Di Tang
Affiliations:- Indiana University Bloomington, USA
- Chinese University of Hong Kong (former)
According to our database1,
Di Tang
authored at least 21 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples.
Proceedings of the 33rd USENIX Security Symposium, 2024
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
CoRR, 2022
Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP Ecosystem through Intelligent Analysis on Change Requests.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the NeurIPS 2022 Competition Track, 2021
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021
2020
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks.
CoRR, 2019
Stealthy Porn: Understanding Real-World Adversarial Images for Illicit Online Promotion.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
Query-Free Attacks on Industry-Grade Face Recognition Systems under Resource Constraints.
CoRR, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018