Ma, Shiqing

27 publications

NeurIPS 2025 Continuous Concepts Removal in Text-to-Image Diffusion Models Tingxu Han, Weisong Sun, Yanrong Hu, Chunrong Fang, Yonglong Zhang, Shiqing Ma, Tao Zheng, Zhenyu Chen, Zhenting Wang
CVPR 2025 Invisible Backdoor Attack Against Self-Supervised Learning Hanrong Zhang, Zhenting Wang, Boheng Li, Fulin Lin, Tingxu Han, Mingyu Jin, Chenlu Zhan, Mengnan Du, Hongwei Wang, Shiqing Ma
CVPR 2025 MLLM-as-a-Judge for Image Safety Without Human Labeling Zhenting Wang, Shuming Hu, Shiyu Zhao, Xiaowen Lin, Felix Juefei-Xu, Zhuowei Li, Ligong Han, Harihar Subramanyam, Li Chen, Jianfa Chen, Nan Jiang, Lingjuan Lyu, Shiqing Ma, Dimitris N. Metaxas, Ankit Jain
ICLR 2025 STAFF: Speculative Coreset Selection for Task-Specific Fine-Tuning Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen, Tianlin Li, Weipeng Jiang, Yang Liu
CVPR 2025 Tightening Robustness Verification of MaxPool-Based Neural Networks via Minimizing the Over-Approximation Zone Yuan Xiao, Yuchen Chen, Shiqing Ma, Chunrong Fang, Tongtong Bai, Mingzheng Gu, Yuxin Cheng, Yanwei Chen, Zhenyu Chen
ICLR 2024 DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-Image Diffusion Models Zhenting Wang, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma
AAAI 2024 Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift Shengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang
ICML 2024 How to Trace Latent Generative Model Generated Images Without Artificial Watermark? Zhenting Wang, Vikash Sehwag, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma
CVPR 2024 LOTUS: Evasive and Resilient Backdoor Attacks Through Sub-Partitioning Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang
CVPR 2024 Towards General Robustness Verification of MaxPool-Based Convolutional Neural Networks via Tightening Linear Approximation Yuan Xiao, Shiqing Ma, Juan Zhai, Chunrong Fang, Jinyuan Jia, Zhenyu Chen
ECCV 2024 UNIT: Backdoor Mitigation via Automated Neural Distribution Tightening Siyuan Cheng, Guangyu Shen, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Hanxi Guo, Shiqing Ma, Xiangyu Zhang
CVPR 2023 Detecting Backdoors in Pre-Trained Encoders Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang
NeurIPS 2023 Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration Guangyu Shen, Siyuan Cheng, Guanhong Tao, Kaiyuan Zhang, Yingqi Liu, Shengwei An, Shiqing Ma, Xiangyu Zhang
ICLR 2023 FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang
NeurIPSW 2023 How to Remove Backdoors in Diffusion Models? Shengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang
ICLR 2023 UNICORN: A Unified Backdoor Trigger Inversion Framework Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma
NeurIPS 2023 Where Did I Come from? Origin Attribution of AI-Generated Images Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma
CVPR 2022 Better Trigger Inversion Optimization in Backdoor Scanning Guanhong Tao, Guangyu Shen, Yingqi Liu, Shengwei An, Qiuling Xu, Shiqing Ma, Pan Li, Xiangyu Zhang
CVPR 2022 BppAttack: Stealthy and Efficient Trojan Attacks Against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning Zhenting Wang, Juan Zhai, Shiqing Ma
CVPR 2022 Complex Backdoor Detection by Symmetric Feature Differencing Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang
ICML 2022 Constrained Optimization with Dynamic Bound-Scaling for Effective NLP Backdoor Defense Guangyu Shen, Yingqi Liu, Guanhong Tao, Qiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang
NeurIPS 2022 Rethinking the Reverse-Engineering of Trojan Triggers Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma
NeurIPS 2022 Training with More Confidence: Mitigating Injected and Natural Backdoors During Training Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma
ICML 2021 Backdoor Scanning for Deep Neural Networks Through K-Arm Optimization Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang
ICMLW 2021 BadNL: Backdoor Attacks Against NLP Models Xiaoyi Chen, Ahmed Salem, Michael Backes, Shiqing Ma, Yang Zhang
AAAI 2021 Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang
NeurIPS 2018 Attacks Meet Interpretability: Attribute-Steered Detection of Adversarial Samples Guanhong Tao, Shiqing Ma, Yingqi Liu, Xiangyu Zhang