Shawn Shan

According to our database1, Shawn Shan authored at least 26 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Disrupting Style Mimicry Attacks on Video Imagery.
CoRR, 2024

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?
CoRR, 2024

Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Organic or Diffused: Can We Distinguish Human Art from AI-generated Images?
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Understanding Implosion in Text-to-Image Generative Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A Response to Glaze Purification via IMPRESS.
CoRR, 2023

Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models.
CoRR, 2023

Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models.
Proceedings of the 32nd USENIX Security Symposium, 2023

SoK: Anti-Facial Recognition Technology.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Traceback of Data Poisoning Attacks in Neural Networks.
CoRR, 2021

A Real-time Defense against Website Fingerprinting Attacks.
CoRR, 2021

Deep Entity Classification: Abusive Account Detection for Online Social Networks.
Proceedings of the 30th USENIX Security Symposium, 2021

Patch-based Defenses against Web Fingerprinting Attacks.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

Using Honeypots to Catch Adversarial Attacks on Neural Networks.
Proceedings of the MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, 2021

2020
Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks.
CoRR, 2020

Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models.
CoRR, 2020

Fawkes: Protecting Privacy against Unauthorized Deep Learning Models.
Proceedings of the 29th USENIX Security Symposium, 2020

Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks.
CoRR, 2019

Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash.
Proceedings of the 29th on Hypertext and Social Media, 2018

Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018


  Loading...