Suivre
Zheng Li
Zheng Li
Adresse e-mail validée de sdu.edu.cn - Page d'accueil
Titre
Citée par
Citée par
Année
Membership Leakage in Label-Only Exposures
Z Li, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2021
319*2021
How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN
Z Li, C Hu, Y Zhang, S Guo
Annual Computer Security Applications Conference (ACSAC), 2019
2012019
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models
Z Sha, Z Li, N Yu, Y Zhang
arXiv preprint arXiv:2210.06998, 2022
1532022
Membership Inference Attacks Against Text-to-image Generation Models
Y Wu, N Yu, Z Li, M Backes, Y Zhang
arXiv preprint arXiv:2210.00968, 2022
672022
Data Poisoning Attacks Against Multimodal Encoders
Z Yang, X He, Z Li, M Backes, M Humbert, P Berrang, Y Zhang
International Conference on Machine Learning, 39299-39313, 2023
542023
Notable: Transferable backdoor attacks against prompt-based nlp models
K Mei, Z Li, Z Wang, Y Zhang, S Ma
arXiv preprint arXiv:2305.17826, 2023
522023
Watermarking diffusion model
Y Liu, Z Li, M Backes, Y Shen, Y Zhang
arXiv preprint arXiv:2305.12502, 2023
382023
Auditing Membership Leakages of Multi-Exit Networks
Z Li, Y Liu, X He, N Yu, M Backes, Y Zhang
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022
352022
Backdoor Attacks Against Dataset Distillation
Y Liu, Z Li, M Backes, Y Shen, Y Zhang
Annual Network and Distributed System Security Symposium (NDSS), 2023
322023
Membership-doctor: Comprehensive assessment of membership inference against machine learning models
X He, Z Li, W Xu, C Cornelius, Y Zhang
arXiv preprint arXiv:2208.10445, 2022
282022
UnGANable: Defending Against GAN-based Face Manipulation
Z Li, N Yu, A Salem, M Backes, M Fritz, Y Zhang
USENIX Security Symposium, 2023
232023
Generative watermarking against unauthorized subject-driven image synthesis
Y Ma, Z Zhao, X He, Z Li, M Backes, Y Zhang
arXiv preprint arXiv:2306.07754, 2023
212023
Backdoor attacks in the supply chain of masked image modeling
X Shen, X He, Z Li, Y Shen, M Backes, Y Zhang
102022
Badmerging: Backdoor attacks against model merging
J Zhang, J Chi, Z Li, K Cai, Y Zhang, Y Tian
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
72024
Membership inference attacks against in-context learning
R Wen, Z Li, M Backes, Y Zhang
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
52024
Jailbreaking text-to-image models with llm-based agents
Y Dong, Z Li, X Meng, N Yu, S Guo
arXiv preprint arXiv:2408.00523, 2024
52024
Inside the Black Box: Detecting Data Leakage in Pre-trained Language Encoders
Y Xin, Z Li, N Yu, D Chen, M Fritz, M Backes, Y Zhang
European Conference on Artificial Intelligence (ECAI), 2024
42024
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
B Zhang, Z Li, Z Yang, X He, M Backes, M Fritz, Y Zhang
USENIX Security Symposium, 2024
42024
FuzzGAN: A generation-based fuzzing framework for testing deep neural networks
G Han, Z Li, P Tang, C Hu, S Guo
2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th …, 2022
42022
DeepKeyStego: Protecting Communication by Key-dependent Steganography with Deep Networks
Z Li, G Han, S Guo, C Hu
IEEE International Conference on High Performance Computing and …, 2019
42019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20