Textbugger: Generating adversarial text against real-world applications J Li, S Ji, T Du, B Li, T Wang Proceedings of the 26th Annual Network and Distributed System Security …, 2019 | 689 | 2019 |
Sirenattack: Generating adversarial audio for end-to-end acoustic systems T Du, S Ji, J Li, Q Gu, T Wang, R Beyah 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2020), 2020 | 130 | 2020 |
Online e-commerce fraud: a large-scale detection and analysis H Weng, Z Li, S Ji, C Chu, H Lu, T Du, Q He 2018 IEEE 34th International Conference on Data Engineering (ICDE), 1435-1440, 2018 | 50 | 2018 |
机器学习模型可解释性方法, 应用与安全研究综述 纪守领, 李进锋, 杜天宇, 李博 计算机研究与发展 56 (10), 2071-2096, 2019 | 38 | 2019 |
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation J Li, T Du, S Ji, R Zhang, Q Lu, M Yang, T Wang 29th USENIX Security Symposium (USENIX Security 20), 1381-1398, 2020 | 30 | 2020 |
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang ACM Conference on Computer and Communications Security (CCS), 2021 | 27 | 2021 |
Spreading social influence with both positive and negative opinions in online networks JS He, M Han, S Ji, T Du, Z Li Big Data Mining and Analytics 2 (2), 100-117, 2019 | 27 | 2019 |
Neuronfair: Interpretable white-box fairness testing through biased neuron identification H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen Proceedings of the 44th International Conference on Software Engineering …, 2022 | 26 | 2022 |
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji Computers & Security 104, 102220, 2021 | 24 | 2021 |
Your labels are selling you out: Relation leaks in vertical federated learning P Qiu, X Zhang, S Ji, T Du, Y Pu, J Zhou, T Wang IEEE Transactions on Dependable and Secure Computing, 2022 | 23 | 2022 |
Invisible poisoning: Highly stealthy targeted poisoning attack J Chen, H Zheng, M Su, T Du, C Lin, S Ji Information Security and Cryptology: 15th International Conference, Inscrypt …, 2020 | 23 | 2020 |
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning C Li, R Pang, Z Xi, T Du, S Ji, Y Yao, T Wang IEEE International Conference on Computer Vision (ICCV), 2023 | 19* | 2023 |
Static taint analysis method for intent injection vulnerability in android applications B Xiong, G Xiang, T Du, J He, S Ji Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi’an …, 2017 | 8 | 2017 |
机器学习模型安全与隐私研究综述 纪守领, 杜天宇, 李进锋, 沈超, 李博 软件学报 32 (1), 41-67, 2021 | 7 | 2021 |
深度学习模型鲁棒性研究综述 纪守领, 杜天宇, 邓水光, 程鹏, 时杰, 杨珉, 李博 计算机学报 45 (1), 190-206, 2022 | 6 | 2022 |
Quantifying graph anonymity, utility, and de-anonymity S Ji, T Du, Z Hong, T Wang, R Beyah IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1736-1744, 2018 | 6 | 2018 |
VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models Z Yin, M Ye, T Zhang, T Du, J Zhu, H Liu, J Chen, T Wang, F Ma Neural Information Processing Systems (NeurIPS), 2023 | 4 | 2023 |
Enhancing model robustness by incorporating adversarial knowledge into semantic representation J Li, T Du, X Liu, R Zhang, H Xue, S Ji ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 4 | 2021 |
On the Security Risks of Knowledge Graph Reasoning Z Xi, T Du, C Li, R Pang, S Ji, X Luo, X Xiao, F Ma, T Wang Proceedings of the 32nd USENIX Security Symposium (USENIX Security), 2023 | 3 | 2023 |
Influence spread in social networks with both positive and negative influences J He, Y Xie, T Du, S Ji, Z Li International Computing and Combinatorics Conference, 615-629, 2017 | 2 | 2017 |