoyun Wang:
LoRA-Leak: Membership Inference Attacks Against LoRA Fine-tuned Language Models. CoRR abs/2507.18302 (2025)
[i47]Wenhan Dong, Zhen Sun, Yuemeng Zhao, Zifan Peng, Jun Wu, Jingyi Zheng, Yule Liu, Xinlei He, Yu Wang, Ruiming Wang, Xinyi Huang, Lei Mo:
ZPD-SCA: Unveiling the Blind Spots of LLMs in Assessing Students' Cognitive Abilities. CoRR abs/2508.14377 (2025)
[i46]Yifan Liao, Zhen Sun, Xiaoyun Qiu, Zixiao Zhao, Wenbing Tang, Xinlei He, Xinhu Zheng, Tianwei Zhang, Xinyi Huang, Xingshuo Han:
Work Zones challenge VLM Trajectory Planning: Toward Mitigation and Robust Autonomous Driving. CoRR abs/2510.02803 (2025)
[i45]Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma:
GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards. CoRR abs/2511.14045 (2025)
[i44]Zhen Sun, Zongmin Zhang, Deqi Liang, Han Sun, Yule Liu, Yun Shen, Xiangshan Gao, Yilong Yang, Shuai Liu, Yutao Yue, Xinlei He:
"To Survive, I Must Defect": Jailbreaking LLMs via the Game-Theory Scenarios. CoRR abs/2511.16278 (2025)
[i43]Jihui Guo, Zongmin Zhang, Zhen Sun, Yuhao Yang, Jinlin Wu, Fu Zhang, Xinlei He:
6DAttack: Backdoor Attacks in the 6DoF Pose Estimation. CoRR abs/2512.19058 (2025)
[i42]Zongmin Zhang, Zhen Sun, Yifan Liao, Wenhan Dong, Xinlei He, Xingshuo Han, Shengmin Xu, Xinyi Huang:
Backdoor Attacks on Prompt-Driven Video Segmentation Foundation Models. CoRR abs/2512.22046 (2025)- 2024
[j6]Yixin Wu, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Link Stealing Attacks Against Inductive Graph Neural Networks. Proc. Priv. Enhancing Technol. 2024(4): 818-839 (2024)
[c23]Xinlei He
, Xinyue Shen
, Zeyuan Chen
, Michael Backes
, Yang Zhang
:
MGTBench: Benchmarking Machine-Generated Text Detection. CCS 2024: 2251-2265
[c22]Tianshuo Cong
, Delong Ran
, Zesen Liu
, Xinlei He
, Jinyuan Liu
, Yichen Gong
, Qi Li
, Anyu Wang
, Xiaoyun Wang
:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. LAMPS@CCS 2024: 69-76
[c21]Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang:
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content. SP 2024: 770-787
[c20]Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang:
Test-Time Poisoning Attacks Against Test-Time Adaptation Models. SP 2024: 1306-1324
[c19]Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang:
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models. USENIX Security Symposium 2024
[d1]Yichen Gong
, Delong Ran
, Xinlei He
, Tianshuo Cong
, Anyu Wang
, Xiaoyun Wang
:
Safety Misalignment Against Large Language Models. Zenodo, 2024
[i41]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. CoRR abs/2404.05188 (2024)
[i40]Yixin Wu
, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang
:
Link Stealing Attacks Against Inductive Graph Neural Networks. CoRR abs/2405.05784 (2024)
[i39]Yanling Wang, Haoyang Li, Hao Zou, Jing Zhang, Xinlei He, Qi Li, Ke Xu:
Hidden Question Representations Tell Non-Factuality Within and Across Large Language Models. CoRR abs/2406.05328 (2024)
[i38]Delong Ran, Jinyuan Liu, Yichen Gong, Jingyi Zheng, Xinlei He, Tianshuo Cong, Anyu Wang:
JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models. CoRR abs/2406.09321 (2024)
[i37]Sibo Yi, Yule Liu, Zhen Sun, Tianshuo Cong, Xinlei He, Jiaxing Song, Ke Xu, Qi Li:
Jailbreak Attacks and Defenses Against Large Language Models: A Survey. CoRR abs/2407.04295 (2024)
