Xuanli He
Cited by
Cited by
Fog-empowered anomaly detection in IoT using hyperellipsoidal clustering
L Lyu, J Jin, S Rajasegarar, X He, M Palaniswami
IEEE Internet of Things Journal 4 (5), 1174-1184, 2017
Privacy-preserving collaborative deep learning with application to human activity recognition
L Lyu, X He, YW Law, M Palaniswami
Proceedings of the 2017 ACM on Conference on Information and Knowledge …, 2017
Model extraction and adversarial transferability, your BERT is vulnerable!
X He, L Lyu, Q Xu, L Sun
arXiv preprint arXiv:2103.10013, 2021
Protecting intellectual property of language generation apis with lexical watermark
X He, Q Xu, L Lyu, F Wu, C Wang
Proceedings of the AAAI Conference on Artificial Intelligence 36 (10), 10758 …, 2022
Differentially private representation for nlp: Formal guarantee and an empirical study on privacy and fairness
L Lyu, X He, Y Li
arXiv preprint arXiv:2010.01285, 2020
Generate, annotate, and learn: Nlp with synthetic text
X He, I Nassar, J Kiros, G Haffari, M Norouzi
Transactions of the Association for Computational Linguistics 10, 826-842, 2022
Word representation models for morphologically rich languages in neural machine translation
E Vylomova, T Cohn, X He, G Haffari
arXiv preprint arXiv:1606.04217, 2016
Fog-embedded deep learning for the Internet of Things
L Lyu, JC Bezdek, X He, J Jin
IEEE Transactions on Industrial Informatics 15 (7), 4206-4215, 2019
Sequence to sequence mixture model for diverse machine translation
X He, G Haffari, M Norouzi
arXiv preprint arXiv:1810.07391, 2018
Cater: Intellectual property protection on text generation apis via conditional watermarks
X He, Q Xu, Y Zeng, L Lyu, F Wu, J Li, R Jia
Advances in Neural Information Processing Systems 35, 5431-5445, 2022
Towards differentially private text representations
L Lyu, Y Li, X He, T Xiao
Proceedings of the 43rd International ACM SIGIR Conference on Research and …, 2020
Dynamic Programming Encoding for Subword Segmentation in Neural Machine Translation
X He, G Haffari, M Norouzi
Use of llms for illicit purposes: Threats, prevention measures, and vulnerabilities
M Mozes, X He, B Kleinberg, LD Griffin
arXiv preprint arXiv:2308.12833, 2023
Student surpasses teacher: Imitation attack for black-box NLP APIs
Q Xu, X He, L Lyu, L Qu, G Haffari
arXiv preprint arXiv:2108.13873, 2021
Privacy-preserving collaborative fuzzy clustering
L Lyu, JC Bezdek, YW Law, X He, M Palaniswami
Data & Knowledge Engineering 116, 21-41, 2018
G3detector: General gpt-generated text detector
H Zhan, X He, Q Xu, Y Wu, P Stenetorp
arXiv preprint arXiv:2305.12680, 2023
Killing two birds with one stone: Stealing model and inferring attribute from BERT-based APIs
L Lyu, X He, F Wu, L Sun
arXiv e-prints, arXiv: 2105.10909, 2021
StarCoder 2 and The Stack v2: The Next Generation
A Lozhkov, R Li, LB Allal, F Cassano, J Lamy-Poirier, N Tazi, A Tang, ...
arXiv preprint arXiv:2402.19173, 2024
Scene graph modification based on natural language commands
X He, QH Tran, G Haffari, W Chang, T Bui, Z Lin, F Dernoncourt, N Dam
arXiv preprint arXiv:2010.02591, 2020
Magic pyramid: Accelerating inference with early exiting and token pruning
X He, I Keivanloo, Y Xu, X He, B Zeng, S Rajagopalan, T Chilimbi
arXiv preprint arXiv:2111.00230, 2021
The system can't perform the operation now. Try again later.
Articles 1–20