An Embarrassingly Simple Backdoor Attack on Self-supervised Learning C Li, R Pang, Z Xi, T Du, S Ji, Y Yao, T Wang The 2023 International Conference on Computer Vision (ICCV' 23), 2023 | 44* | 2023 |
Seeing is living? rethinking the security of facial liveness verification in the deepfake era C Li, L Wang, S Ji, X Zhang, Z Xi, S Guo, T Wang USENIX Security 2022, 2022 | 37 | 2022 |
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks Z Xi, T Du, C Li, R Pang, S Ji, J Chen, F Ma, T Wang Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS' 23), 2023 | 25* | 2023 |
IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI B Cao, C Li, T Wang, J Jia, B Li, J Chen Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS' 23), 2023 | 16 | 2023 |
PRSA: Prompt Reverse Stealing Attacks against Large Language Models Y Yang, C Li, Y Jiang, X Chen, H Wang, X Zhang, Z Wang, S Ji arXiv preprint arXiv:2402.19200, 2024 | 15 | 2024 |
Towards certifying the asymmetric robustness for neural networks: Quantification and applications C Li, S Ji, H Weng, B Li, J Shi, R Beyah, S Guo, Z Wang, T Wang IEEE Transactions on Dependable and Secure Computing 19 (6), 3987-4001, 2021 | 14 | 2021 |
Model extraction attacks revisited J Liang, R Pang, C Li, T Wang Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 12 | 2024 |
DeT: Defending against adversarial examples via decreasing transferability C Li, H Weng, S Ji, J Dong, Q He Cyberspace Safety and Security: 11th International Symposium, CSS 2019 …, 2019 | 12 | 2019 |
Hijack Vertical Federated Learning Models As One Party P Qiu, X Zhang, S Ji, C Li, Y Pu, X Yang, T Wang IEEE Transactions on Dependable and Secure Computing, 2024 | 10* | 2024 |
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done? Y Chen, J Wu, X Ling, C Li, Z Rui, T Luo, Y Wu Proceedings of the 2024 IEEE/ACM 46th International Conference on Software …, 2024 | 8 | 2024 |
Improving the robustness of transformer-based large language models with dynamic attention L Shen, Y Pu, S Ji, C Li, X Zhang, C Ge, T Wang arXiv preprint arXiv:2311.17400, 2023 | 7 | 2023 |
On the Security Risks of Knowledge Graph Reasoning Z Xi, T Du, C Li, R Pang, S Ji, X Luo, X Xiao, F Ma, T Wang USENIX Security 2023, 2023 | 6 | 2023 |
The Dark Side of AutoML: Towards Architectural Backdoor Search R Pang, C Li, Z Xi, S Ji, T Wang The Eleventh International Conference on Learning Representations (ICLR' 2023), 2022 | 4 | 2022 |
Robustkv: Defending large language models against jailbreak attacks via kv eviction T Jiang, Z Wang, J Liang, C Li, Y Wang, T Wang arXiv preprint arXiv:2410.19937, 2024 | 2 | 2024 |
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks C Li, R Pang, B Cao, Z Xi, J Chen, S Ji, T Wang USENIX Security 2024, 2024 | 2 | 2024 |
Towards query-efficient decision-based adversarial attacks through frequency domain J Fu, X Ling, Y Qian, C Li, T Luo, J Wu 2024 IEEE International Conference on Multimedia and Expo (ICME), 1-6, 2024 | 1 | 2024 |
Reasoning over Multi-view Knowledge Graphs Z Xi, R Pang, C Li, T Du, S Ji, F Ma, T Wang arXiv preprint arXiv:2209.13702, 2022 | 1 | 2022 |
A Change of Heart: Backdoor Attacks on Security-Centric Diffusion Models C Li, R Pang, B Cao, J Chen, T Wang | 1 | |