[i36]Zesen Liu, Tianshuo Cong, Xinlei He, Qi Li:
On Evaluating The Performance of Watermarked Machine-Generated Texts Under Adversarial Attacks. CoRR abs/2407.04794 (2024)
[i35]Zheng Li, Xinlei He, Ning Yu, Yang Zhang
:
Membership Inference Attack Against Masked Image Modeling. CoRR abs/2408.06825 (2024)
[i34]Minghao Liu, Zonglin Di, Jiaheng Wei, Zhongruo Wang, Hengxiang Zhang, Ruixuan Xiao, Haoyu Wang, Jinlong Pang, Hao Chen, Ankit Shah, Hongxin Wei
, Xinlei He, Zhaowei Zhao, Haobo Wang, Lei Feng, Jindong Wang, James Davis, Yang Liu
:
Automatic Dataset Construction (ADC): Sample Collection, Data Curation, and Beyond. CoRR abs/2408.11338 (2024)
[i33]Zhen Sun, Tianshuo Cong, Yule Liu, Chenhao Lin, Xinlei He, Rongmao Chen, Xingshuo Han, Xinyi Huang:
PEFTGuard: Detecting Backdoor Attacks Against Parameter-Efficient Fine-Tuning. CoRR abs/2411.17453 (2024)
[i32]Yule Liu, Zhen Sun, Xinlei He, Xinyi Huang:
Quantized Delta Weight Is Safety Keeper. CoRR abs/2411.19530 (2024)
[i31]Wenhan Dong
, Chao Lin
, Xinlei He, Xinyi Huang, Shengmin Xu:
Privacy-Preserving Federated Learning via Homomorphic Adversarial Networks. CoRR abs/2412.01650 (2024)
[i30]Yule Liu, Zhiyuan Zhong, Yifan Liao
, Zhen Sun, Jingyi Zheng, Jiaheng Wei, Qingyuan Gong, Fenghua Tong, Yang Chen, Yang Zhang, Xinlei He:
On the Generalization Ability of Machine-Generated Text Detectors. CoRR abs/2412.17242 (2024)
[i29]Zhen Sun, Zongmin Zhang, Xinyue Shen, Ziyi Zhang, Yule Liu, Michael Backes, Yang Zhang, Xinlei He:
Are We in the AI-Generated Text World Already? Quantifying and Monitoring AIGT on Social Media. CoRR abs/2412.18148 (2024)
[i28]Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He:
CL-attack: Textual Backdoor Attacks via Cross-Lingual Triggers. CoRR abs/2412.19037 (2024)- 2023
[b1]Xinlei He:
Privacy risk assessment of emerging machine learning paradigms. Saarland University, Saarbrücken, Germany, 2023
[j5]Qinge Xie, Qingyuan Gong, Xinlei He
, Yang Chen
, Xin Wang, Haitao Zheng, Ben Y. Zhao:
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions. IEEE Trans. Mob. Comput. 22(1): 556-573 (2023)
[c18]Yiting Qu
, Xinyue Shen
, Xinlei He
, Michael Backes
, Savvas Zannettou
, Yang Zhang
:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. CCS 2023: 3403-3417
[c17]Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang
:
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders. CVPR 2023: 16373-16383
[c16]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. ICML 2023: 23412-23428
[c15]Ziqing Yang, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, Yang Zhang:
Data Poisoning Attacks Against Multimodal Encoders. ICML 2023: 39299-39313
[c14]Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang
, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. SP 2023: 293-310
[c13]Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang:
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. USENIX Security Symposium 2023: 5289-5306
[i27]Boyang Zhang, Xinlei He, Yun Shen, Tianhao Wang, Yang Zhang:
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. CoRR abs/2302.11982 (2023)
[i26]Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang
:
MGTBench: Benchmarking Machine-Generated Text Detection. CoRR abs/2303.14822 (2023)
[i25]Yiting Qu, Xinyue Shen, Xinlei He, Michael Backes, Savvas Zannettou, Yang Zhang
:
Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models. CoRR abs/2305.13873 (2023)
[i24]Yihan Ma, Zhengyu Zhao, Xinlei He, Zheng Li, Michael Backes, Yang Zhang:
Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis. CoRR abs/2306.07754 (2023)
[i23]Yihan Ma, Zhikun Zhang, Ning Yu, Xinlei He, Michael Backes, Yun Shen, Yang Zhang:
Generated Graph Detection. CoRR abs/2306.07758 (2023)
[i22]Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang
:
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content. CoRR abs/2308.05596 (2023)
[i21]Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang
:
Test-Time Poisoning Attacks Against Test-Time Adaptation Models. CoRR abs/2308.08505 (2023)
[i20]Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang
, Zhou Li:
A Comprehensive Study of Privacy Risks in Curriculum Learning. CoRR abs/2310.10124 (2023)
[i19]Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang:
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models. CoRR abs/2310.12665 (2023)- 2022
[c12]Tianshuo Cong, Xinlei He, Yang Zhang
:
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. CCS 2022: 579-593
[c11]Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang
:
Auditing Membership Leakages of Multi-Exit Networks. CCS 2022: 1917-1931
[c10]Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang
:
Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning. ECCV (31) 2022: 365-381
[c9]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. ICWSM 2022: 944-955
[c8]Yun Shen, Xinlei He, Yufei Han, Yang Zhang
:
Model Stealing Attacks Against Inductive Graph Neural Networks. SP 2022: 1175-1192
[c7]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. USENIX Security Symposium 2022: 4525-4542
[c6]Qingyuan Gong, Yang Chen, Xinlei He, Yu Xiao, Pan Hui, Xin Wang, Xiaoming Fu:
Cross-Site Prediction on Social Influence for Cold-Start Users in Online Social Networks. WWW (Companion Volume) 2022: 389
[i18]Zeyang Sha, Xinlei He, Ning Yu, Michael Backes, Yang Zhang:
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders. CoRR abs/2201.07513 (2022)
[i17]Tianshuo Cong, Xinlei He, Yang Zhang:
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders. CoRR abs/2201.11692 (2022)
[i16]Xinyue Shen, Xinlei He, Michael Backes, Jeremy Blackburn, Savvas Zannettou, Yang Zhang
:
On Xing Tian and the Perseverance of Anti-China Sentiment Online. CoRR abs/2204.08935 (2022)
[i15]Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang
:
Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning. CoRR abs/2207.12535 (2022)
[i14]Xinlei He, Zheng Li, Weilin Xu, Cory Cornelius, Yang Zhang
:
Membership-Doctor: Comprehensive Assessment of Membership Inference Against Machine Learning Models. CoRR abs/2208.10445 (2022)
[i13]Zheng Li, Yiyong Liu, Xinlei He, Ning Yu, Michael Backes, Yang Zhang
:
Auditing Membership Leakages of Multi-Exit Networks. CoRR abs/2208.11180 (2022)
[i12]Ziqing Yang
, Xinlei He, Zheng Li, Michael Backes, Mathias Humbert, Pascal Berrang, Yang Zhang:
Data Poisoning Attacks Against Multimodal Encoders. CoRR abs/2209.15266 (2022)
[i11]Xinyue Shen, Xinlei He, Zheng Li, Yun Shen, Michael Backes, Yang Zhang
:
Backdoor Attacks in the Supply Chain of Masked Image Modeling. CoRR abs/2210.01632 (2022)
[i10]Yiting Qu, Xinlei He, Shannon Pierson, Michael Backes, Yang Zhang, Savvas Zannettou:
