Ruigang Liang

Orcid: 0000-0002-8751-9918

According to our database1, Ruigang Liang authored at least 22 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MEA-Defender: A Robust Watermark against Model Extraction Attack.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

SSL-WM: A Black-Box Watermarking Approach for Encoders Pre-trained by Self-Supervised Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

DeGPT: Optimizing Decompiler Output with LLM.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Evaluating the Effectiveness of Decompilers.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Optimizing Decompiler Output by Eliminating Redundant Data Flow in Self-Recursive Inlining.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2024

2023
SkillSim: voice apps similarity detection.
Cybersecur., December, 2023

A Robustness-Assured White-Box Watermark in Neural Networks.
IEEE Trans. Dependable Secur. Comput., 2023

A Data-free Backdoor Injection Approach in Neural Networks.
Proceedings of the 32nd USENIX Security Symposium, 2023

AURC: Detecting Errors in Program Code and Documentation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Using ensemble models to detect deepfake images of human faces.
Proceedings of the 2023 International Conference on Mathematics, 2023

DBIA: Data-Free Backdoor Attack Against Transformer Networks.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2022
A Novel Membership Inference Attack against Dynamic Neural Networks by Utilizing Policy Networks Information.
CoRR, 2022

Boosting Neural Networks to Decompile Optimized Binaries.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Evaluation indicators for open-source software: a review.
Cybersecur., 2021

Neutron: an attention-based neural decompiler.
Cybersecur., 2021

Semantics-Recovering Decompilation through Neural Machine Translation.
CoRR, 2021

DBIA: Data-free Backdoor Injection Attack against Transformer Networks.
CoRR, 2021

HufuNet: Embedding the Left Piece as Watermark and Keeping the Right Piece for Ownership Verification in Deep Neural Networks.
CoRR, 2021

2020
FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Practical Adversarial Attack Against Object Detector.
CoRR, 2018


  Loading...