Chengfang Fang

Orcid: 0000-0002-8313-0980

According to our database1, Chengfang Fang authored at least 37 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Perfect Gradient Inversion in Federated Learning: A New Paradigm from the Hidden Subset Sum Problem.
CoRR, 2024

ADVSV: An Over-the-Air Adversarial Attack Dataset for Speaker Verification.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence.
CoRR, 2023

3DFed: Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for Cross-channel Watermarking Robustness.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

DoubleDeceiver: Deceiving the Speaker Verification System Protected by Spoofing Countermeasures.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023

Differential Aggregation against General Colluding Attackers.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

QUDA: Query-Limited Data-Free Model Extraction.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

A Survey on Reinforcement Learning Security with Application to Autonomous Driving.
CoRR, 2022

MExMI: Pool-based Active Model Extraction Crossover Membership Inference.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Thief, Beware of What Get You There: Towards Understanding Model Extraction Attack.
CoRR, 2021

A-FMI: Learning Attributions from Deep Networks via Feature Map Importance.
CoRR, 2021

Backdoor Pre-trained Models Can Transfer to All.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Bident Structure for Neural Network Model Protection.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020

Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble Defence.
Proceedings of the AISec@CCS 2020: Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 2020

2019
BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks.
Proceedings of the Computer Security - ESORICS 2019, 2019

2014
Optimal strategy of coupon subset collection when each package contains half of the coupons.
Inf. Process. Lett., 2014

An Optimization Model for Aesthetic Two-Dimensional Barcodes.
Proceedings of the MultiMedia Modeling - 20th Anniversary International Conference, 2014

Differential privacy with δ-neighbourhood for spatial and dynamic datasets.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2012
Adaptive Differentially Private Histogram of Low-Dimensional Data.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

2011
Intrusion diagnosis and prediction with expert system.
Secur. Commun. Networks, 2011

Publishing Location Dataset Differential Privately with Isotonic Regression
CoRR, 2011

ID Repetition in Structured P2P Networks.
Comput. J., 2011

Identity leakage mitigation on asymmetric secure sketch.
Proceedings of the 2011 IEEE International Joint Conference on Biometrics, 2011

2010
Securing Kiosk using Mobile Devices coupled with Visual Inspection
CoRR, 2010

A chameleon encryption scheme resistant to known-plaintext attack.
Proceedings of the 10th ACM Workshop on Digital Rights Management, 2010

Securing interactive sessions using mobile device through visual channel and visual inspection.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

Secure Sketch for Multiple Secrets.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009

A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

2008
Information Leakage in Optimal Anonymized and Diversified Data.
IACR Cryptol. ePrint Arch., 2008


  Loading...