Invisible backdoor attacks on deep neural networks via steganography and regularization S Li, M Xue, BZH Zhao, H Zhu, X Zhang IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020 | 327 | 2020 |
Hidden backdoors in human-centric language models S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 111 | 2021 |
Fingerprinting deep neural networks globally via universal adversarial perturbations Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022 | 53 | 2022 |
Deep learning backdoors S Li, S Ma, M Xue, BZH Zhao Security and Artificial Intelligence: A Crossdisciplinary Approach, 313-334, 2022 | 33 | 2022 |
Backdoors against natural language processing: A review S Li, T Dong, BZH Zhao, M Xue, S Du, H Zhu IEEE Security & Privacy 20 (5), 50-59, 2022 | 20 | 2022 |
Automatic permission optimization framework for privacy enhancement of mobile applications Y Qu, S Du, S Li, Y Meng, L Zhang, H Zhu IEEE Internet of Things Journal 8 (9), 7394-7406, 2020 | 14 | 2020 |
Batfl: Backdoor detection on federated learning in e-health B Xi, S Li, J Li, H Liu, H Liu, H Zhu 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021 | 13 | 2021 |
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. T Dong, S Li, G Chen, M Xue, H Zhu, Z Liu NDSS, 2023 | 5 | 2023 |
Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors R Sun, M Xue, G Tyson, T Dong, S Li, S Wang, H Zhu, S Camtepe, ... Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 4 | 2023 |
Secure and efficient uav tracking in space-air-ground integrated network J Li, W Zhang, Y Meng, S Li, L Ma, Z Liu, H Zhu IEEE Transactions on Vehicular Technology 72 (8), 10682-10695, 2023 | 4 | 2023 |
Summary and Future Directions S Li, H Zhu, W Wu, X Shen Backdoor Attacks against Learning-Based Algorithms, 149-153, 2024 | 3 | 2024 |
Unleashing cheapfakes through trojan plugins of large language models T Dong, G Chen, S Li, M Xue, R Holland, Y Meng, Z Liu, H Zhu arXiv preprint arXiv:2312.00374, 2023 | 3 | 2023 |
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection S Li, X Wang, M Xue, H Zhu, Z Zhang, Y Gao, W Wu, XS Shen Proceedings of the 33th USENIX Security Symposium, 2024 | 2 | 2024 |
Split federated learning: Speed up model training in resource-limited wireless networks S Zhang, W Wu, P Hu, S Li, N Zhang 2023 IEEE 43rd International Conference on Distributed Computing Systems …, 2023 | 2 | 2023 |
Data Poisoning Attack against Anomaly Detectors in Digital Twin-Based Networks S Li, W Wu, Y Meng, J Li, H Zhu, XS Shen IEEE International Conference on Communications (IEEE ICC 2023), 2023 | 2 | 2023 |
Cluster-HSFL: A Cluster-Based Hybrid Split and Federated Learning S Zhang, H Tu, Z Li, S Liu, S Li, W Wu, XS Shen 2023 IEEE/CIC International Conference on Communications in China (ICCC), 1-2, 2023 | 1 | 2023 |
面向智能家居平台的信息物理融合系统安全 孟岩, 李少锋, 张亦弛, 朱浩瑾, 张新鹏 计算机研究与发展 56 (11), 2349-2364, 2019 | 1 | 2019 |
Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security Y Fan, Y Cao, Z Zhao, Z Liu, S Li arXiv preprint arXiv:2404.05264, 2024 | | 2024 |
Invisible Backdoor Attacks in Image Classification Based Network Services S Li, H Zhu, W Wu, X Shen Backdoor Attacks against Learning-Based Algorithms, 43-78, 2024 | | 2024 |
Literature Review of Backdoor Attacks S Li, H Zhu, W Wu, X Shen Backdoor Attacks against Learning-Based Algorithms, 23-41, 2024 | | 2024 |