关注
Jie Shi
Jie Shi
Security Expert in Huawei Singapore Research Centre
在 huawei.com 的电子邮件经过验证 - 首页
标题
引用次数
年份
3dfed: Adaptive and extensible framework for covert backdoor attack in federated learning
H Li, Q Ye, H Hu, J Li, L Wang, C Fang, J Shi
2023 IEEE Symposium on Security and Privacy (SP), 1893-1907, 2023
182023
A fine-grained access control model for relational databases
J Shi, H Zhu
Journal of Zhejiang University-Science C 11 (8), 575-586, 2010
322010
A Secure and Efficient Discovery Service System in EPCglobal Network
J Shi, Y Li, RH Deng
Computers & Security, 2012
192012
A secure platform for information sharing in epcglobal network
J Shi, Y Li, RH DENG, W He, EW Lee
International Journal of RFID Security and Cryptography 2 (1/4), 107, 2013
62013
A Secure Platform for Information Sharing in EPCglobal Network.(2013)
J SHI, Y LI, RH DENG, W He, EW LEE
International Journal of RFID Security and Cryptography 2 (1), 4, 0
A-fmi: Learning attributions from deep networks via feature map importance
A Zhang, X Wang, C Fang, J Shi, T Chua, Z Chen
arXiv preprint arXiv:2104.05527, 2021
52021
Advsv: An over-the-air adversarial attack dataset for speaker verification
L Wang, J Li, Y Luo, J Zheng, L Wang, H Li, K Xu, C Fang, J Shi, Z Wu
ICASSP 2024-2024 IEEE International Conference on Acoustics, Speech and …, 2024
12024
Agent-based authentication and key agreement method for devices without sim card
X Kang, H Wang, J Shi
US Patent App. 16/874,328, 2020
2020
Agent-based authentication and key agreement method for devices without SIM card
X Kang, H Wang, J Shi
US Patent 10,681,543, 2020
2020
Agent-based authentication and key agreement method for devices without SIM card
JS Xin Kang, Haiguang Wang
Analyzing and controlling information inference of fine-grained access control policies in relational databases
J Shi, G Fu, J Weng, H Zhu
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
52013
Attack and defense mechanisms of malicious epc event injection in epc discovery service
SM Kywe, Y Li, J Shi
2013 IEEE International Conference on RFID-Technologies and Applications …, 2013
52013
Authorized keyword search on encrypted data
J Shi, J Lai, Y Li, RH Deng, J Weng
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
792014
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
932021
Batch clone detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
182014
BDPL: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
622019
Bident Structure for Neural Network Model Protection.
HY Lin, C Fang, J Shi
ICISSP, 377-384, 2020
32020
Causality-based neural network repair
B Sun, J Sun, LH Pham, J Shi
Proceedings of the 44th International Conference on Software Engineering …, 2022
512022
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS 21 (2021), 15-19, 2021
292021
Constructing plausible innocuous pseudo queries to protect user query intention
Z Wu, J Shi, C Lu, E Chen, G Xu, G Li, S Xie, SY Philip
Information Sciences 325, 215-226, 2015
262015
系统目前无法执行此操作,请稍后再试。
文章 1–20