Shengshan Hu
Orcid: 0000-0003-0042-9045
According to our database1,
Shengshan Hu
authored at least 69 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., June, 2024
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness.
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification.
Proceedings of the Computer Security - ESORICS 2024, 2024
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations.
CoRR, 2023
Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training.
CoRR, 2023
Feature Extraction Matters More: Universal Deepfake Disruption through Attacking Ensemble Feature Extractors.
CoRR, 2023
AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Voice Guard: Protecting Voice Privacy with Strong and Imperceptible Adversarial Perturbation in the Time Domain.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation.
CoRR, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the IEEE Symposium on Computers and Communications, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021
CoRR, 2021
CoRR, 2021
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
CoRR, 2020
2019
IEEE Wirel. Commun., 2019
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection.
CoRR, 2019
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019
IEEE Commun. Mag., 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
IEEE Netw., 2017
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
2016
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2016
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data.
IEEE Trans. Image Process., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015