Searching an encrypted cloud meets blockchain: A decentralized, reliable and fair realization S Hu, C Cai, Q Wang, C Wang, X Luo, K Ren IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 792-800, 2018 | 274 | 2018 |
Securing SIFT: Privacy-preserving outsourcing computation of feature extractions over encrypted image data S Hu, Q Wang, J Wang, Z Qin, K Ren IEEE Transactions on Image Processing 25 (7), 3411-3425, 2016 | 142 | 2016 |
Inprivate digging: Enabling tree-based distributed data mining with differential privacy L Zhao, L Ni, S Hu, Y Chen, P Zhou, F Xiao, L Wu IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2087-2095, 2018 | 124 | 2018 |
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection L Zhao, S Hu, Q Wang, J Jiang, C Shen, X Luo, P Hu IEEE Transactions on Dependable and Secure Computing 18 (5), 2029-2041, 2020 | 122 | 2020 |
Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer S Hu, X Liu, Y Zhang, M Li, LY Zhang, H Jin, L Wu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022 | 117 | 2022 |
CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud Q Wang, S Hu, K Ren, M He, M Du, Z Wang Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 96 | 2015 |
Challenges and approaches for mitigating byzantine attacks in federated learning S Hu, J Lu, W Wan, LY Zhang Proceedings of IEEE Trustcom 2022, 2021 | 93 | 2021 |
Hidden voice commands: Attacks and defenses on the VCS of autonomous driving cars M Zhou, Z Qin, X Lin, S Hu, Q Wang, K Ren IEEE Wireless Communications 26 (5), 128-133, 2019 | 70 | 2019 |
Optimizing privacy-preserving outsourced convolutional neural network predictions M Li, SSM Chow, S Hu, Y Yan, C Shen, Q Wang IEEE Transactions on Dependable and Secure Computing 19 (3), 1592-1604, 2020 | 59 | 2020 |
Outsourced biometric identification with privacy S Hu, M Li, Q Wang, SSM Chow, M Du IEEE Transactions on information forensics and security 13 (10), 2448-2463, 2018 | 55 | 2018 |
AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning Z Zhou, S Hu, M Li, H Zhang, Y Zhang, H Jin ACM MM 2023, 2023 | 54 | 2023 |
Adversarial examples for automatic speech recognition: Attacks and countermeasures S Hu, X Shang, Z Qin, M Li, Q Wang, C Wang IEEE Communications Magazine 57 (10), 120-126, 2019 | 49 | 2019 |
SecHOG: Privacy-preserving outsourcing computation of histogram of oriented gradients in the cloud Q Wang, J Wang, S Hu, Q Zou, K Ren Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 49 | 2016 |
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data Q Wang, S Hu, K Ren, J Wang, Z Wang, M Du IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 45 | 2016 |
BOSSA: A decentralized system for proofs of data retrievability and replication D Chen, H Yuan, S Hu, Q Wang, C Wang IEEE Transactions on Parallel and Distributed Systems 32 (4), 786-798, 2020 | 44 | 2020 |
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label S Hu, Z Zhou, Y Zhang, LY Zhang, Y Zheng, Y He, H Jin Proceedings of the 30th ACM International Conference on Multimedia, 2022 | 40 | 2022 |
Jamming-resistant multiradio multichannel opportunistic spectrum access in cognitive radio networks Q Wang, K Ren, P Ning, S Hu IEEE Transactions on Vehicular Technology 65 (10), 8331-8344, 2015 | 40 | 2015 |
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection W Wan, S Hu, J Lu, LY Zhang, H Jin, Y He In Proceedings of IJCAI-ECAI 2022, 2022 | 38 | 2022 |
Detecting backdoors during the inference stage based on corruption robustness consistency X Liu, M Li, H Wang, S Hu, D Ye, H Jin, L Wu, C Xiao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 36 | 2023 |
Advhash: Set-to-set targeted attack on deep hashing with one single adversarial patch S Hu, Y Zhang, X Liu, LY Zhang, M Li, H Jin Proceedings of the 29th ACM international conference on multimedia, 2335-2343, 2021 | 36 | 2021 |