


default search action
Jiliang Tang
- > Home > Persons > Jiliang Tang
Publications
- 2025
[c261]Yingqian Cui, Pengfei He, Jingying Zeng, Hui Liu, Xianfeng Tang, Zhenwei Dai, Yan Han, Chen Luo, Jing Huang, Zhen Li, Suhang Wang, Yue Xing, Jiliang Tang, Qi He:
Stepwise Perplexity-Guided Refinement for Efficient Chain-of-Thought Reasoning in Large Language Models. ACL (Findings) 2025: 18581-18597
[c260]Bo Wang, Weiyi He, Shenglai Zeng, Zhen Xiang, Yue Xing, Jiliang Tang, Pengfei He:
Unveiling Privacy Risks in LLM Agent Memory. ACL (1) 2025: 25241-25260
[c258]Yingqian Cui, Jie Ren, Pengfei He, Hui Liu, Jiliang Tang, Yue Xing:
Superiority of Multi-Head Attention: A Theoretical Study in Shallow Transformers in In-Context Linear Regression. AISTATS 2025: 937-945
[c257]Yingqian Cui, Pengfei He, Xianfeng Tang, Qi He, Chen Luo, Jiliang Tang, Yue Xing:
A Theoretical Understanding of Chain-of-Thought: Coherent Reasoning and Error-Aware Demonstration. AISTATS 2025: 3475-3483
[c256]Jie Ren, Kangrui Chen, Yingqian Cui, Shenglai Zeng, Hui Liu, Yue Xing, Jiliang Tang, Lingjuan Lyu:
Six-CD: Benchmarking Concept Removals for Text-to-image Diffusion Models. CVPR 2025: 28769-28778
[c249]Pengfei He, Han Xu, Yue Xing, Hui Liu, Makoto Yamada, Jiliang Tang:
Data Poisoning for In-context Learning. NAACL (Findings) 2025: 1680-1700
[c247]Shenglai Zeng, Jiankun Zhang, Bingheng Li, Yuping Lin, Tianqi Zheng, Dante Everaert, Hanqing Lu, Hui Liu, Yue Xing, Monica Xiao Cheng, Jiliang Tang:
Towards Knowledge Checking in Retrieval-augmented Generation: A Representation Perspective. NAACL (Long Papers) 2025: 2952-2969
[c245]Jie Ren
, Kangrui Chen
, Chen Chen
, Vikash Sehwag
, Yue Xing
, Jiliang Tang
, Lingjuan Lyu
:
Self-Comparison for Dataset-Level Membership Inference in Large (Vision-)Language Model. WWW 2025: 910-920
[i209]Bo Wang, Weiyi He, Pengfei He, Shenglai Zeng, Zhen Xiang, Yue Xing, Jiliang Tang:
Unveiling Privacy Risks in LLM Agent Memory. CoRR abs/2502.13172 (2025)
[i208]Yingqian Cui, Pengfei He, Jingying Zeng, Hui Liu, Xianfeng Tang, Zhenwei Dai, Yan Han, Chen Luo, Jing Huang, Zheng Li, Suhang Wang, Yue Xing, Jiliang Tang, Qi He:
Stepwise Perplexity-Guided Refinement for Efficient Chain-of-Thought Reasoning in Large Language Models. CoRR abs/2502.13260 (2025)
[i207]Pengfei He, Yue Xing, Han Xu, Zhen Xiang, Jiliang Tang:
Multi-Faceted Studies on Data Poisoning can Advance LLM Development. CoRR abs/2502.14182 (2025)
[i198]Pengfei He, Zhenwei Dai, Xianfeng Tang, Yue Xing, Hui Liu, Jingying Zeng, Qiankun Peng, Shrivats Agrawal, Samarth Varshney
, Suhang Wang, Jiliang Tang, Qi He:
Attention Knows Whom to Trust: Attention-based Trust Management for LLM Multi-Agent Systems. CoRR abs/2506.02546 (2025)
