Mr Qiongkai Xu
Honorary (Fellow)
School of Computing and Information Systems
47 Scholarly works
0 Projects
HIGHLIGHTS
2022
Conference Proceedings
Protecting Intellectual Property of Language Generation APIs with LexicalWatermark
DOI: 10.1609/aaai.v36i10.213212022
Conference Proceedings
Extracted BERT Model Leaks More Information than You Think!
DOI: 10.18653/v1/2022.emnlp-main.992021
Conference Proceedings
Privacy Monitoring Service for Conversations
DOI: 10.1145/3437963.34417062021
Conference Proceedings
Model Extraction and Adversarial Transferability, Your BERT is Vulnerable!
DOI: 10.18653/v1/2021.naacl-main.1612020
Conference Proceedings
Adhering, Steering, and Queering: Treatment of Gender in Natural Language Generation
DOI: 10.1145/3313831.33763152020
Conference Proceedings
Personal information leakage detection in conversations
DOI: 10.18653/v1/2020.emnlp-main.5322019
Conference Proceedings
Privacy-aware text rewriting
DOI: 10.18653/v1/w19-8633
RECENT SCHOLARLY WORKS
2025
Journal article
IDT: Dual-Task Adversarial Rewriting for Attribute Anonymization
DOI: 10.1162/coli.a.172025
Conference Proceedings
HEAL: Healthcare Emergency Assistants Leveraging Large Language Models
DOI: 10.1145/3701716.37151812025
Conference Proceedings
ALGEN: Few-shot Inversion Attacks on Textual Embeddings via Cross-Model Alignment and Generation
DOI: 10.18653/v1/2025.acl-long.11852025
Conference Proceedings
TUBA: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning
DOI: 10.18653/v1/2025.findings-acl.8482025
Conference Proceedings
WET: Overcoming Paraphrasing Vulnerabilities in Embeddings-as-a-Service with Linear Transformation Watermark
DOI: 10.18653/v1/2025.acl-long.11222025
Conference Proceedings
NAP2: A Benchmark for Naturalness and Privacy-Preserving Text Rewriting by Learning from Human
DOI: 10.18653/v1/2025.findings-emnlp.4762025
Conference Proceedings
Cut the Deadwood Out: Backdoor Purification via Guided Module Substitution
DOI: 10.18653/v1/2025.findings-emnlp.12932025
Conference Proceedings
GRADA: Graph-based Reranking against Adversarial Documents Attack
DOI: 10.18653/v1/2025.emnlp-main.1132