2025
LLMs Cannot Reliably Judge (Yet?): A Comprehensive Assessment on the Robustness of LLM-as-a-Judge.
CoRR, June, 2025
TrojanDam: Detection-Free Backdoor Defense in Federated Learning through Proactive Model Robustification utilizing OOD Data.
CoRR, April, 2025
ARMOR: Shielding Unlearnable Examples against Data Augmentation.
CoRR, January, 2025
A Survey on Facial Image Privacy Preservation in Cloud-Based Services.
CoRR, January, 2025
Augmenting Model Extraction Attacks Against Disruption-Based Defenses.
IEEE Trans. Inf. Forensics Secur., 2025
Artemis: Defending Against Backdoor Attacks via Distribution Shift.
IEEE Trans. Dependable Secur. Comput., 2025
URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
2024
Ubi-AD: Towards Ubiquitous, Passive Alzheimer Detection using the Smartwatch.
ACM Trans. Sens. Networks, September, 2024
Backdoor Attack With Sparse and Invisible Trigger.
IEEE Trans. Inf. Forensics Secur., 2024
Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models.
IEEE Trans. Dependable Secur. Comput., 2024
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework.
IEEE Trans. Dependable Secur. Comput., 2024
An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers.
CoRR, 2024
Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer.
CoRR, 2024
Neutralizing Backdoors through Information Conflicts for Large Language Models.
CoRR, 2024
Hidden Data Privacy Breaches in Federated Learning.
CoRR, 2024
Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs.
CoRR, 2024
Leveraging Label Information for Stealthy Data Stealing in Vertical Federated Learning.
CoRR, 2024
Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
B<sup>3</sup>: Backdoor Attacks against Black-box Machine Learning Models.
ACM Trans. Priv. Secur., November, 2023
Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023
Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions.
IEEE Wirel. Commun., April, 2023
Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions.
IEEE Trans. Ind. Informatics, 2023
A GAN-Based Defense Framework Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2023
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters.
IEEE Trans. Dependable Secur. Comput., 2023
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges.
IEEE Netw., 2023
Backdoor Attack with Sparse and Invisible Trigger.
CoRR, 2023
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
Proceedings of the 32nd USENIX Security Symposium, 2023
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
D-DAE: Defense-Penetrating Model Extraction Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Orion: Online Backdoor Sample Detection via Evolution Deviance.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
2022
MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks.
IEEE Trans. Netw. Serv. Manag., 2022
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers.
IEEE Netw., 2022
Wet-Ra: Monitoring Diapers Wetness with Wireless Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions.
IEEE Commun. Mag., 2022
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
2021
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment.
IEEE J. Sel. Areas Commun., 2021
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
2020
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments.
IEEE Netw., 2020
Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT.
IEEE Internet Things J., 2020
Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models.
IEEE Commun. Mag., 2020