Picture for Qiongkai Xu

Qiongkai Xu

PatentScore: Multi-dimensional Evaluation of LLM-Generated Patent Claims

Add code
May 25, 2025
Viaarxiv icon

PatentMind: A Multi-Aspect Reasoning Graph for Patent Similarity Evaluation

Add code
May 25, 2025
Viaarxiv icon

GRADA: Graph-based Reranker against Adversarial Documents Attack

Add code
May 12, 2025
Figure 1 for GRADA: Graph-based Reranker against Adversarial Documents Attack
Figure 2 for GRADA: Graph-based Reranker against Adversarial Documents Attack
Figure 3 for GRADA: Graph-based Reranker against Adversarial Documents Attack
Figure 4 for GRADA: Graph-based Reranker against Adversarial Documents Attack
Viaarxiv icon

Defending Deep Neural Networks against Backdoor Attacks via Module Switching

Add code
Apr 08, 2025
Viaarxiv icon

Cut the Deadwood Out: Post-Training Model Purification with Selective Module Substitution

Add code
Dec 29, 2024
Viaarxiv icon

Overview of the 2024 ALTA Shared Task: Detect Automatic AI-Generated Sentences for Human-AI Hybrid Articles

Add code
Dec 19, 2024
Figure 1 for Overview of the 2024 ALTA Shared Task: Detect Automatic AI-Generated Sentences for Human-AI Hybrid Articles
Figure 2 for Overview of the 2024 ALTA Shared Task: Detect Automatic AI-Generated Sentences for Human-AI Hybrid Articles
Figure 3 for Overview of the 2024 ALTA Shared Task: Detect Automatic AI-Generated Sentences for Human-AI Hybrid Articles
Viaarxiv icon

WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation Watermarks

Add code
Aug 29, 2024
Figure 1 for WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation Watermarks
Figure 2 for WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation Watermarks
Figure 3 for WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation Watermarks
Figure 4 for WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation Watermarks
Viaarxiv icon

IDT: Dual-Task Adversarial Attacks for Privacy Protection

Add code
Jun 28, 2024
Figure 1 for IDT: Dual-Task Adversarial Attacks for Privacy Protection
Figure 2 for IDT: Dual-Task Adversarial Attacks for Privacy Protection
Figure 3 for IDT: Dual-Task Adversarial Attacks for Privacy Protection
Figure 4 for IDT: Dual-Task Adversarial Attacks for Privacy Protection
Viaarxiv icon

NAP^2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human

Add code
Jun 06, 2024
Figure 1 for NAP^2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human
Figure 2 for NAP^2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human
Figure 3 for NAP^2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human
Figure 4 for NAP^2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human
Viaarxiv icon

Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients

Add code
Jun 03, 2024
Figure 1 for Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients
Figure 2 for Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients
Figure 3 for Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients
Figure 4 for Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients
Viaarxiv icon