Kamu erişimi zorunlu olan makaleler - Jason (Minhui) XueDaha fazla bilgi edinin
Hiçbir yerde sunulmuyor: 4
Gui-squatting attack: Automated generation of android phishing apps
S Chen, L Fan, C Chen, M Xue, Y Liu, L Xu
IEEE Transactions on Dependable and Secure Computing 18 (6), 2551-2568, 2019
Zorunlu olanlar: National Natural Science Foundation of China
Ntd: Non-transferability enabled deep learning backdoor detection
Y Li, H Ma, Z Zhang, Y Gao, A Abuadbba, M Xue, A Fu, Y Zheng, ...
IEEE Transactions on Information Forensics and Security 19, 104-119, 2023
Zorunlu olanlar: National Natural Science Foundation of China
Thwarting location privacy protection in location‐based social discovery services
M Xue, Y Liu, KW Ross, H Qian
Security and Communication Networks 9 (11), 1496-1508, 2016
Zorunlu olanlar: US National Science Foundation, National Natural Science Foundation of China
PALOR: Poisoning attacks against logistic regression
J Wen, BZH Zhao, M Xue, H Qian
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
Zorunlu olanlar: National Natural Science Foundation of China
Bir yerde sunuluyor: 49
DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems
L Ma, F Juefei-Xu, F Zhang, J Sun, M Xue, B Li, C Chen, T Su, L Li, Y Liu, ...
arXiv preprint arXiv:1803.07519, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Deephunter: a coverage-guided fuzz testing framework for deep neural networks
X Xie, L Ma, F Juefei-Xu, M Xue, H Chen, Y Liu, J Zhao, B Li, J Yin, S See
Proceedings of the 28th ACM SIGSOFT international symposium on software …, 2019
Zorunlu olanlar: National Research Foundation, Singapore
Deepmutation: Mutation testing of deep learning systems
L Ma, F Zhang, J Sun, M Xue, B Li, F Juefei-Xu, C Xie, L Li, Y Liu, J Zhao, ...
2018 IEEE 29th international symposium on software reliability engineering …, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
S Chen, M Xue, L Fan, S Hao, L Xu, H Zhu, B Li
computers & security 73, 326-344, 2018
Zorunlu olanlar: National Natural Science Foundation of China
Stormdroid: A streaminglized machine learning-based system for detecting android malware
S Chen, M Xue, Z Tang, L Xu, H Zhu
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
Zorunlu olanlar: National Natural Science Foundation of China
Hidden backdoors in human-centric language models
S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Zorunlu olanlar: Australian Research Council, National Natural Science Foundation of China
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference
X Feng, R Sun, X Zhu, M Xue, S Wen, D Liu, S Nepal, Y Xiang
arXiv preprint arXiv:2105.05445, 2021
Zorunlu olanlar: Australian Research Council
An Empirical Assessment of Global COVID-19 Contact Tracing Applications
R Sun, W Wang, M Xue, G Tyson, S Camtepe, D Ranasinghe
arXiv preprint arXiv:2006.10933, 2020
Zorunlu olanlar: Australian Research Council, UK Engineering and Physical Sciences Research …
An Empirical Assessment of Security Risks of Global Android Banking Apps
S Chen, L Fan, G Meng, T Su, M Xue, Y Xue, Y Liu, L Xu
ACM ICSE 2020, 2020
Zorunlu olanlar: National Research Foundation, Singapore
Are Mobile Banking Apps Secure? What Can Be Improved?
S Chen, T Su, L Fan, G Meng, M Xue, Y Liu, L Xu
In Proceedings of the 26th ACM Joint European Software Engineering …, 2018
Zorunlu olanlar: National Natural Science Foundation of China, National Research Foundation …
Fingerprinting deep neural networks globally via universal adversarial perturbations
Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022
Zorunlu olanlar: Australian Research Council, National Natural Science Foundation of China
The right to be forgotten in the media: A data-driven study
M Xue, G Magno, E Cunha, V Almeida, KW Ross
Proceedings on Privacy Enhancing Technologies, 2016
Zorunlu olanlar: US National Science Foundation
Quantization backdoors to deep learning commercial frameworks
H Ma, H Qiu, Y Gao, Z Zhang, A Abuadbba, M Xue, A Fu, J Zhang, ...
IEEE Transactions on Dependable and Secure Computing, 2023
Zorunlu olanlar: National Natural Science Foundation of China
Path transitions tell more: Optimizing fuzzing schedules via runtime program states
K Zhang, X Xiao, X Zhu, R Sun, M Xue, S Wen
Proceedings of the 44th International Conference on Software Engineering …, 2022
Zorunlu olanlar: National Natural Science Foundation of China
Stylefool: Fooling video classification systems via style transfer
Y Cao, X Xiao, R Sun, D Wang, M Xue, S Wen
2023 IEEE symposium on security and privacy (SP), 1631-1648, 2023
Zorunlu olanlar: National Natural Science Foundation of China
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models
J Wen, BZH Zhao, M Xue, A Oprea, H Qian
arXiv preprint arXiv:2006.11928, 2021
Zorunlu olanlar: US Department of Defense, Australian Research Council, National Natural …
Yayıncılık ve maddi kaynak bilgileri otomatik olarak bir bilgisayar programı tarafından belirlenmektedir