Invisible backdoor attacks on deep neural networks via steganography and regularization S Li, M Xue, BZH Zhao, H Zhu, X Zhang IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020 | 395 | 2020 |
Hidden backdoors in human-centric language models S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 151 | 2021 |
Fingerprinting deep neural networks globally via universal adversarial perturbations Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022 | 71 | 2022 |
Deep learning backdoors S Li, S Ma, M Xue, BZH Zhao Security and Artificial Intelligence: A Crossdisciplinary Approach, 313-334, 2022 | 35 | 2022 |
Backdoors against natural language processing: A review S Li, T Dong, BZH Zhao, M Xue, S Du, H Zhu IEEE Security & Privacy 20 (5), 50-59, 2022 | 25 | 2022 |
Batfl: Backdoor detection on federated learning in e-health B Xi, S Li, J Li, H Liu, H Liu, H Zhu 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021 | 17 | 2021 |
Automatic permission optimization framework for privacy enhancement of mobile applications Y Qu, S Du, S Li, Y Meng, L Zhang, H Zhu IEEE Internet of Things Journal 8 (9), 7394-7406, 2020 | 15 | 2020 |
Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors R Sun, M Xue, G Tyson, T Dong, S Li, S Wang, H Zhu, S Camtepe, ... Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 9 | 2023 |
Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security Y Fan, Y Cao, Z Zhao, Z Liu, S Li arXiv preprint arXiv:2404.05264, 2024 | 8 | 2024 |
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection S Li, X Wang, M Xue, H Zhu, Z Zhang, Y Gao, W Wu, XS Shen Proceedings of the 33th USENIX Security Symposium, 2024 | 8 | 2024 |
Data Poisoning Attack against Anomaly Detectors in Digital Twin-Based Networks S Li, W Wu, Y Meng, J Li, H Zhu, XS Shen IEEE International Conference on Communications (IEEE ICC 2023), 2023 | 8 | 2023 |
Secure and efficient uav tracking in space-air-ground integrated network J Li, W Zhang, Y Meng, S Li, L Ma, Z Liu, H Zhu IEEE Transactions on Vehicular Technology 72 (8), 10682-10695, 2023 | 8 | 2023 |
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. T Dong, S Li, G Chen, M Xue, H Zhu, Z Liu NDSS, 2023 | 8 | 2023 |
Unleashing cheapfakes through trojan plugins of large language models T Dong, G Chen, S Li, M Xue, R Holland, Y Meng, Z Liu, H Zhu arXiv preprint arXiv:2312.00374, 2023 | 7 | 2023 |
Summary and Future Directions S Li, H Zhu, W Wu, X Shen Backdoor Attacks against Learning-Based Algorithms, 149-153, 2024 | 3 | 2024 |
Split federated learning: Speed up model training in resource-limited wireless networks S Zhang, W Wu, P Hu, S Li, N Zhang 2023 IEEE 43rd International Conference on Distributed Computing Systems …, 2023 | 3 | 2023 |
Cluster-HSFL: A Cluster-Based Hybrid Split and Federated Learning S Zhang, H Tu, Z Li, S Liu, S Li, W Wu, XS Shen 2023 IEEE/CIC International Conference on Communications in China (ICCC), 1-2, 2023 | 2 | 2023 |
GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis Y Meng, J Li, F Liu, S Li, H Hu, H Zhu 2023 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2023 | 2 | 2023 |
Digital Twin-Assisted Adaptive Preloading for Short Video Streaming S Liu, W Wu, S Li, TH Luan, N Zhang ICC 2024-IEEE International Conference on Communications, 1431-1436, 2024 | 1 | 2024 |
Privacy Computing with Right to Be Forgotten in Trusted Execution Environment H Liu, H Luo, S Li, T Dong, G Chen, Y Meng, H Zhu GLOBECOM 2023-2023 IEEE Global Communications Conference, 2566-2571, 2023 | 1 | 2023 |