default search action
Zi Liang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
- [j4]Haitao Bai
, Pinghui Wang, Ruofei Zhang, Zi Liang
, Ziyang Zhou, Zhou Su:
AdDetector: Detecting Chinese Advertorials on Social Media Platforms with Textual and Social Information. ACM Trans. Asian Low Resour. Lang. Inf. Process. 25(3): 22:1-22:32 (2026) - [c15]Yaxin Xiao, Qingqing Ye, Zi Liang, Haoyang Li, Ronghua Li, Huadi Zheng, Haibo Hu:
Class-feature Watermark: A Resilient Black-box Watermark Against Model Extraction Attacks. AAAI 2026: 35903-35912 - [c14]Zi Liang, Liantong Yu, Shiyu Zhang, Qingqing Ye, Haibo Hu:
How Much Do Large Language Model Cheat on Evaluation? Benchmarking Overestimation Under the One-Time-Pad-Based Framework. AAAI 2026: 37636-37644 - [c13]Zhiyao Wu, Zi Liang
, Haibo Hu
:
Decoding Web Memorization: A Semantic Membership Inference Attack on LLMs. WWW 2026: 3624-3632 - [i22]Xiaoyu Xu, Minxin Du, Zitong Li, Zi Liang, Zhibiao Guo, Shiyu Zhang, Peizhao Hu, Qingqing Ye, Haibo Hu:
From Domains to Instances: Dual-Granularity Data Synthesis for LLM Unlearning. CoRR abs/2601.04278 (2026) - [i21]Xiaoyu Xu, Minxin Du, Kun Fang, Zi Liang, Yaxin Xiao, Zhicong Huang, Cheng Hong, Qingqing Ye, Haibo Hu:
FIT: Defying Catastrophic Forgetting in Continual LLM Unlearning. CoRR abs/2601.21682 (2026) - [i20]Shuxin Zhuang, Zi Liang, Runsheng Yu, Hongzong Li, Rong Feng, Shiqin Tang, Youzhi Zhang:
How Much Information Can a Vision Token Hold? A Scaling Law for Recognition Limits in VLMs. CoRR abs/2602.02539 (2026) - [i19]Ao Ding, Hongzong Li, Zi Liang, Zhanpeng Shi, Shuxin Zhuang, Shiqin Tang, Rong Feng, Ping Lu:
How Vulnerable Are Edge LLMs? CoRR abs/2603.23822 (2026) - [i18]Zi Liang, Qipeng Xie, Jun He, Bohuan Xue, Weizheng Wang, Yuandao Cai, Fei Luo, Boxian Zhang, Haibo Hu, Kaishun Wu:
Argus: Reorchestrating Static Analysis via a Multi-Agent Ensemble for Full-Chain Security Vulnerability Detection. CoRR abs/2604.06633 (2026) - [i17]Yanyun Wang, Qingqing Ye, Li Liu, Zi Liang, Haibo Hu:
Robust Alignment: Harmonizing Clean Accuracy and Adversarial Robustness in Adversarial Training. CoRR abs/2604.26496 (2026) - 2025
- [j3]Yaxin Xiao
, Haibo Hu
, Qingqing Ye
, Li Tang
, Zi Liang
, Huadi Zheng
:
Unlocking High-Fidelity Learning: Towards Neuron-Grained Model Extraction. IEEE Trans. Dependable Secur. Comput. 22(6): 6622-6635 (2025) - [j2]Nuo Xu
, Pinghui Wang
, Zi Liang
, Junzhou Zhao
, Xiaohong Guan
:
How Vital Is the Jurisprudential Relevance: Law Article-Intervened Legal Case Retrieval and Matching. ACM Trans. Inf. Syst. 43(4): 85:1-85:32 (2025) - [c12]Zi Liang, Pinghui Wang, Ruofei Zhang, Haibo Hu, Shuo Zhang, Qingqing Ye, Nuo Xu, Yaxin Xiao, Chen Zhang, Lizhen Cui:
Exploring Intrinsic Alignments Within Text Corpus. AAAI 2025: 27455-27463 - [c11]Zi Liang, Qingqing Ye, Yanyun Wang, Sen Zhang, Yaxin Xiao, Ronghua Li, Jianliang Xu, Haibo Hu:
