Di Tang

Affiliations:
  • Indiana University Bloomington, USA
  • Chinese University of Hong Kong (former)


According to our database1, Di Tang authored at least 21 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
LLM-Enhanced Software Patch Localization.
CoRR, 2024

Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples.
Proceedings of the 33rd USENIX Security Symposium, 2024

Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
CoRR, 2023

HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs.
Proceedings of the 32nd USENIX Security Symposium, 2023

Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Understanding Impacts of Task Similarity on Backdoor Attack and Detection.
CoRR, 2022

Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests.
Proceedings of the 31st USENIX Security Symposium, 2022

Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
Proceedings of the 30th USENIX Security Symposium, 2021


Understanding the Brains and Brawn of Illicit Streaming App.
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

2020
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.
CoRR, 2019

Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Invisible Mask: Practical Attacks on Face Recognition with Infrared.
CoRR, 2018

Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints.
CoRR, 2018

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018


  Loading...