Machine learning security: Threats, countermeasures, and evaluations M Xue, C Yuan, H Wu, Y Zhang, W Liu IEEE Access 8, 74720-74742, 2020 | 165 | 2020 |
Ten years of hardware Trojans: a survey from the attacker's perspective M Xue, C Gu, W Liu, S Yu, M O'Neill IET Computers & Digital Techniques 14 (6), 231-246, 2020 | 77 | 2020 |
One-to-N & N-to-One: Two advanced backdoor attacks against deep learning models M Xue, C He, J Wang, W Liu IEEE Transactions on Dependable and Secure Computing 19 (3), 1562-1578, 2020 | 68 | 2020 |
Intellectual property protection for deep learning models: Taxonomy, methods, attacks, and evaluations M Xue, Y Zhang, J Wang, W Liu IEEE Transactions on Artificial Intelligence 3 (6), 908-923, 2021 | 54 | 2021 |
Detecting hardware Trojan through heuristic partition and activity driven test pattern generation X Mingfu, H Aiqun, L Guyue IET Digital Library, 2014 | 41 | 2014 |
An enhanced classification-based golden chips-free hardware Trojan detection technique M Xue, J Wang, A Hu 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016 | 39 | 2016 |
DNN intellectual property protection: Taxonomy, attacks and evaluations M Xue, J Wang, W Liu Proceedings of the 2021 on Great Lakes Symposium on VLSI, 455-460, 2021 | 33 | 2021 |
Defeating untrustworthy testing parties: A novel hybrid clustering ensemble based golden models-free hardware trojan detection method M Xue, R Bian, W Liu, J Wang IEEE Access 7, 5124-5140, 2018 | 31 | 2018 |
Backdoors hidden in facial features: A novel invisible backdoor attack against face recognition systems M Xue, C He, J Wang, W Liu Peer-to-Peer Networking and Applications 14, 1458-1474, 2021 | 29 | 2021 |
Robust backdoor attacks against deep neural networks in real physical world M Xue, C He, S Sun, J Wang, W Liu 2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021 | 28 | 2021 |
NaturalAE: Natural and robust physical adversarial examples for object detectors M Xue, C Yuan, C He, J Wang, W Liu Journal of Information Security and Applications 57, 102694, 2021 | 28 | 2021 |
PTB: Robust physical backdoor attacks against deep neural networks in real world M Xue, C He, Y Wu, S Sun, Y Zhang, J Wang, W Liu Computers & Security 118, 102726, 2022 | 24 | 2022 |
AdvParams: An active DNN intellectual property protection technique via adversarial perturbation based parameter encryption M Xue, Z Wu, Y Zhang, J Wang, W Liu IEEE Transactions on Emerging Topics in Computing 11 (3), 664-678, 2022 | 21 | 2022 |
Active intellectual property protection for deep neural networks through stealthy backdoor and users’ identities authentication M Xue, S Sun, Y Zhang, J Wang, W Liu Applied Intelligence 52 (14), 16497-16511, 2022 | 20 | 2022 |
Interlaminar shear property and high-velocity impact resistance of CFRP laminates after cyclic hygrothermal aging L Liu, Z Zhao, W Chen, M Xue, C Shuang International Journal of Crashworthiness, 2019 | 17 | 2019 |
Monte Carlo based test pattern generation for hardware Trojan detection X Mingfu, H Aiqun, H Yi, L Guyue 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013 | 17 | 2013 |
Detect and remove watermark in deep neural networks via generative adversarial networks S Sun, H Wang, M Xue, Y Zhang, J Wang, W Liu Information Security: 24th International Conference, ISC 2021, Virtual Event …, 2021 | 16 | 2021 |
Active DNN IP protection: A novel user fingerprint management and DNN authorization control technique M Xue, Z Wu, C He, J Wang, W Liu 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 16 | 2020 |
Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets J Luan, J Wang, M Xue Cloud Computing and Security: Second International Conference, ICCCS 2016 …, 2016 | 13 | 2016 |
Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs M Xue, R Bian, J Wang, W Liu IET Computers & Digital Techniques 13 (4), 348-359, 2019 | 12 | 2019 |