Backdoor pre-trained models can transfer to all L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang arXiv preprint arXiv:2111.00197, 2021 | 93 | 2021 |
Authorized keyword search on encrypted data J Shi, J Lai, Y Li, RH Deng, J Weng Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 79 | 2014 |
BDPL: A boundary differentially private layer against machine learning model extraction attacks H Zheng, Q Ye, H Hu, C Fang, J Shi Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 62 | 2019 |
Causality-based neural network repair B Sun, J Sun, LH Pham, J Shi Proceedings of the 44th International Conference on Software Engineering …, 2022 | 52 | 2022 |
SecTTS: A secure track & trace system for RFID-enabled supply chains J Shi, Y Li, W He, D Sim Computers in Industry, 2012 | 39 | 2012 |
A fine-grained access control model for relational databases J Shi, H Zhu Journal of Zhejiang University-Science C 11 (8), 575-586, 2010 | 32 | 2010 |
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang CCS 21 (2021), 15-19, 2021 | 29 | 2021 |
PrivKVM*: Revisiting key-value statistics estimation with local differential privacy Q Ye, H Hu, X Meng, H Zheng, K Huang, C Fang, J Shi IEEE Transactions on Dependable and Secure Computing 20 (1), 17-35, 2021 | 29 | 2021 |
Online event detection in synchrophasor data with graph signal processing J Shi, B Foggo, X Kong, Y Cheng, N Yu, K Yamashita 2020 IEEE International conference on communications, control, and computing …, 2020 | 28 | 2020 |
SecDS: a secure EPC discovery service system in EPCglobal network J Shi, D Sim, Y Li, R Deng Proceedings of the second ACM conference on Data and Application Security …, 2012 | 27 | 2012 |
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation H Zheng, Q Ye, H Hu, C Fang, J Shi IEEE Transactions on Dependable and Secure Computing, 2020 | 26 | 2020 |
Constructing plausible innocuous pseudo queries to protect user query intention Z Wu, J Shi, C Lu, E Chen, G Xu, G Li, S Xie, SY Philip Information Sciences 325, 215-226, 2015 | 26 | 2015 |
A Secure and Efficient Discovery Service System in EPCglobal Network J Shi, Y Li, RH Deng Computers & Security, 2012 | 19 | 2012 |
3dfed: Adaptive and extensible framework for covert backdoor attack in federated learning H Li, Q Ye, H Hu, J Li, L Wang, C Fang, J Shi 2023 IEEE Symposium on Security and Privacy (SP), 1893-1907, 2023 | 18 | 2023 |
Batch clone detection in RFID-enabled supply chain J Shi, SM Kywe, Y Li 2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014 | 18 | 2014 |
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs J Shi, H Zhu, G Fu, T Jiang Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS …, 2009 | 17 | 2009 |
Evaluation of Different Electronic Product Code Discovery Service Models SM Kywe, J Shi, Y Li, R Kailash Advances in Internet of Things 2 (2), 37-46, 2012 | 16 | 2012 |
Unified authentication for heterogeneous networks H Wang, L Li, X Kang, J Shi US Patent 10,849,191, 2020 | 12 | 2020 |
Thief, beware of what get you there: Towards understanding model extraction attack X Zhang, C Fang, J Shi arXiv preprint arXiv:2104.05921, 2021 | 11 | 2021 |
Rethinking natural adversarial examples for classification models X Li, J Li, T Dai, J Shi, J Zhu, X Hu arXiv preprint arXiv:2102.11731, 2021 | 10 | 2021 |