[i191]Yingqian Cui, Zhenwei Dai, Pengfei He, Bing He, Hui Liu, Xianfeng Tang, Jingying Zeng, Suhang Wang, Yue Xing, Jiliang Tang, Benoît Dumoulin:
Adaptive Test-Time Reasoning via Reward-Guided Dual-Phase Search. CoRR abs/2509.25420 (2025)
[i188]Pengfei He, Zhenwei Dai, Bing He, Hui Liu, Xianfeng Tang, Hanqing Lu, Juanhui Li, Jiayuan Ding, Subhabrata Mukherjee, Suhang Wang, Yue Xing, Jiliang Tang, Benoît Dumoulin:
TRAJECT-Bench:A Trajectory-Aware Benchmark for Evaluating Agentic Tool Use. CoRR abs/2510.04550 (2025)- 2024
[j49]Yingqian Cui, Jie Ren
, Han Xu, Pengfei He, Hui Liu, Lichao Sun, Yue Xing, Jiliang Tang:
DiffusionShield: A Watermark for Data Copyright Protection against Generative Diffusion Models. SIGKDD Explor. 26(2): 60-75 (2024)
[j48]Yingqian Cui, Jie Ren
, Yuping Lin, Han Xu, Pengfei He, Yue Xing, Lingjuan Lyu, Wenqi Fan, Hui Liu, Jiliang Tang:
FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models. SIGKDD Explor. 26(2): 76-88 (2024)
[j44]Pengfei He, Yue Xing, Han Xu, Jie Ren, Yingqian Cui, Shenglai Zeng, Jiliang Tang, Makoto Yamada, Mohammad Sabokrou:
Stealthy Backdoor Attack via Confidence-driven Sampling. Trans. Mach. Learn. Res. 2024 (2024)
[c243]Shenglai Zeng, Yaxin Li, Jie Ren
, Yiding Liu, Han Xu, Pengfei He, Yue Xing
, Shuaiqiang Wang, Jiliang Tang, Dawei Yin:
Exploring Memorization in Fine-tuned Language Models. ACL (1) 2024: 3917-3948
[c242]Shenglai Zeng, Jiankun Zhang, Pengfei He, Yiding Liu, Yue Xing
, Han Xu, Jie Ren
, Yi Chang, Shuaiqiang Wang, Dawei Yin, Jiliang Tang:
The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG). ACL (Findings) 2024: 4505-4524
[c239]Jie Ren
, Yaxin Li
, Shenglai Zeng, Han Xu
, Lingjuan Lyu, Yue Xing
, Jiliang Tang:
Unveiling and Mitigating Memorization in Text-to-Image Diffusion Models Through Cross Attention. ECCV (77) 2024: 340-356
[c237]Yuping Lin, Pengfei He, Han Xu, Yue Xing, Makoto Yamada, Hui Liu, Jiliang Tang:
Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis. EMNLP 2024: 7067-7085
[i184]Yingqian Cui, Jie Ren, Pengfei He, Jiliang Tang, Yue Xing:
Superiority of Multi-Head Attention in In-Context Linear Regression. CoRR abs/2401.17426 (2024)
[i182]Pengfei He, Han Xu, Yue Xing, Hui Liu, Makoto Yamada, Jiliang Tang:
Data Poisoning for In-context Learning. CoRR abs/2402.02160 (2024)
[i170]Shenglai Zeng, Jiankun Zhang, Pengfei He, Yue Xing, Yiding Liu, Han Xu, Jie Ren, Shuaiqiang Wang, Dawei Yin, Yi Chang, Jiliang Tang:
The Good and The Bad: Exploring Privacy Issues in Retrieval-Augmented Generation (RAG). CoRR abs/2402.16893 (2024)
[i169]Jie Ren, Yaxin Li, Shenglai Zeng, Han Xu, Lingjuan Lyu, Yue Xing, Jiliang Tang:
Unveiling and Mitigating Memorization in Text-to-image Diffusion Models through Cross Attention. CoRR abs/2403.11052 (2024)
