Label inference attacks against vertical federated learning C Fu, X Zhang, S Ji, J Chen, J Wu, S Guo, J Zhou, AX Liu, T Wang 31st USENIX security symposium (USENIX Security 22), 1397-1414, 2022 | 218 | 2022 |
Backdoor Pre-trained Models Can Transfer to All L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 134 | 2021 |
Understanding the security risks of docker hub P Liu, S Ji, L Fu, K Lu, X Zhang, WH Lee, T Lu, W Chen, R Beyah Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 60 | 2020 |
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware B Zhao, S Ji, J Xu, Y Tian, Q Wei, Q Wang, C Lyu, X Zhang, C Lin, J Wu, ... Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 39 | 2022 |
Neuronfair: Interpretable white-box fairness testing through biased neuron identification H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen Proceedings of the 44th International Conference on Software Engineering …, 2022 | 39 | 2022 |
EMS: History-Driven Mutation for Coverage-based Fuzzing. C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah NDSS, 2022 | 39 | 2022 |
{MPInspector}: A systematic and automatic approach for evaluating the security of {IoT} messaging protocols Q Wang, S Ji, Y Tian, X Zhang, B Zhao, Y Kan, Z Lin, C Lin, S Deng, ... 30th USENIX Security Symposium (USENIX Security 21), 4205-4222, 2021 | 39 | 2021 |
Sapprox: Enabling efficient and accurate approximations on sub-datasets with distribution-aware online sampling X Zhang, J Wang, J Yin Proceedings of the VLDB Endowment 10 (3), 109-120, 2016 | 39 | 2016 |
Seeing is living? rethinking the security of facial liveness verification in the deepfake era C Li, L Wang, S Ji, X Zhang, Z Xi, S Guo, T Wang 31th USENIX Security Symposium (USENIX Security 22), Boston, MA, 2022 | 37 | 2022 |
Achieving load balance for parallel data access on distributed file systems D Huang, D Han, J Wang, J Yin, X Chen, X Zhang, J Zhou, M Ye IEEE Transactions on Computers 67 (3), 388-402, 2017 | 35 | 2017 |
Your labels are selling you out: Relation leaks in vertical federated learning P Qiu, X Zhang, S Ji, T Du, Y Pu, J Zhou, T Wang IEEE Transactions on Dependable and Secure Computing 20 (5), 3653-3668, 2022 | 31 | 2022 |
V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing G Pan, X Lin, X Zhang, Y Jia, S Ji, C Wu, X Ying, J Wang, Y Wu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 30 | 2021 |
RA-ISF: Learning to Answer and Understand from Retrieval Augmentation via Iterative Self-Feedback Y Liu, X Peng, X Zhang, W Liu, J Yin, J Cao, T Du arXiv preprint arXiv:2403.06840, 2024 | 28 | 2024 |
GRIP-GAN: An attack-free defense through general robust inverse perturbation H Zheng, J Chen, H Du, W Zhu, S Ji, X Zhang IEEE Transactions on Dependable and Secure Computing 19 (6), 4204-4224, 2021 | 26 | 2021 |
SLIME: Program-Sensitive Energy Allocation for Fuzzing C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han, Y Li, Z Wang, W Wang, ... Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 24 | 2022 |
Fraud-agents detection in online microfinance: a large-scale empirical study Y Wu, Z Xie, S Ji, Z Liu, X Zhang, C Lin, S Deng, J Zhou, T Wang, R Beyah IEEE Transactions on Dependable and Secure Computing 20 (2), 1169-1185, 2022 | 21 | 2022 |
Learning human motion prediction via stochastic differential equations K Lyu, Z Liu, S Wu, H Chen, X Zhang, Y Yin Proceedings of the 29th ACM International Conference on Multimedia, 4976-4984, 2021 | 18 | 2021 |
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings Y Mao, C Fu, S Wang, S Ji, X Zhang, Z Liu, J Zhou, AX Liu, R Beyah, ... 2022 IEEE Symposium on Security and Privacy (S&P), 1423-1439, 2022 | 16 | 2022 |
Prsa: Prompt reverse stealing attacks against large language models Y Yang, X Zhang, Y Jiang, X Chen, H Wang, S Ji, Z Wang arXiv preprint arXiv:2402.19200, 2024 | 15 | 2024 |
How iot re-using threatens your sensitive data: Exploring the user-data disposal in used iot devices P Liu, S Ji, L Fu, K Lu, X Zhang, J Qin, W Wang, W Chen 2023 IEEE Symposium on Security and Privacy (SP), 3365-3381, 2023 | 15 | 2023 |