default search action
Xiangyu Qi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Weihong Ma, Yi Sun, Xiangyu Qi, Xianglong Xue, Kaixuan Chang, Zhankang Xu, Mingyu Li, Rong Wang, Rui Meng, Qifeng Li:
Computer-Vision-Based Sensing Technologies for Livestock Body Dimension Measurement: A Survey. Sensors 24(5): 1504 (2024) - [c9]Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Peter Henderson, Mengdi Wang, Prateek Mittal:
Visual Adversarial Examples Jailbreak Aligned Large Language Models. AAAI 2024: 21527-21536 - [c8]Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson:
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To! ICLR 2024 - [c7]Tinghao Xie, Xiangyu Qi, Ping He, Yiming Li, Jiachen T. Wang, Prateek Mittal:
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection. ICLR 2024 - [c6]Boyi Wei, Kaixuan Huang, Yangsibo Huang, Tinghao Xie, Xiangyu Qi, Mengzhou Xia, Prateek Mittal, Mengdi Wang, Peter Henderson:
Assessing the Brittleness of Safety Alignment via Pruning and Low-Rank Modifications. ICML 2024 - [i17]Boyi Wei, Kaixuan Huang, Yangsibo Huang, Tinghao Xie, Xiangyu Qi, Mengzhou Xia, Prateek Mittal, Mengdi Wang, Peter Henderson:
Assessing the Brittleness of Safety Alignment via Pruning and Low-Rank Modifications. CoRR abs/2402.05162 (2024) - [i16]Jiongxiao Wang, Jiazhao Li, Yiquan Li, Xiangyu Qi, Junjie Hu, Yixuan Li, Patrick McDaniel, Muhao Chen, Bo Li, Chaowei Xiao:
Mitigating Fine-tuning Jailbreak Attack with Backdoor Enhanced Alignment. CoRR abs/2402.14968 (2024) - [i15]Xiangyu Qi, Yangsibo Huang, Yi Zeng, Edoardo Debenedetti, Jonas Geiping, Luxi He, Kaixuan Huang, Udari Madhushani, Vikash Sehwag, Weijia Shi, Boyi Wei, Tinghao Xie, Danqi Chen, Pin-Yu Chen, Jeffrey Ding, Ruoxi Jia, Jiaqi Ma, Arvind Narayanan, Weijie J. Su, Mengdi Wang, Chaowei Xiao, Bo Li, Dawn Song, Peter Henderson, Prateek Mittal:
AI Risk Management Should Incorporate Both Safety and Security. CoRR abs/2405.19524 (2024) - [i14]Chen Xiong, Xiangyu Qi, Pin-Yu Chen, Tsung-Yi Ho:
Defensive Prompt Patch: A Robust and Interpretable Defense of LLMs against Jailbreak Attacks. CoRR abs/2405.20099 (2024) - [i13]Xiangyu Qi, Ashwinee Panda, Kaifeng Lyu, Xiao Ma, Subhrajit Roy, Ahmad Beirami, Prateek Mittal, Peter Henderson:
Safety Alignment Should Be Made More Than Just a Few Tokens Deep. CoRR abs/2406.05946 (2024) - [i12]Tinghao Xie, Xiangyu Qi, Yi Zeng, Yangsibo Huang, Udari Madhushani Sehwag, Kaixuan Huang, Luxi He, Boyi Wei, Dacheng Li, Ying Sheng, Ruoxi Jia, Bo Li, Kai Li, Danqi Chen, Peter Henderson, Prateek Mittal:
SORRY-Bench: Systematically Evaluating Large Language Model Safety Refusal Behaviors. CoRR abs/2406.14598 (2024) - [i11]Ashwinee Panda, Berivan Isik, Xiangyu Qi, Sanmi Koyejo, Tsachy Weissman, Prateek Mittal:
Lottery Ticket Adaptation: Mitigating Destructive Interference in LLMs. CoRR abs/2406.16797 (2024) - 2023
- [c5]Xiangyu Qi, Tinghao Xie, Yiming Li, Saeed Mahloujifar, Prateek Mittal:
Revisiting the Assumption of Latent Separability for Backdoor Defenses. ICLR 2023 - [c4]Tong Wu, Feiran Jia, Xiangyu Qi, Jiachen T. Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal:
Uncovering Adversarial Risks of Test-Time Adaptation. ICML 2023: 37456-37495 - [c3]Xiangyu Qi, Tinghao Xie, Jiachen T. Wang, Tong Wu, Saeed Mahloujifar, Prateek Mittal:
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples. USENIX Security Symposium 2023: 1685-1702 - [i10]Tong Wu, Feiran Jia, Xiangyu Qi, Jiachen T. Wang, Vikash Sehwag, Saeed Mahloujifar, Prateek Mittal:
Uncovering Adversarial Risks of Test-Time Adaptation. CoRR abs/2301.12576 (2023) - [i9]Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Mengdi Wang, Prateek Mittal:
Visual Adversarial Examples Jailbreak Large Language Models. CoRR abs/2306.13213 (2023) - [i8]Tinghao Xie, Xiangyu Qi, Ping He, Yiming Li, Jiachen T. Wang, Prateek Mittal:
BaDExpert: Extracting Backdoor Functionality for Accurate Backdoor Input Detection. CoRR abs/2308.12439 (2023) - [i7]Xiangyu Qi, Yi Zeng, Tinghao Xie, Pin-Yu Chen, Ruoxi Jia, Prateek Mittal, Peter Henderson:
Fine-tuning Aligned Language Models Compromises Safety, Even When Users Do Not Intend To! CoRR abs/2310.03693 (2023) - 2022
- [c2]Xiangyu Qi, Tinghao Xie, Ruizhe Pan, Jifeng Zhu, Yong Yang, Kai Bu:
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks. CVPR 2022: 13337-13347 - [i6]Xiangyu Qi, Tinghao Xie, Saeed Mahloujifar, Prateek Mittal:
Circumventing Backdoor Defenses That Are Based on Latent Separability. CoRR abs/2205.13613 (2022) - [i5]Xiangyu Qi, Tinghao Xie, Saeed Mahloujifar, Prateek Mittal:
Fight Poison with Poison: Detecting Backdoor Poison Samples via Decoupling Benign Correlations. CoRR abs/2205.13616 (2022) - 2021
- [c1]Nezihe Merve Gürel, Xiangyu Qi, Luka Rimanic, Ce Zhang, Bo Li:
Knowledge Enhanced Machine Learning Pipeline against Diverse Adversarial Attacks. ICML 2021: 3976-3987 - [i4]Nezihe Merve Gürel, Xiangyu Qi, Luka Rimanic, Ce Zhang, Bo Li:
Knowledge Enhanced Machine Learning Pipeline against Diverse Adversarial Attacks. CoRR abs/2106.06235 (2021) - [i3]Xiangyu Qi, Jifeng Zhu, Chulin Xie, Yong Yang:
Subnet Replacement: Deployment-stage backdoor attack against deep neural networks in gray-box setting. CoRR abs/2107.07240 (2021) - [i2]Xiangyu Qi, Tinghao Xie, Ruizhe Pan, Jifeng Zhu, Yong Yang, Kai Bu:
Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks. CoRR abs/2111.12965 (2021) - 2020
- [i1]Linyi Li, Xiangyu Qi, Tao Xie, Bo Li:
SoK: Certified Robustness for Deep Neural Networks. CoRR abs/2009.04131 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint