关注
Mingfu Xue
标题
引用次数
引用次数
年份
Machine learning security: Threats, countermeasures, and evaluations
M Xue, C Yuan, H Wu, Y Zhang, W Liu
IEEE Access 8, 74720-74742, 2020
1652020
Ten years of hardware Trojans: a survey from the attacker's perspective
M Xue, C Gu, W Liu, S Yu, M O'Neill
IET Computers & Digital Techniques 14 (6), 231-246, 2020
772020
One-to-N & N-to-One: Two advanced backdoor attacks against deep learning models
M Xue, C He, J Wang, W Liu
IEEE Transactions on Dependable and Secure Computing 19 (3), 1562-1578, 2020
682020
Intellectual property protection for deep learning models: Taxonomy, methods, attacks, and evaluations
M Xue, Y Zhang, J Wang, W Liu
IEEE Transactions on Artificial Intelligence 3 (6), 908-923, 2021
542021
Detecting hardware Trojan through heuristic partition and activity driven test pattern generation
X Mingfu, H Aiqun, L Guyue
IET Digital Library, 2014
412014
An enhanced classification-based golden chips-free hardware Trojan detection technique
M Xue, J Wang, A Hu
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
392016
DNN intellectual property protection: Taxonomy, attacks and evaluations
M Xue, J Wang, W Liu
Proceedings of the 2021 on Great Lakes Symposium on VLSI, 455-460, 2021
332021
Defeating untrustworthy testing parties: A novel hybrid clustering ensemble based golden models-free hardware trojan detection method
M Xue, R Bian, W Liu, J Wang
IEEE Access 7, 5124-5140, 2018
312018
Backdoors hidden in facial features: A novel invisible backdoor attack against face recognition systems
M Xue, C He, J Wang, W Liu
Peer-to-Peer Networking and Applications 14, 1458-1474, 2021
292021
Robust backdoor attacks against deep neural networks in real physical world
M Xue, C He, S Sun, J Wang, W Liu
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
282021
NaturalAE: Natural and robust physical adversarial examples for object detectors
M Xue, C Yuan, C He, J Wang, W Liu
Journal of Information Security and Applications 57, 102694, 2021
282021
PTB: Robust physical backdoor attacks against deep neural networks in real world
M Xue, C He, Y Wu, S Sun, Y Zhang, J Wang, W Liu
Computers & Security 118, 102726, 2022
242022
AdvParams: An active DNN intellectual property protection technique via adversarial perturbation based parameter encryption
M Xue, Z Wu, Y Zhang, J Wang, W Liu
IEEE Transactions on Emerging Topics in Computing 11 (3), 664-678, 2022
212022
Active intellectual property protection for deep neural networks through stealthy backdoor and users’ identities authentication
M Xue, S Sun, Y Zhang, J Wang, W Liu
Applied Intelligence 52 (14), 16497-16511, 2022
202022
Interlaminar shear property and high-velocity impact resistance of CFRP laminates after cyclic hygrothermal aging
L Liu, Z Zhao, W Chen, M Xue, C Shuang
International Journal of Crashworthiness, 2019
172019
Monte Carlo based test pattern generation for hardware Trojan detection
X Mingfu, H Aiqun, H Yi, L Guyue
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013
172013
Detect and remove watermark in deep neural networks via generative adversarial networks
S Sun, H Wang, M Xue, Y Zhang, J Wang, W Liu
Information Security: 24th International Conference, ISC 2021, Virtual Event …, 2021
162021
Active DNN IP protection: A novel user fingerprint management and DNN authorization control technique
M Xue, Z Wu, C He, J Wang, W Liu
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
162020
Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets
J Luan, J Wang, M Xue
Cloud Computing and Security: Second International Conference, ICCCS 2016 …, 2016
132016
Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs
M Xue, R Bian, J Wang, W Liu
IET Computers & Digital Techniques 13 (4), 348-359, 2019
122019
系统目前无法执行此操作,请稍后再试。
文章 1–20