Shouling Ji

Orcid: 0000-0003-4268-372X

Affiliations:
  • Zhejiang University, College of Computer Science and Technology, China
  • Georgia Institute of Technology, Atlanta, GA, USA (PhD 2016)


According to our database1, Shouling Ji authored at least 321 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
AdversaFlow: Visual Red Teaming for Large Language Models with Multi-Level Adversarial Flow.
IEEE Trans. Vis. Comput. Graph., January, 2025

2024
MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework.
IEEE Internet Things J., July, 2024

Towards understanding bogus traffic service in online social networks.
Frontiers Inf. Technol. Electron. Eng., March, 2024

Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices.
IEEE Trans. Consumer Electron., February, 2024

MILG: Realistic lip-sync video generation with audio-modulated image inpainting.
Vis. Informatics, 2024

DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models.
ACM Trans. Priv. Secur., 2024

AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service.
IEEE Trans. Inf. Forensics Secur., 2024

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs.
IEEE Trans. Inf. Forensics Secur., 2024

MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space.
IEEE Trans. Inf. Forensics Secur., 2024

Backdoor Online Tracing With Evolving Graphs.
IEEE Trans. Inf. Forensics Secur., 2024

URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing.
IEEE Trans. Inf. Forensics Secur., 2024

One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware.
IEEE Trans. Dependable Secur. Comput., 2024

Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Membership Inference Attacks and Defenses on GANs.
IEEE Trans. Dependable Secur. Comput., 2024

Towards Practical Backdoor Attacks on Federated Learning Systems.
IEEE Trans. Dependable Secur. Comput., 2024

G-Fuzz: A Directed Fuzzing Framework for gVisor.
IEEE Trans. Dependable Secur. Comput., 2024

VeriFi: Towards Verifiable Federated Unlearning.
IEEE Trans. Dependable Secur. Comput., 2024

EdgePro: Edge Deep Learning Model Protection via Neuron Authorization.
IEEE Trans. Dependable Secur. Comput., 2024

TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting.
IEEE Trans. Dependable Secur. Comput., 2024

TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples.
Knowl. Based Syst., 2024

FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization.
CoRR, 2024

Understanding the AI-powered Binary Code Similarity Detection.
CoRR, 2024

"No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks.
CoRR, 2024

CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models.
CoRR, 2024

CAMH: Advancing Model Hijacking Attack in Machine Learning.
CoRR, 2024

Enhancing Adversarial Transferability with Adversarial Weight Tuning.
CoRR, 2024

Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs.
CoRR, 2024

Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization.
CoRR, 2024

Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models.
CoRR, 2024

Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting.
CoRR, 2024

Emulating Full Client Participation: A Long-Term Client Selection Strategy for Federated Learning.
CoRR, 2024

Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective.
CoRR, 2024

A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning.
CoRR, 2024

How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data?
CoRR, 2024

Is Mamba Compatible with Trajectory Optimization in Offline Reinforcement Learning?
CoRR, 2024

Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models.
CoRR, 2024

TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events.
CoRR, 2024

PRSA: Prompt Reverse Stealing Attacks against Large Language Models.
CoRR, 2024

SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems.
CoRR, 2024

The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness.
CoRR, 2024

GGT: Graph-guided testing for adversarial sample detection of deep neural network.
Comput. Secur., 2024

Critical Code Guided Directed Greybox Fuzzing for Commits.
Proceedings of the 33rd USENIX Security Symposium, 2024

Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences.
Proceedings of the 33rd USENIX Security Symposium, 2024

Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis.
Proceedings of the 33rd USENIX Security Symposium, 2024

On the Difficulty of Defending Contrastive Learning against Backdoor Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Exploring ChatGPT's Capabilities on Vulnerability Management.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024

SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2024, 2024

Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Protecting Object Detection Models from Model Extraction Attack via Feature Space Coverage.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Pluggable Watermarking of Deepfake Models for Deepfake Detection.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

