Trojaning attack on neural networks Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang 25th Annual Network And Distributed System Security Symposium (NDSS 2018), 2018 | 1487 | 2018 |
Abs: Scanning neural networks for back-doors by artificial brain stimulation Y Liu, WC Lee, G Tao, S Ma, Y Aafer, X Zhang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 516 | 2019 |
Nic: Detecting adversarial samples with neural network invariant checking S Ma, Y Liu Proceedings of the 26th network and distributed system security symposium …, 2019 | 329 | 2019 |
Composite backdoor attack for deep neural network by mixing existing benign features J Lin, L Xu, Y Liu, X Zhang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 246 | 2020 |
MODE: automated neural network model debugging via state differential analysis and input selection S Ma, Y Liu, WC Lee, X Zhang, A Grama Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018 | 228 | 2018 |
Attacks meet interpretability: Attribute-steered detection of adversarial samples G Tao, S Ma, Y Liu, X Zhang Advances in neural information processing systems 31, 2018 | 202 | 2018 |
Deep feature space trojan attack of neural networks by controlled detoxification S Cheng, Y Liu, S Ma, X Zhang Proceedings of the AAAI Conference on Artificial Intelligence 35 (2), 1148-1156, 2021 | 183 | 2021 |
Backdoor scanning for deep neural networks through k-arm optimization G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang International Conference on Machine Learning, 9525-9536, 2021 | 121 | 2021 |
Piccolo: Exposing complex backdoors in nlp transformer models Y Liu, G Shen, G Tao, S An, S Ma, X Zhang 2022 IEEE Symposium on Security and Privacy (SP), 2025-2042, 2022 | 87 | 2022 |
Better trigger inversion optimization in backdoor scanning G Tao, G Shen, Y Liu, S An, Q Xu, S Ma, P Li, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 86 | 2022 |
Complex backdoor detection by symmetric feature differencing Y Liu, G Shen, G Tao, Z Wang, S Ma, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 64 | 2022 |
Mirror: Model inversion for deep learning network with high fidelity S An, G Tao, Q Xu, Y Liu, G Shen, Y Yao, J Xu, X Zhang Proceedings of the 29th Network and Distributed System Security Symposium, 2022 | 60 | 2022 |
Model orthogonalization: Class distance hardening in neural networks for better security G Tao, Y Liu, G Shen, Q Xu, S An, Z Zhang, X Zhang 2022 IEEE Symposium on Security and Privacy (SP), 1372-1389, 2022 | 56 | 2022 |
Detecting backdoors in pre-trained encoders S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 52 | 2023 |
Flip: A provable defense framework for backdoor mitigation in federated learning K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ... arXiv preprint arXiv:2210.12873, 2022 | 49 | 2022 |
Constrained optimization with dynamic bound-scaling for effective nlp backdoor defense G Shen, Y Liu, G Tao, Q Xu, Z Zhang, S An, S Ma, X Zhang International Conference on Machine Learning, 19879-19892, 2022 | 46 | 2022 |
Black-box adversarial sample generation based on differential evolution J Lin, L Xu, Y Liu, X Zhang Journal of Systems and Software 170, 110767, 2020 | 42 | 2020 |
LAMP: data provenance for graph based machine learning algorithms through derivative computation S Ma, Y Aafer, Z Xu, WC Lee, J Zhai, Y Liu, X Zhang Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 36 | 2017 |
Fault localization for null pointer exception based on stack trace and program slicing S Jiang, W Li, H Li, Y Zhang, H Zhang, Y Liu 2012 12th International Conference on Quality Software, 9-12, 2012 | 30 | 2012 |
Trader: Trace divergence analysis and embedding regulation for debugging recurrent neural networks G Tao, S Ma, Y Liu, Q Xu, X Zhang Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 16 | 2020 |