Shaofeng Li

Orcid: 0000-0002-1491-4319

According to our database1, Shaofeng Li authored at least 40 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Backdoor Attacks against Learning-Based Algorithms
Wireless Networks, Springer, ISBN: 978-3-031-57388-0, 2024

A visual SLAM-based lightweight multi-modal semantic framework for an intelligent substation robot.
Robotica, 2024

Show Me What and Where has Changed? Question Answering and Grounding for Remote Sensing Change Detection.
CoRR, 2024

Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security.
CoRR, 2024

Seeing is not always believing: The Space of Harmless Perturbations.
CoRR, 2024

Yes, One-Bit-Flip Matters! Universal DNN Model Inference Depletion with Runtime Code Fault Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024

An Adaptive Real-Time Garbage Collection Method Based on File Write Prediction.
Proceedings of the Theoretical Aspects of Software Engineering, 2024

Digital Twin-Assisted Adaptive Preloading for Short Video Streaming.
Proceedings of the IEEE International Conference on Communications, 2024

Unleashing Channel Potential: Space-Frequency Selection Convolution for SAR Object Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

TMFN: A Target-oriented Multi-grained Fusion Network for End-to-end Aspect-based Multimodal Sentiment Analysis.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

2023
Secure and Efficient UAV Tracking in Space-Air-Ground Integrated Network.
IEEE Trans. Veh. Technol., August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

Unleashing Cheapfakes through Trojan Plugins of Large Language Models.
CoRR, 2023

Digital Twin-Assisted Adaptive Preloading for Short Video Streaming.
CoRR, 2023

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Development, Planning and Control of an Autonomous Mobile Manipulator for Power Substation Live-Maintaining.
Proceedings of the IEEE International Conference on Development and Learning, 2023

Split Federated Learning: Speed up Model Training in Resource-Limited Wireless Networks.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Cluster-HSFL: A Cluster-Based Hybrid Split and Federated Learning.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

GB-IDS: An Intrusion Detection System for CAN Bus Based on Graph Analysis.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Data Poisoning Attack Against Anomaly Detectors in Digital Twin-Based Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Privacy Computing with Right to Be Forgotten in Trusted Execution Environment.
Proceedings of the IEEE Global Communications Conference, 2023

A Task Scheduling Algorithm for Micro-cloud Platform Based on Task Real-time.
Proceedings of the 2nd International Conference on Networks, 2023

2022
Deep Learning Backdoors.
Security and Artificial Intelligence, 2022

Backdoors Against Natural Language Processing: A Review.
IEEE Secur. Priv., 2022

Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
HCache: A Hash-based Hybrid Caching Model for Real-Time Streaming Data Analytics.
IEEE Trans. Serv. Comput., 2021

Memory State Verification Based on Inductive and Deductive Reasoning.
IEEE Trans. Reliab., 2021

Invisible Backdoor Attacks on Deep Neural Networks Via Steganography and Regularization.
IEEE Trans. Dependable Secur. Comput., 2021

Automatic Permission Optimization Framework for Privacy Enhancement of Mobile Applications.
IEEE Internet Things J., 2021

Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks.
CoRR, 2021

BatFL: Backdoor Detection on Federated Learning in e-Health.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Hidden Backdoors in Human-Centric Language Models.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Deep Learning Backdoors.
CoRR, 2020

2019
Invisible Backdoor Attacks Against Deep Neural Networks.
CoRR, 2019

A Formal Modeling and Verification Framework for Flash Translation Layer Algorithms.
Proceedings of the Dependable Software Engineering. Theories, Tools, and Applications, 2019

2016
A Semantic-Based Approach to Building Auxiliary System for Screen-Based Reading.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2010
Exploiting rich features for Chinese named entity recognition.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

2009
CRF-based Active Learning for Chinese Named Entity Recognition.
Proceedings of the IEEE International Conference on Systems, 2009


  Loading...