Mingfu Xue
Orcid: 0000-0003-2408-503X
According to our database1,
Mingfu Xue
authored at least 60 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting.
IEEE Trans. Neural Networks Learn. Syst., October, 2024
An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features.
IEEE Trans. Artif. Intell., September, 2024
IEEE Trans. Vis. Comput. Graph., August, 2024
IEEE Trans. Ind. Informatics, March, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
2023
Appl. Intell., September, 2023
Detecting backdoor in deep neural networks via intentional adversarial perturbations.
Inf. Sci., July, 2023
IEEE Trans. Big Data, June, 2023
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples.
Appl. Intell., March, 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
ACM Trans. Multim. Comput. Commun. Appl., 2023
Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption.
IEEE Trans. Emerg. Top. Comput., 2023
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023
Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations.
IEEE Trans. Artif. Intell., 2022
InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features.
CoRR, 2022
CoRR, 2022
Comput. Secur., 2022
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication.
Appl. Intell., 2022
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022
Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022
2021
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems.
Peer-to-Peer Netw. Appl., 2021
J. Inf. Secur. Appl., 2021
SocialGuard: An adversarial example based privacy-preserving technique for social images.
J. Inf. Secur. Appl., 2021
Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images.
CoRR, 2021
CoRR, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.
Proceedings of the Information Security - 24th International Conference, 2021
DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper).
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021
2020
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots.
Secur. Commun. Networks, 2020
IET Comput. Digit. Tech., 2020
Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020
DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations.
CoRR, 2020
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system.
Comput. Secur., 2020
IEEE Access, 2020
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
2019
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.
Secur. Commun. Networks, 2019
Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs.
IET Comput. Digit. Tech., 2019
Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method.
IEEE Access, 2019
Proceedings of the Machine Learning and Intelligent Communications, 2019
2018
A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique.
Proceedings of the 17th IEEE International Conference On Trust, 2018
A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
面向敏感值的层次化多源数据融合隐私保护 (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value).
计算机科学, 2017
2016
Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
An enhanced classification-based golden chips-free hardware Trojan detection technique.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
2015
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme.
Proceedings of the Cloud Computing and Security - First International Conference, 2015
2014
An Integer Time Delay Estimation Algorithm Based on Zadoff-Chu Sequence in OFDM Systems.
IEEE Trans. Veh. Technol., 2014
Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique.
IEICE Trans. Inf. Syst., 2014
2013
Proceedings of the IEEE 11th International Conference on Dependable, 2013
2012
Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy.
IEICE Trans. Inf. Syst., 2012