On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning. CoRR abs/2212.06573 (2022)
[i9]Zeyang Sha, Xinlei He, Pascal Berrang, Mathias Humbert, Yang Zhang
:
Fine-Tuning Is All You Need to Mitigate Backdoor Attacks. CoRR abs/2212.09067 (2022)- 2021
[j4]Xinlei He
, Qingyuan Gong, Yang Chen
, Yang Zhang
, Xin Wang, Xiaoming Fu
:
DatingSec: Detecting Malicious Accounts in Dating Apps Using a Content-Based Attention Network. IEEE Trans. Dependable Secur. Comput. 18(5): 2193-2208 (2021)
[j3]Qingyuan Gong, Yang Chen
, Xinlei He, Yu Xiao
, Pan Hui, Xin Wang, Xiaoming Fu
:
Cross-site Prediction on Social Influence for Cold-start Users in Online Social Networks. ACM Trans. Web 15(2): 6:1-6:23 (2021)
[c5]Xinlei He, Yang Zhang
:
Quantifying and Mitigating Privacy Risks of Contrastive Learning. CCS 2021: 845-863
[c4]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. USENIX Security Symposium 2021: 2669-2686
[i8]Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang:
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models. CoRR abs/2102.02551 (2021)
[i7]Xinlei He, Yang Zhang:
Quantifying and Mitigating Privacy Risks of Contrastive Learning. CoRR abs/2102.04140 (2021)
[i6]Xinlei He, Rui Wen, Yixin Wu, Michael Backes, Yun Shen, Yang Zhang:
Node-Level Membership Inference Attacks Against Graph Neural Networks. CoRR abs/2102.05429 (2021)
[i5]Yun Shen, Xinlei He, Yufei Han, Yang Zhang:
Model Stealing Attacks Against Inductive Graph Neural Networks. CoRR abs/2112.08331 (2021)- 2020
[i4]Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Stealing Links from Graph Neural Networks. CoRR abs/2005.02131 (2020)
[i3]Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Costas Iordanou, Michael Sirivianos:
Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter. CoRR abs/2006.09938 (2020)
2010 – 2019
- 2019
[i2]Nikos Salamanos, Michael J. Jensen, Xinlei He, Yang Chen, Michael Sirivianos:
On the Influence of Twitter Trolls during the 2016 US Presidential Election. CoRR abs/1910.00531 (2019)
[i1]Qinge Xie, Qingyuan Gong, Xinlei He, Yang Chen, Xin Wang, Haitao Zheng, Ben Y. Zhao:
Trimming Mobile Applications for Bandwidth-Challenged Networks in Developing Regions. CoRR abs/1912.01328 (2019)- 2018
[j2]Chenxi Yang, Yang Chen
, Qingyuan Gong, Xinlei He, Yu Xiao
, Yuhuan Huang, Xiaoming Fu
:
Understanding the behavioral differences between american and german users: A data-driven study. Big Data Min. Anal. 1(4): 284-296 (2018)
[j1]Qingyuan Gong, Yang Chen
, Xinlei He, Zhou Zhuang, Tianyi Wang, Hong Huang, Xin Wang, Xiaoming Fu
:
DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks. IEEE Commun. Mag. 56(11): 21-27 (2018)
[c3]Qingyuan Gong, Yang Chen, Xinlei He, Fei Li, Yu Xiao
, Pan Hui, Xin Wang, Xiaoming Fu
:
Identification of Influential Users in Emerging Online Social Networks Using Cross-site Linking. ChineseCSCW 2018: 331-341
[c2]Qingyuan Gong, Xinlei He, Qinge Xie, Shihan Lin, Guozhen She
, Ruiyu Fang, Rui Han, Yang Chen, Yu Xiao
, Xiaoming Fu
, Xin Wang:
LBSLab: A User Data Collection System in Mobile Environments. UbiComp/ISWC Adjunct 2018: 624-629
[c1]Jiaqi Wang, Xinlei He, Qingyuan Gong, Yang Chen, Tianyi Wang, Xin Wang:
Deep Learning-Based Malicious Account Detection in the Momo Social Network. ICCCN 2018: 1-2
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-28 02:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






