Deepsweep: An evaluation framework for mitigating DNN backdoor attacks using data augmentation H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 238* | 2021 |
Text classification via large language models X Sun, X Li, J Li, F Wu, S Guo, T Zhang, G Wang arXiv preprint arXiv:2305.08377, 2023 | 220 | 2023 |
Badpre: Task-agnostic backdoor attacks to pre-trained nlp foundation models K Chen, Y Meng, X Sun, S Guo, T Zhang, J Li, C Fan arXiv preprint arXiv:2110.02467, 2021 | 116 | 2021 |
Byzantine-resilient decentralized stochastic gradient descent S Guo, T Zhang, H Yu, X Xie, L Ma, T Xiang, Y Liu IEEE Transactions on Circuits and Systems for Video Technology 32 (6), 4096-4106, 2021 | 78* | 2021 |
Triggerless backdoor attack for NLP tasks with clean labels L Gan, J Li, T Zhang, X Li, Y Meng, F Wu, Y Yang, S Guo, C Fan arXiv preprint arXiv:2111.07970, 2021 | 74 | 2021 |
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models S Guo, T Zhang, H Qiu, Y Zeng, T Xiang, Y Liu IJCAI, 2021 | 57* | 2021 |
Privacy-preserving collaborative learning with automatic transformation search W Gao, S Guo, T Zhang, H Qiu, Y Wen, Y Liu Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2021 | 56 | 2021 |
Stealing Deep Reinforcement Learning Models for Fun and Profit K Chen, S Guo, T Zhang, X Xie, Y Liu arXiv preprint arXiv:2006.05032, 2020 | 53 | 2020 |
Towards efficient privacy-preserving face recognition in the cloud S Guo, T Xiang, X Li Signal Processing 164, 320-328, 2019 | 48 | 2019 |
Threats to pre-trained language models: Survey and taxonomy S Guo, C Xie, J Li, L Lyu, T Zhang arXiv preprint arXiv:2202.06862, 2022 | 43 | 2022 |
Perceptual visual security index based on edge and texture similarities T Xiang, S Guo, X Li IEEE Transactions on Information Forensics and Security 11 (5), 951-963, 2016 | 42 | 2016 |
Blind night-time image quality assessment: Subjective and objective approaches T Xiang, Y Yang, S Guo IEEE Transactions on Multimedia 22 (5), 1259-1272, 2019 | 41 | 2019 |
Processing secure, verifiable and efficient SQL over outsourced database T Xiang, X Li, F Chen, S Guo, Y Yang Information Sciences 348, 163-178, 2016 | 37 | 2016 |
PEID: A perceptually encrypted image database for visual security evaluation S Guo, T Xiang, X Li, Y Yang IEEE Transactions on Information Forensics and Security 15, 1151-1163, 2019 | 33 | 2019 |
Topology-aware differential privacy for decentralized image classification S Guo, T Zhang, G Xu, H Yu, T Xiang, Y Liu IEEE Transactions on Circuits and Systems for Video Technology 32 (6), 4016-4027, 2021 | 30* | 2021 |
Esb-fl: Efficient and secure blockchain-based federated learning with fair payment B Chen, H Zeng, T Xiang, S Guo, T Zhang, Y Liu IEEE Transactions on Big Data, 2022 | 26 | 2022 |
An efficient preprocessing-based approach to mitigate advanced adversarial attacks H Qiu, Y Zeng, Q Zheng, S Guo, T Zhang, H Li IEEE Transactions on Computers 73 (3), 645-655, 2021 | 26 | 2021 |
Visual security evaluation of perceptually encrypted images based on image importance T Xiang, Y Yang, H Liu, S Guo IEEE Transactions on Circuits and Systems for Video Technology 30 (11), 4129 …, 2019 | 26 | 2019 |
Temporal watermarks for deep reinforcement learning models K Chen, S Guo, T Zhang, S Li, Y Liu Proceedings of the 20th international conference on autonomous agents and …, 2021 | 25 | 2021 |
Privacy-aware image encryption based on logistic map and data hiding J Sun, X Liao, X Chen, S Guo International Journal of Bifurcation and Chaos 27 (05), 1750073, 2017 | 24 | 2017 |