"Yes, My LoRD." Guiding Language Model Extraction with Locality Reinforced Distillation. ACL (1) 2025: 1441-1465 - [c10]Zi Liang, Peng Hu
, Lian Li, Zebang Cheng, Yisu Dong, Haibo He, Qiang Lu, Nan Lin:
EEG-VL: Integrating Visual Features with Large Language Models for Automated Seizure Detection. BIBM 2025: 4620-4627 - [c9]Ziyang Zhou, Pinghui Wang, Zi Liang, Haitao Bai, Ruofei Zhang:
Cross-Modal 3D Representation with Multi-View Images and Point Clouds. CVPR 2025: 3728-3739 - [c8]Yaxin Xiao, Qingqing Ye, Li Hu, Huadi Zheng, Haibo Hu, Zi Liang, Haoyang Li, Yijie Jiao:
Reminiscence Attack on Residuals: Exploiting Approximate Machine Unlearning for Privacy. ICCV 2025: 3058-3068 - [c7]Zi Liang, Haibo Hu, Qingqing Ye, Yaxin Xiao, Ronghua Li:
Does Low Rank Adaptation Lead to Lower Robustness against Training-Time Attacks? ICML 2025 - [i16]Nuo Xu, Pinghui Wang, Zi Liang, Junzhou Zhao, Xiaohong Guan:
How Vital is the Jurisprudential Relevance: Law Article Intervened Legal Case Retrieval and Matching. CoRR abs/2502.18292 (2025) - [i15]Zi Liang, Haibo Hu, Qingqing Ye, Yaxin Xiao, Ronghua Li:
Does Low Rank Adaptation Lead to Lower Robustness against Training-Time Attacks? CoRR abs/2505.12871 (2025) - [i14]Haoyang Shang, Xuan Liu, Zi Liang, Jie Zhang, Haibo Hu, Song Guo:
United Minds or Isolated Agents? Exploring Coordination of LLMs under Cognitive Load Theory. CoRR abs/2506.06843 (2025) - [i13]Zi Liang, Liantong Yu, Shiyu Zhang, Qingqing Ye, Haibo Hu:
How Much Do Large Language Model Cheat on Evaluation? Benchmarking Overestimation under the One-Time-Pad-Based Framework. CoRR abs/2507.19219 (2025) - [i12]Yaxin Xiao, Qingqing Ye, Li Hu, Huadi Zheng, Haibo Hu, Zi Liang, Haoyang Li, Yijie Jiao:
Reminiscence Attack on Residuals: Exploiting Approximate Machine Unlearning for Privacy. CoRR abs/2507.20573 (2025) - [i11]Zi Liang, Qingqing Ye, Xiang-Yang Alex Liu, Yanyun Wang, Jianliang Xu, Haibo Hu:
Virus Infection Attack on LLMs: Your Poisoning Can Spread "VIA" Synthetic Data. CoRR abs/2509.23041 (2025) - [i10]Fei Gu, Zi Liang, Hongzong LI, Jiahao MA:
The Matthew Effect of AI Programming Assistants: A Hidden Bias in Software Evolution. CoRR abs/2509.23261 (2025) - [i9]Zi Liang, Zhiyao Wu, Haoyang Shang, Yulin Jin, Qingqing Ye, Huadi Zheng, Peizhao Hu, Haibo Hu:
Decision Potential Surface: A Theoretical and Practical Approximation of LLM's Decision Boundary. CoRR abs/2510.03271 (2025) - [i8]Li Bai, Qingqing Ye, Xinwei Zhang, Sen Zhang, Zi Liang, Jianliang Xu, Haibo Hu:
Toward Efficient Inference Attacks: Shadow Model Sharing via Mixture-of-Experts. CoRR abs/2510.13451 (2025) - [i7]Yaxin Xiao, Qingqing Ye, Zi Liang, Haoyang Li, Ronghua Li, Huadi Zheng, Haibo Hu:
