Ren Pang

Orcid: 0009-0000-2474-4491

According to our database1, Ren Pang authored at least 18 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models.
CoRR, 2024

On the Difficulty of Defending Contrastive Learning against Backdoor Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Model Extraction Attacks Revisited.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
On the Security Risks of Knowledge Graph Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

The Dark Side of AutoML: Towards Architectural Backdoor Search.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

An Embarrassingly Simple Backdoor Attack on Self-supervised Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Demystifying Self-supervised Trojan Attacks.
CoRR, 2022

Reasoning over Multi-view Knowledge Graphs.
CoRR, 2022

On the Security Risks of AutoML.
Proceedings of the 31st USENIX Security Symposium, 2022

TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
Towards Robust Reasoning over Knowledge Graphs.
CoRR, 2021

Graph Backdoor.
Proceedings of the 30th USENIX Security Symposium, 2021

i-Algebra: Towards Interactive Interpretability of Deep Neural Networks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask).
CoRR, 2020

AdvMind: Inferring Adversary Intent of Black-Box Attacks.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models.
CoRR, 2019


  Loading...