Neural cleanse: Identifying and mitigating backdoor attacks in neural networks B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao 2019 IEEE symposium on security and privacy (SP), 707-723, 2019 | 1466 | 2019 |
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao USENIX Security Symposium (USENIX Security 2020), 2020 | 292 | 2020 |
Glaze: Protecting artists from style mimicry by text-to-image models S Shan, J Cryan, E Wenger, H Zheng, R Hanocka, BY Zhao USENIX Security Symposium (USENIX Security 2023), 2023 | 132 | 2023 |
Gotta Catch’Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao ACM SIGSAC Conference on Computer and Communications Security (CCS), 2020 | 102* | 2020 |
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao USENIX Security Symposium (USENIX Security 2022), 2022 | 90* | 2022 |
Piracy Resistant Watermarks for Deep Neural Networks H Li, E Wenger, S Shan, BY Zhao, H Zheng arXiv preprint arXiv:1910.01226, 2019 | 72* | 2019 |
Oh, the Places You’ve Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing B Weinshel, M Wei, M Mondal, E Choi, S Shan, C Dolin, ML Mazurek, ... ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019 | 69 | 2019 |
Unpacking perceptions of data-driven inferences underlying online targeting and personalization C Dolin, B Weinshel, S Shan, CM Hahn, E Choi, ML Mazurek, B Ur Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018 | 65 | 2018 |
Patch-based defenses against web fingerprinting attacks S Shan, AN Bhagoji, H Zheng, BY Zhao Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021 | 49* | 2021 |
Deep Entity Classification: Abusive Account Detection for Online Social Networks T Xu, G Goossen, HK Cevahir, S Khodeir, Y Jin, F Li, S Shan, S Patel, ... USENIX Security Symposium (USENIX Security 2020), 2021 | 49 | 2021 |
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks S Shan, AN Bhagoji, H Zheng, BY Zhao USENIX Security Symposium (USENIX Security 2022), 2022 | 42 | 2022 |
Nightshade: Prompt-specific poisoning attacks on text-to-image generative models S Shan, W Ding, J Passananti, S Wu, H Zheng, BY Zhao IEEE Symposium on Security and Privacy, 2024 | 32* | 2024 |
SoK: Anti-Facial Recognition Technology E Wenger, S Shan, H Zheng, BY Zhao IEEE Symposium on Security and Privacy (SP), 2023 | 16 | 2023 |
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models S Shan, W Ding, E Wenger, H Zheng, BY Zhao ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022 | 10 | 2022 |
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? AYJ Ha, J Passananti, R Bhaskar, S Shan, R Southen, H Zheng, BY Zhao ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024 | 4 | 2024 |
Disrupting Style Mimicry Attacks on Video Imagery J Passananti, S Wu, S Shan, H Zheng, BY Zhao arXiv preprint arXiv:2405.06865, 2024 | 1 | 2024 |