<i>SUB-PLAY: </i> Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

TREC: APT Tactic / Technique Recognition via Few-Shot Provenance Subgraph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Integer Is Enough: When Vertical Federated Learning Meets Rounding.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Let All Be Whitened: Multi-Teacher Distillation for Efficient Visual Retrieval.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
AC Power Consumption Dataset.
Dataset, November, 2023

Efficient text-based evolution algorithm to hard-label adversarial attacks on text.
J. King Saud Univ. Comput. Inf. Sci., May, 2023

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
Comput. Secur., May, 2023

Multilevel Graph Matching Networks for Deep Graph Similarity Learning.
IEEE Trans. Neural Networks Learn. Syst., February, 2023

Incentive-Driven Proactive Application Deployment and Pricing on Distributed Edges.
IEEE Trans. Mob. Comput., 2023

Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2023

Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction.
IEEE Trans. Pattern Anal. Mach. Intell., 2023

Query-efficient model extraction for text classification model in a hard label setting.
J. King Saud Univ. Comput. Inf. Sci., 2023

Multi-level feature disentanglement network for cross-dataset face forgery detection.
Image Vis. Comput., 2023

MEAOD: Model Extraction Attack against Object Detectors.
CoRR, 2023

How ChatGPT is Solving Vulnerability Management Problem.
CoRR, 2023

Facial Data Minimization: Shallow Model as Your Privacy Filter.
CoRR, 2023

F<sup>2</sup>AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
CoRR, 2023

Deep Intellectual Property: A Survey.
CoRR, 2023

RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks.
CoRR, 2023

Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models.
CoRR, 2023

Edge Deep Learning Model Protection via Neuron Authorization.
CoRR, 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
CoRR, 2023

TextDefense: Adversarial Text Detection based on Word Importance Entropy.
CoRR, 2023

UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware.
Proceedings of the 32nd USENIX Security Symposium, 2023

Detecting Union Type Confusion in Component Object Model.
Proceedings of the 32nd USENIX Security Symposium, 2023

On the Security Risks of Knowledge Graph Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

MINER: A Hybrid Data-Driven Approach for REST API Fuzzing.
Proceedings of the 32nd USENIX Security Symposium, 2023

FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases.
Proceedings of the 32nd USENIX Security Symposium, 2023

How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

The Dark Side of AutoML: Towards Architectural Backdoor Search.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

An Embarrassingly Simple Backdoor Attack on Self-supervised Learning.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection.
Proceedings of the Computer Security - ESORICS 2023, 2023

CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Private Cell-ID Trajectory Prediction Using Multi-Graph Embedding and Encoder-Decoder Network.
IEEE Trans. Mob. Comput., 2022

Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing.
ACM Trans. Knowl. Discov. Data, 2022

GRIP-GAN: An Attack-Free Defense Through General Robust Inverse Perturbation.
IEEE Trans. Dependable Secur. Comput., 2022

A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2022

Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022

This Hacker Knows Physics: Device Physics Aware Mimicry Attacks in Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2022

Remote Attacks on Drones Vision Sensors: An Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy.
IEEE Trans. Dependable Secur. Comput., 2022

Adversarial CAPTCHAs.
IEEE Trans. Cybern., 2022

V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs.
IEEE Trans. Cybern., 2022

EfficientTDNN: Efficient Architecture Search for Speaker Recognition.
IEEE ACM Trans. Audio Speech Lang. Process., 2022

Focus : Function clone identification on cross-platform.
Int. J. Intell. Syst., 2022

An interpretable outcome prediction model based on electronic health records and hierarchical attention.
Int. J. Intell. Syst., 2022

DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022

Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study.
CoRR, 2022

All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.
CoRR, 2022

Hijack Vertical Federated Learning Models with Adversarial Embedding.
CoRR, 2022

Demystifying Self-supervised Trojan Attacks.
CoRR, 2022

Reasoning over Multi-view Knowledge Graphs.
CoRR, 2022

Improving Long Tailed Document-Level Relation Extraction via Easy Relation Augmentation and Contrastive Learning.
CoRR, 2022

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It.
CoRR, 2022

GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction.
CoRR, 2022

On the Security Risks of AutoML.
Proceedings of the 31st USENIX Security Symposium, 2022

