3dfed: Adaptive and extensible framework for covert backdoor attack in federated learning H Li, Q Ye, H Hu, J Li, L Wang, C Fang, J Shi 2023 IEEE Symposium on Security and Privacy (SP), 1893-1907, 2023 | 18 | 2023 |
A fine-grained access control model for relational databases J Shi, H Zhu Journal of Zhejiang University-Science C 11 (8), 575-586, 2010 | 32 | 2010 |
A Secure and Efficient Discovery Service System in EPCglobal Network J Shi, Y Li, RH Deng Computers & Security, 2012 | 19 | 2012 |
A secure platform for information sharing in epcglobal network J Shi, Y Li, RH DENG, W He, EW Lee International Journal of RFID Security and Cryptography 2 (1/4), 107, 2013 | 6 | 2013 |
A Secure Platform for Information Sharing in EPCglobal Network.(2013) J SHI, Y LI, RH DENG, W He, EW LEE International Journal of RFID Security and Cryptography 2 (1), 4, 0 | | |
A-fmi: Learning attributions from deep networks via feature map importance A Zhang, X Wang, C Fang, J Shi, T Chua, Z Chen arXiv preprint arXiv:2104.05527, 2021 | 5 | 2021 |
Advsv: An over-the-air adversarial attack dataset for speaker verification L Wang, J Li, Y Luo, J Zheng, L Wang, H Li, K Xu, C Fang, J Shi, Z Wu ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and …, 2024 | 1 | 2024 |
Agent-based authentication and key agreement method for devices without sim card X Kang, H Wang, J Shi US Patent App. 16/874,328, 2020 | | 2020 |
Agent-based authentication and key agreement method for devices without SIM card X Kang, H Wang, J Shi US Patent 10,681,543, 2020 | | 2020 |
Agent-based authentication and key agreement method for devices without SIM card JS Xin Kang, Haiguang Wang | | |
Analyzing and controlling information inference of fine-grained access control policies in relational databases J Shi, G Fu, J Weng, H Zhu 2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013 | 5 | 2013 |
Attack and defense mechanisms of malicious epc event injection in epc discovery service SM Kywe, Y Li, J Shi 2013 IEEE International Conference on RFID-Technologies and Applications …, 2013 | 5 | 2013 |
Authorized keyword search on encrypted data J Shi, J Lai, Y Li, RH Deng, J Weng Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 79 | 2014 |
Backdoor pre-trained models can transfer to all L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang arXiv preprint arXiv:2111.00197, 2021 | 93 | 2021 |
Batch clone detection in RFID-enabled supply chain J Shi, SM Kywe, Y Li 2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014 | 18 | 2014 |
BDPL: A boundary differentially private layer against machine learning model extraction attacks H Zheng, Q Ye, H Hu, C Fang, J Shi Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 62 | 2019 |
Bident Structure for Neural Network Model Protection. HY Lin, C Fang, J Shi ICISSP, 377-384, 2020 | 3 | 2020 |
Causality-based neural network repair B Sun, J Sun, LH Pham, J Shi Proceedings of the 44th International Conference on Software Engineering …, 2022 | 51 | 2022 |
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang CCS 21 (2021), 15-19, 2021 | 29 | 2021 |
Constructing plausible innocuous pseudo queries to protect user query intention Z Wu, J Shi, C Lu, E Chen, G Xu, G Li, S Xie, SY Philip Information Sciences 325, 215-226, 2015 | 26 | 2015 |