Textbugger: Generating adversarial text against real-world applications J Li, S Ji, T Du, B Li, T Wang Proceedings of the 26th Annual Network and Distributed System Security …, 2019 | 828 | 2019 |
Sirenattack: Generating adversarial audio for end-to-end acoustic systems T Du, S Ji, J Li, Q Gu, T Wang, R Beyah 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS …, 2020 | 154 | 2020 |
Backdoor Pre-trained Models Can Transfer to All L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 134 | 2021 |
QAIR: Practical Query-efficient Black-Box Attacks for Image Retrieval X Li, J Li, Y Chen, S Ye, Y He, S Wang, H Su, H Xue 2021 IEEE Conference on Computer Vision and Pattern Recognition, 2021 | 61 | 2021 |
机器学习模型可解释性方法, 应用与安全研究综述 纪守领, 李进锋, 杜天宇, 李博 计算机研究与发展 56 (10), 2071-2096, 2019 | 44 | 2019 |
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 38 | 2021 |
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation J Li, T Du, S Ji, R Zhang, Q Lu, M Yang, T Wang 29th USENIX Security Symposium (USENIX Security 20), 2020 | 34 | 2020 |
S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models X Yuan, J Li, D Wang, Y Chen, X Mao, L Huang, H Xue, W Wang, K Ren, ... arXiv preprint arXiv:2405.14191, 2024 | 16 | 2024 |
Incorporating External POS Tagger for Punctuation Restoration N Shi, W Wang, B Wang, J Li, X Liu, Z Lin Conference of the International Speech Communication Association …, 2021 | 12 | 2021 |
FairRec: Fairness Testing for Deep Recommender Systems H Guo, J Li, J Wang, X Liu, D Wang, Z Hu, R Zhang, H Xue The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2023 | 11 | 2023 |
机器学习模型安全与隐私研究综述 纪守领, 杜天宇, 李进锋, 沈超, 李博 软件学报 32 (1), 41-67, 2021 | 9 | 2021 |
Enhancing Model Robustness By Incorporating Adversarial Knowledge Into Semantic Representation J Li, T Du, X Liu, R Zhang, H Xue, S Ji 2021 IEEE International Conference on Acoustics, Speech and Signal Processing, 2021 | 5 | 2021 |
DetectSec: Evaluating the robustness of object detection models to adversarial attacks T Du, S Ji, B Wang, S He, J Li, B Li, T Wei, Y Jia, R Beyah, T Wang International Journal of Intelligent Systems, 2022 | 4 | 2022 |
RoChBert: Towards Robust BERT Fine-tuning for Chinese Z Zhang, J Li, N Shi, B Yuan, X Liu, R Zhang, H Xue, D Sun, C Zhang Proceedings of the 2022 Conference on Empirical Methods in Natural Language …, 2022 | 3 | 2022 |
Counterfactual Adversarial Learning with Representation Interpolation W Wang, B Wang, N Shi, J Li, B Zhu, X Liu, R Zhang Proceedings of the 2021 Conference on Empirical Methods in Natural Language …, 2021 | 3 | 2021 |
You are what you search: Attribute inference attacks through Web search queries T Du, T Tao, B Liu, X Jin, J Li, S Ji Security with Intelligent Computing and Big-data Services: Proceedings of …, 2020 | 1 | 2020 |
fairBERTs: Erasing Sensitive Information Through Semantic and Fairness-aware Perturbations J Li, Y Chen, X Liu, L Huang, R Zhang, H Xue arXiv preprint arXiv:2407.08189, 2024 | | 2024 |
Configurable Fairness for New Item Recommendation Considering Entry Time of Items H Guo, D Wang, Z Sun, H Zhang, J Li, J Zhang Proceedings of the 47th International ACM SIGIR Conference on Research and …, 2024 | | 2024 |