Follow
Hanxun Huang
Title
Cited by
Cited by
Year
Normalized Loss Functions for Deep Learning with Noisy Labels
X Ma, H Huang, Y Wang, S Romano, S Erfani, J Bailey
International Conference on Machine Learning (ICML), 2020
5292020
Unlearnable Examples: Making Personal Data Unexploitable
H Huang, X Ma, SM Erfani, J Bailey, Y Wang
International Conference on Learning Representations (ICLR), 2021
2082021
Exploring Architectural Ingredients of Adversarially Robust Deep Neural Networks
H Huang, Y Wang, SM Erfani, Q Gu, J Bailey, X Ma
Advances in Neural Information Processing Systems (NeurIPS), 2021
1182021
Distilling Cognitive Backdoor Patterns within an Image
H Huang, X Ma, S Erfani, J Bailey
International Conference on Learning Representations (ICLR), 2023
342023
Imbalanced Gradients: A Subtle Cause of Overestimated Adversarial Robustness
X Ma, L Jiang, H Huang, Z Weng, J Bailey, YG Jiang
Machine Learning, 2023
252023
Backdoorllm: A comprehensive benchmark for backdoor attacks on large language models
Y Li, H Huang, Y Zhao, X Ma, J Sun
arXiv preprint arXiv:2408.12798, 2024
172024
Shortcuts Everywhere and Nowhere: Exploring Multi-Trigger Backdoor Attacks
Y Li, J He, H Huang, J Sun, X Ma
arXiv e-prints, arXiv: 2401.15295, 2024
10*2024
LDReg: Local Dimensionality Regularized Self-Supervised Learning
H Huang, RJGB Campello, SM Erfani, X Ma, ME Houle, J Bailey
International Conference on Learning Representations (ICLR), 2024
82024
Neural Architecture Search via Combinatorial Multi-Armed Bandit
H Huang, X Ma, SM Erfani, J Bailey
International Joint Conference on Neural Networks (IJCNN), 2021
72021
Safety at Scale: A Comprehensive Survey of Large Model Safety
X Ma, Y Gao, Y Wang, R Wang, X Wang, Y Sun, Y Ding, H Xu, Y Chen, ...
arXiv preprint arXiv:2502.05206, 2025
32025
Expose before you defend: Unifying and enhancing backdoor defenses via exposed models
Y Li, H Huang, J Zhang, X Ma, YG Jiang
arXiv preprint arXiv:2410.19427, 2024
32024
Detecting Backdoor Samples in Contrastive Language Image Pretraining
H Huang, S Erfani, Y Li, X Ma, J Bailey
International Conference on Learning Representations (ICLR), 2025
22025
Downstream Transfer Attack: Adversarial Attacks on Downstream Models with Pre-trained Vision Transformers
W Zheng, X Ma, H Huang, Z Wu, YG Jiang
arXiv preprint arXiv:2408.01705, 2024
12024
CURVALID: Geometrically-guided Adversarial Prompt Detection
C Yung, H Huang, SM Erfani, C Leckie
arXiv preprint arXiv:2503.03502, 2025
2025
Towards Million-Scale Adversarial Robustness Evaluation With Stronger Individual Attacks
Y Xie, W Zheng, H Huang, G Ye, X Ma
The IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2025
2025
Bayesian Estimation Approaches for Local Intrinsic Dimensionality
JB Zaher Joukhadar, Hanxun Huang, Sarah M. Erfani, Ricardo J. G. B. Campello ...
Similarity Search and Applications: 17th International Conference, SISAP …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–16