Backdoor attacks and defenses in federated learning: State-of-the-art, taxonomy, and future directions X Gong, Y Chen, Q Wang, W Kong IEEE Wireless Communications 30 (2), 114-121, 2022 | 59 | 2022 |
Model extraction attacks and defenses on cloud-based machine learning models X Gong, Q Wang, Y Chen, W Yang, X Jiang IEEE Communications Magazine 58 (12), 83-89, 2020 | 58 | 2020 |
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion. X Gong, Y Chen, W Yang, G Mei, Q Wang IJCAI, 2439-2447, 2021 | 48 | 2021 |
Defense-resistant backdoor attacks against deep neural networks in outsourced cloud environment X Gong, Y Chen, Q Wang, H Huang, L Meng, C Shen, Q Zhang IEEE Journal on Selected Areas in Communications 39 (8), 2617-2631, 2021 | 43 | 2021 |
Coordinated backdoor attacks against federated learning with model-dependent triggers X Gong, Y Chen, H Huang, Y Liao, S Wang, Q Wang IEEE network 36 (1), 84-90, 2022 | 41 | 2022 |
Backdoor attacks and defenses for deep neural networks in outsourced cloud environments Y Chen, X Gong, Q Wang, X Di, H Huang IEEE Network 34 (5), 141-147, 2020 | 33 | 2020 |
Marnet: Backdoor attacks against cooperative multi-agent reinforcement learning Y Chen, Z Zheng, X Gong IEEE Transactions on Dependable and Secure Computing 20 (5), 4188-4198, 2022 | 27 | 2022 |
Data poisoning attacks in internet-of-vehicle networks: Taxonomy, state-of-the-art, and future directions Y Chen, X Zhu, X Gong, X Yi, S Li IEEE Transactions on Industrial Informatics 19 (1), 20-28, 2022 | 23 | 2022 |
D-dae: Defense-penetrating model extraction attacks Y Chen, R Guan, X Gong, J Dong, M Xue 2023 IEEE Symposium on Security and Privacy (SP), 382-399, 2023 | 21 | 2023 |
Kaleidoscope: Physical backdoor attacks against deep neural networks with RGB filters X Gong, Z Wang, Y Chen, M Xue, Q Wang, C Shen IEEE Transactions on Dependable and Secure Computing 20 (6), 4993-5004, 2023 | 19 | 2023 |
MPCN-RP: A routing protocol for blockchain-based multi-charge payment channel networks Y Chen, Y Ran, J Zhou, J Zhang, X Gong IEEE Transactions on Network and Service Management 19 (2), 1229-1242, 2021 | 19 | 2021 |
Crowdcaching: Incentivizing D2D-enabled caching via coalitional game for IoT Y Chen, X Gong, R Ou, L Duan, Q Zhang IEEE Internet of Things Journal 7 (6), 5599-5612, 2020 | 19 | 2020 |
Redeem myself: Purifying backdoors in deep learning models using self attention distillation X Gong, Y Chen, W Yang, Q Wang, Y Gu, H Huang, C Shen 2023 IEEE Symposium on Security and Privacy (SP), 755-772, 2023 | 18 | 2023 |
Private data inference attacks against cloud: Model, technologies, and research directions X Gong, Y Chen, Q Wang, M Wang, S Li IEEE Communications Magazine 60 (9), 46-52, 2022 | 15 | 2022 |
ATTEQ-NN: Attention based QoE-aware evasive backdoor attacks X Gong, Y Chen, J Dong, Q Wang Annual Network and Distributed System Security Symposium. The Internet Society, 2022 | 15 | 2022 |
B3: Backdoor Attacks against Black-box Machine Learning Models X Gong, Y Chen, W Yang, H Huang, Q Wang ACM Transactions on Privacy and Security 26 (4), 1-24, 2023 | 12 | 2023 |
A gan-based defense framework against model inversion attacks X Gong, Z Wang, S Li, Y Chen, Q Wang IEEE Transactions on Information Forensics and Security, 2023 | 12 | 2023 |
Catch You and I Can: Revealing source voiceprint against voice conversion J Deng, Y Chen, Y Zhong, Q Miao, X Gong, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 5163-5180, 2023 | 10 | 2023 |
NetGuard: Protecting commercial web APIs from model inversion attacks using GAN-generated fake samples X Gong, Z Wang, Y Chen, Q Wang, C Wang, C Shen Proceedings of the ACM Web Conference 2023, 2045-2053, 2023 | 8 | 2023 |
Backdoor Attack with Sparse and Invisible Trigger Y Gao, Y Li, X Gong, Z Li, ST Xia, Q Wang IEEE Transactions on Information Forensics and Security, 2024 | 5 | 2024 |