default search action
Jing Xu 0028
Person information
- affiliation: Delft University of Technology, Netherlands
Other persons with the same name
- Jing Xu — disambiguation page
- Jing Xu 0001 — East China Normal University, School of Information Science and Technology, Shanghai, China (and 3 more)
- Jing Xu 0002 — Chinese Academy of Sciences, Trusted Computing and Information Assurance Laboratory, Beijing, China (and 2 more)
- Jing Xu 0003 — Xi'an Jiaotong University, Department of Information and Communications Engineering, China
- Jing Xu 0004 — Zhejiang Gongshang University, School of Statistics and Mathematics, Hangzhou, China (and 3 more)
- Jing Xu 0005 — Huazhong University of Science and Technology, Department of Electronics and Information Engineering, Wuhan, China
- Jing Xu 0006 — Soochow University, Institute of Intelligent Information Processing and Applications, Suzhou, China
- Jing Xu 0007 — University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
- Jing Xu 0008 — Nankai University, College of Information Technical Science, Tianjin, China
- Jing Xu 0009 — University of California, Riverside, USA
- Jing Xu 0010 — Chinese University of Hong Kong, Hong Kong
- Jing Xu 0011 — Tsinghua University, Department of Mechanical Engineering, Beijing Key Laboratory of Precision/Ultra-Precision Manufacturing Equipment Control & State Key Laboratory of Tribology, Beijing, China
- Jing Xu 0012 — Google, Mountain View, CA, USA (and 3 more)
- Jing Xu 0013 — Jiangsu University of Science and Technology, Marine Equipment and Technology Institute, Zhenjiang, China (and 1 more)
- Jing Xu 0014 — University of Massachusetts Lowell, Department of Computer Science, Lowell MA, USA
- Jing Xu 0015 — East China University of Science and Technology, Key Laboratory of Advanced Control and Optimization for Chemical Process, Shanghai, China (and 1 more)
- Jing Xu 0016 — Northeastern University, School of Mechanical Engineering and Automation, Shenyang, China
- Jing Xu 0017 — Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing, China
- Jing Xu 0018 — Zhejiang A&F University, Department of Optical Engineering, Lin'an, China (and 1 more)
- Jing Xu 0019 — Renmin University of China, School of Finance, Beijing, China
- Jing Xu 0020 — University of California Santa Barbara, Department of Geography, Santa Barbara, CA, USA
- Jing Xu 0021 — University of Jinan, School of Information Science and Engineering, & Shandong Provincial Key Laboratory of Network Based Intelligent Computing, Jinan, China
- Jing Xu 0022 — Xidian University, School of Mathematics and Statistics, Xi'an, China
- Jing Xu 0023 — Capital Normal University, School of Management, Beijing, China
- Jing Xu 0024 — Carleton University, Department of Systems and Computer Engineering, Ottawa, Canada
- Jing Xu 0025 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China
- Jing Xu 0026 — Capital Normal University, Department of Mathematics, Beijing, China
- Jing Xu 0027 — Tsinghua University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [b1]Jing Xu:
Connecting the dots: Exploring backdoor attacks on graph neural networks. Delft University of Technology, Netherlands, 2025 - 2024
- [j2]Jing Xu, Stefanos Koffas, Stjepan Picek:
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks. DTRAP 5(2): 15:1-15:29 (2024) - 2023
- [c8]Jing Xu, Stjepan Picek:
Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks. CCS 2023: 3570-3572 - [c7]Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. EuroS&P 2023: 1179-1197 - [c6]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. IJCNN 2023: 1-8 - [i9]Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek:
A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification. CoRR abs/2302.01740 (2023) - [i8]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. CoRR abs/2304.02277 (2023) - [i7]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023) - [i6]Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha A. Larson, Stjepan Picek:
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data. CoRR abs/2311.07550 (2023) - 2022
- [c5]Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. ACSAC 2022: 684-698 - [c4]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. AISec@CCS 2022: 1-12 - [c3]Jing Xu, Stjepan Picek:
Poster: Clean-label Backdoor Attack on Graph Neural Networks. CCS 2022: 3491-3493 - [c2]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. WiseML@WiSec 2022: 57-62 - [i5]Jing Xu, Rui Wang, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. CoRR abs/2202.03195 (2022) - [i4]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. CoRR abs/2207.13766 (2022) - 2021
- [j1]Jing Xu, Gongliu Yang, Yiding Sun, Stjepan Picek:
A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System. IEEE Access 9: 12044-12054 (2021) - [c1]Jing Xu, Minhui (Jason) Xue, Stjepan Picek:
Explainability-based Backdoor Attacks Against Graph Neural Networks. WiseML@WiSec 2021: 31-36 - [i3]Jing Xu, Minhui (Jason) Xue, Stjepan Picek:
Explainability-based Backdoor Attacks Against Graph Neural Networks. CoRR abs/2104.03674 (2021) - [i2]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers. CoRR abs/2107.14569 (2021) - [i1]Jing Xu, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. CoRR abs/2110.11024 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint