Backdoor pre-trained models can transfer to all L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang arXiv preprint arXiv:2111.00197, 2021 | 103 | 2021 |
BDPL: A boundary differentially private layer against machine learning model extraction attacks H Zheng, Q Ye, H Hu, C Fang, J Shi Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 63 | 2019 |
Mitigating application layer distributed denial of service attacks via effective trust management J Yu, C Fang, L Lu, Z Li IET communications 4 (16), 1952-1962, 2010 | 60 | 2010 |
ID repetition in Kad J Yu, C Fang, J Xu, EC Chang, Z Li 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 111-120, 2009 | 47 | 2009 |
A lightweight mechanism to mitigate application layer DDoS attacks J Yu, C Fang, L Lu, Z Li Scalable Information Systems: 4th International ICST Conference, INFOSCALE …, 2009 | 43 | 2009 |
PrivKVM*: Revisiting key-value statistics estimation with local differential privacy Q Ye, H Hu, X Meng, H Zheng, K Huang, C Fang, J Shi IEEE Transactions on Dependable and Secure Computing 20 (1), 17-35, 2021 | 35 | 2021 |
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang CCS 21 (2021), 15-19, 2021 | 31 | 2021 |
Protecting decision boundary of machine learning model with differentially private perturbation H Zheng, Q Ye, H Hu, C Fang, J Shi IEEE Transactions on Dependable and Secure Computing 19 (3), 2007-2022, 2020 | 30 | 2020 |
An optimization model for aesthetic two-dimensional barcodes C Fang, C Zhang, EC Chang MultiMedia Modeling: 20th Anniversary International Conference, MMM 2014 …, 2014 | 20 | 2014 |
3dfed: Adaptive and extensible framework for covert backdoor attack in federated learning H Li, Q Ye, H Hu, J Li, L Wang, C Fang, J Shi 2023 IEEE Symposium on Security and Privacy (SP), 1893-1907, 2023 | 19 | 2023 |
Differential privacy with δ-neighbourhood for spatial and dynamic datasets C Fang, EC Chang Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 16 | 2014 |
Secure sketch for multiple secrets C Fang, Q Li, EC Chang Applied Cryptography and Network Security: 8th International Conference …, 2010 | 12 | 2010 |
Information leakage in optimal anonymized and diversified data C Fang, EC Chang Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008 | 11 | 2008 |
Thief, beware of what get you there: Towards understanding model extraction attack X Zhang, C Fang, J Shi arXiv preprint arXiv:2104.05921, 2021 | 10 | 2021 |
Securing interactive sessions using mobile device through visual channel and visual inspection C Fang, EC Chang Proceedings of the 26th Annual Computer Security Applications Conference, 69-78, 2010 | 10 | 2010 |
A goal-oriented approach for modeling and analyzing attack graph X Liu, C Fang, D Xiao, H Xu 2010 International Conference on Information Science and Applications, 1-8, 2010 | 9 | 2010 |
Intrusion diagnosis and prediction with expert system X Liu, C Fang, D Xiao Security and Communication Networks 4 (12), 1483-1494, 2011 | 8 | 2011 |
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers J Zhang, H Fang, WJW Tann, K Xu, C Fang, EC Chang Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | 7 | 2023 |
Quda: Query-limited data-free model extraction Z Lin, K Xu, C Fang, H Zheng, A Ahmed Jaheezuddin, J Shi Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | 6 | 2023 |
Differential aggregation against general colluding attackers R Du, Q Ye, Y Fu, H Hu, J Li, C Fang, J Shi 2023 IEEE 39th International Conference on Data Engineering (ICDE), 2180-2193, 2023 | 6 | 2023 |