[i159]Yuping Lin, Pengfei He, Han Xu, Yue Xing, Makoto Yamada, Hui Liu, Jiliang Tang:
Towards Understanding Jailbreak Attacks in LLMs: A Representation Space Analysis. CoRR abs/2406.10794 (2024)
[i155]Jie Ren, Yingqian Cui, Chen Chen, Vikash Sehwag, Yue Xing, Jiliang Tang, Lingjuan Lyu:
EnTruth: Enhancing the Traceability of Unauthorized Dataset Usage in Text-to-image Diffusion Models with Minimal and Robust Alterations. CoRR abs/2406.13933 (2024)
[i154]Shenglai Zeng, Jiankun Zhang, Pengfei He, Jie Ren, Tianqi Zheng, Hanqing Lu, Han Xu, Hui Liu, Yue Xing, Jiliang Tang:
Mitigating the Privacy Issues in Retrieval-Augmented Generation (RAG) via Pure Synthetic Data. CoRR abs/2406.14773 (2024)
[i153]Jie Ren
, Kangrui Chen, Yingqian Cui, Shenglai Zeng, Hui Liu, Yue Xing, Jiliang Tang, Lingjuan Lyu:
Six-CD: Benchmarking Concept Removals for Benign Text-to-image Diffusion Models. CoRR abs/2406.14855 (2024)
[i144]Pengfei He, Yingqian Cui, Han Xu, Hui Liu, Makoto Yamada, Jiliang Tang, Yue Xing:
Towards the Effect of Examples on In-Context Learning: A Theoretical Case Study. CoRR abs/2410.09411 (2024)
[i143]Jie Ren, Kangrui Chen, Chen Chen, Vikash Sehwag, Yue Xing, Jiliang Tang, Lingjuan Lyu:
Self-Comparison for Dataset-Level Membership Inference in Large (Vision-)Language Models. CoRR abs/2410.13088 (2024)
[i142]Yingqian Cui, Pengfei He, Xianfeng Tang, Qi He, Chen Luo, Jiliang Tang, Yue Xing:
A Theoretical Understanding of Chain-of-Thought: Coherent Reasoning and Error-Aware Demonstration. CoRR abs/2410.16540 (2024)
[i141]Pengfei He, Zitao Li, Yue Xing, Yaling Li, Jiliang Tang, Bolin Ding:
Make LLMs better zero-shot reasoners: Structure-orientated autonomous reasoning. CoRR abs/2410.19000 (2024)
[i138]Shenglai Zeng, Jiankun Zhang, Bingheng Li, Yuping Lin, Tianqi Zheng, Dante Everaert, Hanqing Lu, Hui Liu, Yue Xing, Monica Xiao Cheng, Jiliang Tang:
Towards Knowledge Checking in Retrieval-augmented Generation: A Representation Perspective. CoRR abs/2411.14572 (2024)- 2023
[i119]Yingqian Cui, Jie Ren, Yuping Lin, Han Xu, Pengfei He, Yue Xing, Wenqi Fan, Hui Liu, Jiliang Tang:
FT-Shield: A Watermark Against Unauthorized Fine-tuning in Text-to-Image Diffusion Models. CoRR abs/2310.02401 (2023)
[i117]Pengfei He, Han Xu, Yue Xing, Jie Ren, Yingqian Cui, Shenglai Zeng, Jiliang Tang, Makoto Yamada, Mohammad Sabokrou:
Confidence-driven Sampling for Backdoor Attacks. CoRR abs/2310.05263 (2023)
[i116]Shenglai Zeng, Yaxin Li, Jie Ren, Yiding Liu, Han Xu, Pengfei He, Yue Xing, Shuaiqiang Wang, Jiliang Tang, Dawei Yin:
Exploring Memorization in Fine-tuned Language Models. CoRR abs/2310.06714 (2023)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-23 20:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