Class-feature Watermark: A Resilient Black-box Watermark Against Model Extraction Attacks. CoRR abs/2511.07947 (2025) - 2024
- [j1]Nan Lin
, Weifang Gao, Lian Li, Junhui Chen, Zi Liang, Gonglin Yuan, Heyang Sun, Qing Li, Jianhua Chen, Liri Jin, Yan Huang, Xiangqin Zhou, Shaobo Zhang, Peng Hu
, Chaoyue Dai, Haibo He, Yisu Dong, Liying Cui, Qiang Lu:
vEpiNet: A multimodal interictal epileptiform discharge detection method based on video and electroencephalogram data. Neural Networks 175: 106319 (2024) - [c6]Zi Liang, Pinghui Wang, Ruofei Zhang, Nuo Xu
, Shuo Zhang, Lifeng Xing, Haitao Bai
, Ziyang Zhou:
MERGE: Fast Private Text Generation. AAAI 2024: 19884-19892 - [c5]Yanyun Wang
, Dehui Du, Haibo Hu, Zi Liang, Yuanhao Liu:
TSFool: Crafting Highly-Imperceptible Adversarial Time Series Through Multi-Objective Attack. ECAI 2024: 1422-1429 - [c4]Ziyang Zhou
, Pinghui Wang
, Zi Liang
, Ruofei Zhang
, Haitao Bai
:
PAIR: Pre-denosing Augmented Image Retrieval Model for Defending Adversarial Patches. ACM Multimedia 2024: 5771-5779 - [i6]Zi Liang, Haibo Hu, Qingqing Ye, Yaxin Xiao, Haoyang Li:
Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in Customized Large Language Models. CoRR abs/2408.02416 (2024) - [i5]Zi Liang, Qingqing Ye, Yanyun Wang
, Sen Zhang, Yaxin Xiao, Ronghua Li, Jianliang Xu, Haibo Hu:
Alignment-Aware Model Extraction Attacks on Large Language Models. CoRR abs/2409.02718 (2024) - [i4]Yanyun Wang
, Li Liu, Zi Liang, Qingqing Ye, Haibo Hu:
New Paradigm of Adversarial Training: Breaking Inherent Trade-Off between Accuracy and Robustness via Dummy Classes. CoRR abs/2410.12671 (2024) - 2023
- [c3]Shuo Zhang, Junzhou Zhao, Pinghui Wang, Tianxiang Wang, Zi Liang, Jing Tao, Yi Huang, Junlan Feng:
Multi-Action Dialog Policy Learning from Logged User Feedback. AAAI 2023: 13976-13983 - [i3]Shuo Zhang, Junzhou Zhao, Pinghui Wang, Tianxiang Wang, Zi Liang, Jing Tao, Yi Huang, Junlan Feng:
Multi-Action Dialog Policy Learning from Logged User Feedback. CoRR abs/2302.13505 (2023) - [i2]Zi Liang, Pinghui Wang, Ruofei Zhang, Shuo Zhang, Xiaofan Ye, Yi Huang, Junlan Feng:
Healing Unsafe Dialogue Responses with Weak Supervision Signals. CoRR abs/2305.15757 (2023) - [i1]Zi Liang, Pinghui Wang, Ruofei Zhang, Nuo Xu, Shuo Zhang:
MERGE: Fast Private Text Generation. CoRR abs/2305.15769 (2023)
2010 – 2019
- 2018
- [c2]Yanci Zhang, Zi Liang, Xiaoyao Li, Wenjie Ren, Yanli Liu:
Automatic Identification of Performance Bottleneck for A Complex Rendering System through Big Data. CGI 2018: 33-40 - 2016
- [c1]Hui Yu, Jiahai Yang, Cong Xu, Hui Wang, Zi Liang:
SpongeNet: Towards bandwidth guarantees of cloud datacenter with two-phase VM placement. NOMS 2016: 410-417
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-05-21 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint