Explainability-based backdoor attacks against graph neural networks J Xu, M Xue, S Picek Proceedings of the 3rd ACM Workshop on Wireless Security and Machine …, 2021 | 77 | 2021 |
Can you hear it? backdoor attacks via ultrasonic triggers S Koffas, J Xu, M Conti, S Picek Proceedings of the 2022 ACM workshop on wireless security and machine …, 2022 | 74 | 2022 |
Watermarking graph neural networks based on backdoor attacks J Xu, S Koffas, O Ersoy, S Picek 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 1179-1197, 2023 | 39 | 2023 |
A multi-sensor information fusion method based on factor graph for integrated navigation system J Xu, G Yang, Y Sun, S Picek IEEE Access 9, 12044-12054, 2021 | 34 | 2021 |
Poster: Clean-label Backdoor Attack on Graph Neural Networks J Xu, S Picek Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 29 | 2022 |
More is better (mostly): On the backdoor attacks in federated graph neural networks J Xu, R Wang, K Liang, S Picek arXiv preprint arXiv:2202.03195, 2022 | 29 | 2022 |
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks M Conti, J Li, S Picek, J Xu Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security …, 2022 | 26 | 2022 |
Rethinking the trigger-injecting position in graph backdoor attack J Xu, G Abad, S Picek 2023 International Joint Conference on Neural Networks (IJCNN), 1-8, 2023 | 8 | 2023 |
Coin Recognition Method Based on SIFT Algorithm J Xu, G Yang, Y Liu, J Zhong 2017 4th International Conference on Information Science and Control …, 2017 | 8 | 2017 |
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification G Abad, J Xu, S Koffas, B Tajalli, S Picek, M Conti arXiv preprint arXiv:2302.01740, 2023 | 7 | 2023 |
Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks J Xu, S Picek Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 4 | 2023 |
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks J Xu, S Koffas, S Picek Digital Threats: Research and Practice 5 (2), 1-29, 2024 | 3 | 2024 |
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data B Pleiter, B Tajalli, S Koffas, G Abad, J Xu, M Larson, S Picek arXiv preprint arXiv:2311.07550, 2023 | 3 | 2023 |
A Systematic Evaluation of Backdoor Attacks in Various Domains S Koffas, B Tajalli, J Xu, M Conti, S Picek Embedded Machine Learning for Cyber-Physical, IoT, and Edge Computing: Use …, 2023 | 1 | 2023 |
Backdoor Attacks against Transformer-based Neural Networks for Tabular Data B Pleiter, B Tajalli, S Koffas, G Abad, J Xu, M Larson, S Picek MS thesis, Dept. Computing Science, Radboud Univ., Nijmegen, The Netherlands, 2023 | 1 | 2023 |
Initial alignment of strapdown inertial navigation system with the aid of Doppler velocity log J Zhong, G Yang, Y Liu, J Xu 2017 4th International Conference on Information Science and Control …, 2017 | 1 | 2017 |
Connecting the dots: Exploring backdoor attacks on graph neural networks J Xu TU Delft, 2024 | | 2024 |
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks M Arazzi, M Conti, S Koffas, M Krcek, A Nocera, S Picek, J Xu arXiv preprint arXiv:2308.02465, 2023 | | 2023 |