フォロー
Shaofeng Li
タイトル
引用先
引用先
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
4382020
Hidden backdoors in human-centric language models
S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
1642021
Fingerprinting deep neural networks globally via universal adversarial perturbations
Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022
782022
Deep learning backdoors
S Li, S Ma, M Xue, BZH Zhao
Security and Artificial Intelligence: A Crossdisciplinary Approach, 313-334, 2022
362022
Backdoors against natural language processing: A review
S Li, T Dong, BZH Zhao, M Xue, S Du, H Zhu
IEEE Security & Privacy 20 (5), 50-59, 2022
292022
Batfl: Backdoor detection on federated learning in e-health
B Xi, S Li, J Li, H Liu, H Liu, H Zhu
2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021
182021
Automatic permission optimization framework for privacy enhancement of mobile applications
Y Qu, S Du, S Li, Y Meng, L Zhang, H Zhu
IEEE Internet of Things Journal 8 (9), 7394-7406, 2020
172020
Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors
R Sun, M Xue, G Tyson, T Dong, S Li, S Wang, H Zhu, S Camtepe, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
122023
Secure and efficient uav tracking in space-air-ground integrated network
J Li, W Zhang, Y Meng, S Li, L Ma, Z Liu, H Zhu
IEEE Transactions on Vehicular Technology 72 (8), 10682-10695, 2023
112023
Unbridled icarus: A survey of the potential perils of image inputs in multimodal large language model security
Y Fan, Y Cao, Z Zhao, Z Liu, S Li
2024 IEEE International Conference on Systems, Man, and Cybernetics (SMC …, 2024
102024
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection
S Li, X Wang, M Xue, H Zhu, Z Zhang, Y Gao, W Wu, XS Shen
Proceedings of the 33th USENIX Security Symposium, 2024
102024
RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
T Dong, S Li, G Chen, M Xue, H Zhu, Z Liu
NDSS, 2023
102023
Unleashing cheapfakes through trojan plugins of large language models
T Dong, G Chen, S Li, M Xue, R Holland, Y Meng, Z Liu, H Zhu
arXiv preprint arXiv:2312.00374, 2023
92023
Data Poisoning Attack against Anomaly Detectors in Digital Twin-Based Networks
S Li, W Wu, Y Meng, J Li, H Zhu, XS Shen
IEEE International Conference on Communications (IEEE ICC 2023), 2023
82023
Split federated learning: Speed up model training in resource-limited wireless networks
S Zhang, W Wu, P Hu, S Li, N Zhang
2023 IEEE 43rd International Conference on Distributed Computing Systems …, 2023
52023
GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis
Y Meng, J Li, F Liu, S Li, H Hu, H Zhu
2023 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2023
42023
Summary and Future Directions
S Li, H Zhu, W Wu, X Shen
Backdoor Attacks against Learning-Based Algorithms, 149-153, 2024
32024
Cluster-HSFL: A Cluster-Based Hybrid Split and Federated Learning
S Zhang, H Tu, Z Li, S Liu, S Li, W Wu, XS Shen
2023 IEEE/CIC International Conference on Communications in China (ICCC), 1-2, 2023
22023
Digital twin-assisted adaptive preloading for short video streaming
S Liu, W Wu, S Li, TH Luan, N Zhang
ICC 2024-IEEE International Conference on Communications, 1431-1436, 2024
12024
Privacy Computing with Right to Be Forgotten in Trusted Execution Environment
H Liu, H Luo, S Li, T Dong, G Chen, Y Meng, H Zhu
GLOBECOM 2023-2023 IEEE Global Communications Conference, 2566-2571, 2023
12023
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20