Haichang Gao

Orcid: 0000-0002-4969-5718

According to our database1, Haichang Gao authored at least 65 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Stability-Enhanced Dynamic Backdoor Defense in Federated Learning for IIoT.
IEEE Trans. Ind. Informatics, November, 2024

Black-box Bayesian adversarial attack with transferable priors.
Mach. Learn., April, 2024

Improving the Security of Audio CAPTCHAs With Adversarial Examples.
IEEE Trans. Dependable Secur. Comput., 2024

The robustness of behavior-verification-based slider CAPTCHAs.
J. Inf. Secur. Appl., 2024

Mining Glitch Tokens in Large Language Models via Gradient-based Discrete Optimization.
CoRR, 2024

The Dark Side of Function Calling: Pathways to Jailbreaking Large Language Models.
CoRR, 2024

Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024

A Transferable Adversarial Attack against Object Detection Networks.
Proceedings of the International Joint Conference on Neural Networks, 2024

Enhancing Data-Free Model Stealing Attack on Robust Models.
Proceedings of the International Joint Conference on Neural Networks, 2024

2023
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers, December, 2023

Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.
IEEE Internet Things J., August, 2023

A lightweight backdoor defense framework based on image inpainting.
Neurocomputing, June, 2023

TextGuise: Adaptive adversarial example attacks on text classification model.
Neurocomputing, April, 2023

Extended Research on the Security of Visual Reasoning CAPTCHA.
IEEE Trans. Dependable Secur. Comput., 2023

An Experimental Investigation of Text-based CAPTCHA Attacks and Their Robustness.
ACM Comput. Surv., 2023

SoK: Acoustic Side Channels.
CoRR, 2023

AdvFunMatch: When Consistent Teaching Meets Adversarial Robustness.
CoRR, 2023

TransNoise: Transferable Universal Adversarial Noise for Adversarial Attack.
Proceedings of the Artificial Neural Networks and Machine Learning, 2023

2022
A deep learning-based attack on text CAPTCHAs by using object detection techniques.
IET Inf. Secur., 2022

Lower Difficulty and Better Robustness: A Bregman Divergence Perspective for Adversarial Training.
CoRR, 2022

Alleviating Robust Overfitting of Adversarial Training With Consistency Regularization.
CoRR, 2022

Consistency Regularization Helps Mitigate Robust Overfitting in Adversarial Training.
Proceedings of the Knowledge Science, Engineering and Management, 2022

2021
Defense Against Adversarial Attacks by Reconstructing Images.
IEEE Trans. Image Process., 2021

A Security Analysis of Captchas With Large Character Sets.
IEEE Trans. Dependable Secur. Comput., 2021

Universal Optimization Strategies for Object Detection Networks.
Int. J. Pattern Recognit. Artif. Intell., 2021

Research on the Security of Visual Reasoning CAPTCHA.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
An End-to-End Attack on Text CAPTCHAs.
IEEE Trans. Inf. Forensics Secur., 2020

Feature Pooling - A Feature Compression Method Used in Convolutional Neural Networks.
J. Inf. Sci. Eng., 2020

Simple and Easy: Transfer Learning-Based Attacks to Text CAPTCHA.
IEEE Access, 2020

WordChange: Adversarial Examples Generation Approach for Chinese Text Classification.
IEEE Access, 2020

2019
Breaking Text-based CAPTCHAs using Average Vertical Partition.
J. Inf. Sci. Eng., 2019

Image-based CAPTCHAs based on neural style transfer.
IET Inf. Secur., 2019

A Survey of Research on CAPTCHA Designing and Breaking Techniques.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Is Satellite Image Target Camouflage Still Valid Under Deep Learning Target Detection?
Proceedings of the ICAIP 2019: 3rd International Conference on Advances in Image Processing, 2019

2018
Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha.
IEEE Trans. Inf. Forensics Secur., 2018

Research on Text Location and Recognition in Natural Images with Deep Learning.
Proceedings of the 2nd International Conference on Advances in Artificial Intelligence, 2018

Effect of Adversarial Examples on the Robustness of CAPTCHA.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018

2017
Research on the Security of Microsoft's Two-Layer Captcha.
IEEE Trans. Inf. Forensics Secur., 2017

Two Novel Image-Based CAPTCHA Schemes Based on Visual Effects.
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017

2016
Robustness of text-based completely automated public turing test to tell computers and humans apart.
IET Inf. Secur., 2016

A Simple Generic Attack on Text Captchas.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
The Robustness of Face-Based CAPTCHAs.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
The Robustness of "Connecting Characters Together" CAPTCHAs.
J. Inf. Sci. Eng., 2014

2013
A survey on the use of graphical passwords in security.
J. Softw., 2013

Draw a line on your PDA to authenticate.
CoRR, 2013

An audio CAPTCHA to distinguish humans from computers.
CoRR, 2013

Usability and Security of the Recall-Based Graphical Password Schemes.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

The Hot-Spots Problem in Windows 8 Graphical Password Scheme.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

The robustness of hollow CAPTCHAs.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Multiple password interference in graphical passwords.
Int. J. Inf. Comput. Secur., 2012

Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHA.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
An Enhanced Drawing Reproduction Graphical Password Strategy.
J. Comput. Sci. Technol., 2011

Exploration of a hand-based graphical password scheme.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

A Novel Cued-recall Graphical Password Scheme.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

2010
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
Proceedings of the Image Analysis and Recognition, 7th International Conference, 2010

A New Graphical Password Scheme Resistant to Shoulder-Surfing.
Proceedings of the 2010 International Conference on CyberWorlds, 2010

A Novel Image Based CAPTCHA Using Jigsaw Puzzle.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010

The effect of baroque music on the PassPoints graphical password.
Proceedings of the 9th ACM International Conference on Image and Video Retrieval, 2010

Against Spyware Using CAPTCHA in Graphical Password Scheme.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
A new graphical password scheme against spyware by using CAPTCHA.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Analysis and Evaluation of the ColorLogin Graphical Password Scheme.
Proceedings of the Fifth International Conference on Image and Graphics, 2009

Web Service Selection Algorithm Based on Particle Swarm Optimization.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

2008
Multiobjective Optimization Using Clustering Based Two Phase PSO.
Proceedings of the Fourth International Conference on Natural Computation, 2008

YAGP: Yet Another Graphical Password Strategy.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2006
Training RBF Neural Network with Hybrid Particle Swarm Optimization.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006


  Loading...