关注
shaofeng li
shaofeng li
Peng Cheng Laboratory
在 pcl.ac.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Invisible backdoor attacks on deep neural networks via steganography and regularization
S Li, M Xue, BZH Zhao, H Zhu, X Zhang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2088-2105, 2020
3272020
Hidden backdoors in human-centric language models
S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
1112021
Fingerprinting deep neural networks globally via universal adversarial perturbations
Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022
532022
Deep learning backdoors
S Li, S Ma, M Xue, BZH Zhao
Security and Artificial Intelligence: A Crossdisciplinary Approach, 313-334, 2022
332022
Backdoors against natural language processing: A review
S Li, T Dong, BZH Zhao, M Xue, S Du, H Zhu
IEEE Security & Privacy 20 (5), 50-59, 2022
202022
Automatic permission optimization framework for privacy enhancement of mobile applications
Y Qu, S Du, S Li, Y Meng, L Zhang, H Zhu
IEEE Internet of Things Journal 8 (9), 7394-7406, 2020
142020
Batfl: Backdoor detection on federated learning in e-health
B Xi, S Li, J Li, H Liu, H Liu, H Zhu
2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021
132021
RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
T Dong, S Li, G Chen, M Xue, H Zhu, Z Liu
NDSS, 2023
52023
Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors
R Sun, M Xue, G Tyson, T Dong, S Li, S Wang, H Zhu, S Camtepe, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
42023
Secure and efficient uav tracking in space-air-ground integrated network
J Li, W Zhang, Y Meng, S Li, L Ma, Z Liu, H Zhu
IEEE Transactions on Vehicular Technology 72 (8), 10682-10695, 2023
42023
Summary and Future Directions
S Li, H Zhu, W Wu, X Shen
Backdoor Attacks against Learning-Based Algorithms, 149-153, 2024
32024
Unleashing cheapfakes through trojan plugins of large language models
T Dong, G Chen, S Li, M Xue, R Holland, Y Meng, Z Liu, H Zhu
arXiv preprint arXiv:2312.00374, 2023
32023
Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection
S Li, X Wang, M Xue, H Zhu, Z Zhang, Y Gao, W Wu, XS Shen
Proceedings of the 33th USENIX Security Symposium, 2024
22024
Split federated learning: Speed up model training in resource-limited wireless networks
S Zhang, W Wu, P Hu, S Li, N Zhang
2023 IEEE 43rd International Conference on Distributed Computing Systems …, 2023
22023
Data Poisoning Attack against Anomaly Detectors in Digital Twin-Based Networks
S Li, W Wu, Y Meng, J Li, H Zhu, XS Shen
IEEE International Conference on Communications (IEEE ICC 2023), 2023
22023
Cluster-HSFL: A Cluster-Based Hybrid Split and Federated Learning
S Zhang, H Tu, Z Li, S Liu, S Li, W Wu, XS Shen
2023 IEEE/CIC International Conference on Communications in China (ICCC), 1-2, 2023
12023
面向智能家居平台的信息物理融合系统安全
孟岩, 李少锋, 张亦弛, 朱浩瑾, 张新鹏
计算机研究与发展 56 (11), 2349-2364, 2019
12019
Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security
Y Fan, Y Cao, Z Zhao, Z Liu, S Li
arXiv preprint arXiv:2404.05264, 2024
2024
Invisible Backdoor Attacks in Image Classification Based Network Services
S Li, H Zhu, W Wu, X Shen
Backdoor Attacks against Learning-Based Algorithms, 43-78, 2024
2024
Literature Review of Backdoor Attacks
S Li, H Zhu, W Wu, X Shen
Backdoor Attacks against Learning-Based Algorithms, 23-41, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20