Mingfu Xue

Orcid: 0000-0003-2408-503X

According to our database1, Mingfu Xue authored at least 60 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PS-Net: A Learning Strategy for Accurately Exposing the Professional Photoshop Inpainting.
IEEE Trans. Neural Networks Learn. Syst., October, 2024

An Explainable Intellectual Property Protection Method for Deep Neural Networks Based on Intrinsic Features.
IEEE Trans. Artif. Intell., September, 2024

Adaptive 3D Mesh Steganography Based on Feature-Preserving Distortion.
IEEE Trans. Vis. Comput. Graph., August, 2024

Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger.
IEEE Trans. Ind. Informatics, March, 2024

Imperceptible and multi-channel backdoor attack.
Appl. Intell., January, 2024

An Imperceptible and Owner-unique Watermarking Method for Graph Neural Networks.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

Tracking the Leaker: An Encodable Watermarking Method for Dataset Intellectual Property Protection.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

2023
Compression-resistant backdoor attack against deep neural networks.
Appl. Intell., September, 2023

Detecting backdoor in deep neural networks via intentional adversarial perturbations.
Inf. Sci., July, 2023

Localization of Inpainting Forgery With Feature Enhancement Network.
IEEE Trans. Big Data, June, 2023

Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples.
Appl. Intell., March, 2023

PRNU-based Image Forgery Localization with Deep Multi-scale Fusion.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Detection of Recolored Image by Texture Features in Chrominance Components.
ACM Trans. Multim. Comput. Commun. Appl., 2023

Use the Spear as a Shield: An Adversarial Example Based Privacy-Preserving Technique Against Membership Inference Attacks.
IEEE Trans. Emerg. Top. Comput., 2023

AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption.
IEEE Trans. Emerg. Top. Comput., 2023

ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023

Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models.
CoRR, 2023

2022
One-to-N & N-to-One: Two Advanced Backdoor Attacks Against Deep Learning Models.
IEEE Trans. Dependable Secur. Comput., 2022

Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations.
IEEE Trans. Artif. Intell., 2022

InFIP: An Explainable DNN Intellectual Property Protection Method based on Intrinsic Features.
CoRR, 2022

Detecting Recolored Image by Spatial Correlation.
CoRR, 2022

Imperceptible and Multi-channel Backdoor Attack against Deep Neural Networks.
CoRR, 2022

PTB: Robust physical backdoor attacks against deep neural networks in real world.
Comput. Secur., 2022

Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication.
Appl. Intell., 2022

PRNU-based Image Forgery Localization With Convolutional Neural Network.
Proceedings of the 24th IEEE International Workshop on Multimedia Signal Processing, 2022

Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022

2021
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems.
Peer-to-Peer Netw. Appl., 2021

NaturalAE: Natural and robust physical adversarial examples for object detectors.
J. Inf. Secur. Appl., 2021

SocialGuard: An adversarial example based privacy-preserving technique for social images.
J. Inf. Secur. Appl., 2021

Protect the Intellectual Property of Dataset against Unauthorized Use.
CoRR, 2021

Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images.
CoRR, 2021

ActiveGuard: An Active DNN IP Protection Technique via Adversarial Examples.
CoRR, 2021

Robust Backdoor Attacks against Deep Neural Networks in Real Physical World.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.
Proceedings of the Information Security - 24th International Conference, 2021

DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper).
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021

2020
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots.
Secur. Commun. Networks, 2020

Ten years of hardware Trojans: a survey from the attacker's perspective.
IET Comput. Digit. Tech., 2020

3D Invisible Cloak.
CoRR, 2020

Use the Spear as a Shield: A Novel Adversarial Example based Privacy-Preserving Technique against Membership Inference Attacks.
CoRR, 2020

Robust and Natural Physical Adversarial Examples for Object Detectors.
CoRR, 2020

DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations.
CoRR, 2020

LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system.
Comput. Secur., 2020

Machine Learning Security: Threats, Countermeasures, and Evaluations.
IEEE Access, 2020

Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020

2019
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.
Secur. Commun. Networks, 2019

Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs.
IET Comput. Digit. Tech., 2019

Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method.
IEEE Access, 2019

Robustness Analysis on Natural Language Processing Based AI Q&A Robots.
Proceedings of the Machine Learning and Intelligent Communications, 2019

2018
A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
面向敏感值的层次化多源数据融合隐私保护 (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value).
计算机科学, 2017

2016
Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

An enhanced classification-based golden chips-free hardware Trojan detection technique.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

2015
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
An Integer Time Delay Estimation Algorithm Based on Zadoff-Chu Sequence in OFDM Systems.
IEEE Trans. Veh. Technol., 2014

Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique.
IEICE Trans. Inf. Syst., 2014

2013
Monte Carlo Based Test Pattern Generation for Hardware Trojan Detection.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
Application-Oriented Confidentiality and Integrity Dynamic Union Security Model Based on MLS Policy.
IEICE Trans. Inf. Syst., 2012


  Loading...