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022

Label Inference Attacks Against Vertical Federated Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

EMS: History-Driven Mutation for Coverage-based Fuzzing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

SLIME: program-sensitive energy allocation for fuzzing.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

GIFT: Graph-guIded Feature Transfer for Cold-Start Video Click-Through Rate Prediction.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
A Truthful and Near-Optimal Mechanism for Colocation Emergency Demand Response.
IEEE Trans. Mob. Comput., 2021

Deep Graph Matching and Searching for Semantic Code Retrieval.
ACM Trans. Knowl. Discov. Data, 2021

Temporal Multi-Graph Convolutional Network for Traffic Flow Prediction.
IEEE Trans. Intell. Transp. Syst., 2021

Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning.
IEEE Trans. Image Process., 2021

A Practical Black-Box Attack on Source Code Authorship Identification Classifiers.
IEEE Trans. Inf. Forensics Secur., 2021

OB-WSPES: A Uniform Evaluation System for Obfuscation-Based Web Search Privacy.
IEEE Trans. Dependable Secur. Comput., 2021

Adversarial Examples versus Cloud-Based Detectors: A Black-Box Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2021

Dynamic Group-Oriented Provable Data Possession in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining.
IEEE Trans. Cybern., 2021

ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks.
Inf. Sci., 2021

Multi-level Alignment Network for Domain Adaptive Cross-modal Retrieval.
Neurocomputing, 2021

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
CoRR, 2021

Towards Robust Reasoning over Knowledge Graphs.
CoRR, 2021

Constructing Contrastive samples via Summarization for Text Classification with limited annotations.
CoRR, 2021

EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild.
CoRR, 2021

Progressive Localization Networks for Language-based Moment Localization.
CoRR, 2021

FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021

Graph Backdoor.
Proceedings of the 30th USENIX Security Symposium, 2021

MPInspector: A Systematic and Automatic Approach for Evaluating the Security of IoT Messaging Protocols.
Proceedings of the 30th USENIX Security Symposium, 2021

UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Detecting Adversarial Samples with Graph-Guided Testing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Hierarchical Similarity Learning for Language-Based Product Image Retrieval.
Proceedings of the IEEE International Conference on Acoustics, 2021

Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation.
Proceedings of the IEEE International Conference on Acoustics, 2021

Multi-Order Adversarial Representation Learning for Composed Query Image Retrieval.
Proceedings of the IEEE International Conference on Acoustics, 2021

Trojaning Language Models for Fun and Profit.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Constructing contrastive samples via summarization for text classification with limited annotations.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Deep Dual Consecutive Network for Human Pose Estimation.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Backdoor Pre-trained Models Can Transfer to All.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Detecting Missed Security Operations Through Differential Checking of Object-based Similar Paths.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Learn To Align: A Code Alignment Network For Code Clone Detection.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

i-Algebra: Towards Interactive Interpretability of Deep Neural Networks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Aggregated Multi-GANs for Controlled 3D Human Motion Prediction.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds.
IEEE Trans. Parallel Distributed Syst., 2020

Jamsa: A Utility Optimal Contextual Online Learning Framework for Anti-Jamming Wireless Scheduling Under Reactive Jamming Attack.
IEEE Trans. Netw. Sci. Eng., 2020

AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM.
Trans. Data Sci., 2020

Fast and parameter-light rare behavior detection in maritime trajectories.
Inf. Process. Manag., 2020

THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network.
IEEE Internet Things J., 2020

Adversarial examples detection through the sensitivity in space mappings.
IET Comput. Vis., 2020

TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask).
CoRR, 2020

Privacy Leakage of Real-World Vertical Federated Learning.
CoRR, 2020

Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing.
CoRR, 2020

Hierarchical Graph Matching Networks for Deep Graph Similarity Learning.
CoRR, 2020

Text-based price recommendation system for online rental houses.
Big Data Min. Anal., 2020

Fighting Against Deepfake: Patch&Pair Convolutional Neural Networks (PPCNN).
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Interpretable Deep Learning under Fire.
Proceedings of the 29th USENIX Security Symposium, 2020

Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation Agent.
Proceedings of the 29th USENIX Security Symposium, 2020

TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020

Attention Mechanism Based Adversarial Attack Against Deep Reinforcement Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Privacy Risks of General-Purpose Language Models.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

AdvMind: Inferring Adversary Intent of Black-Box Attacks.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

De-Health: All Your Online Health Information Are Belong to Us.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Understanding the Security Risks of Docker Hub.
Proceedings of the Computer Security - ESORICS 2020, 2020

Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

Attention with Long-Term Interval-Based Gated Recurrent Units for Modeling Sequential User Behaviors.
Proceedings of the Database Systems for Advanced Applications, 2020

PPMLP 2020: Workshop on Privacy-Preserving Machine Learning In Practice.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Text Captcha Is Dead? A Large Scale Deployment and Empirical Study.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Towards Fighting Cybercrime: Malicious URL Attack Type Detection using Multiclass Classification.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
An I/O Efficient Distributed Approximation Framework Using Cluster Sampling.
IEEE Trans. Parallel Distributed Syst., 2019

Toward Optimal Adaptive Online Shortest Path Routing With Acceleration Under Jamming Attack.
IEEE/ACM Trans. Netw., 2019

Video Big Data Retrieval Over Media Cloud: A Context-Aware Online Learning Approach.
IEEE Trans. Multim., 2019

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.
IEEE Trans. Inf. Forensics Secur., 2019

De-SAG: On the De-Anonymization of Structure-Attribute Graph Data.
IEEE Trans. Dependable Secur. Comput., 2019

Corrections to "A Privacy-Preserving Online Learning Approach for Incentive-Based Demand Response in Smart Grid".
IEEE Syst. J., 2019

A Privacy-Preserving Online Learning Approach for Incentive-Based Demand Response in Smart Grid.
IEEE Syst. J., 2019

ShareSafe: An Improved Version of SecGraph.
KSII Trans. Internet Inf. Syst., 2019

Privacy-Preserving and Residential Context-Aware Online Learning for IoT-Enabled Energy Saving With Big Data Support in Smart Home Environment.
IEEE Internet Things J., 2019

Privacy-Preserving Online Task Allocation in Edge-Computing-Enabled Massive Crowdsensing.
IEEE Internet Things J., 2019

Attend to count: Crowd counting with adaptive capacity multi-scale CNNs.
Neurocomputing, 2019

The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models.
CoRR, 2019

De-Health: All Your Online Health Information Are Belong to Us.
CoRR, 2019

FDI: Quantifying Feature-based Data Inferability.
CoRR, 2019

V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing.
CoRR, 2019

Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019

Spreading social influence with both positive and negative opinions in online networks.
Big Data Min. Anal., 2019

TiSSA: A Time Slice Self-Attention Approach for Modeling Sequential User Behaviors.
Proceedings of the World Wide Web Conference, 2019

MOPT: Optimized Mutation Scheduling for Fuzzers.
Proceedings of the 28th USENIX Security Symposium, 2019

DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

TextBugger: Generating Adversarial Text Against Real-world Applications.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Efficient Global String Kernel with Random Features: Beyond Counting Substructures.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Neural Network Model for Classifying the Economic Recession and Construction of Financial Stress Index.
Proceedings of the Data Science, 2019

CATS: Cross-Platform E-Commerce Fraud Detection.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Dual Encoding for Zero-Example Video Retrieval.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

DeT: Defending Against Adversarial Examples via Decreasing Transferability.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
DPPG: A Dynamic Password Policy Generation System.
IEEE Trans. Inf. Forensics Secur., 2018

Fingerprinting for Cyber-Physical System Security: Device Physics Matters Too.
IEEE Secur. Priv., 2018

Interpretable Deep Learning under Fire.
CoRR, 2018

Dual Dense Encoding for Zero-Example Video Retrieval.
CoRR, 2018

Rapido: A Layer2 Payment System for Decentralized Currencies.
CoRR, 2018

SmartSeed: Smart Seed Generation for Efficient Fuzzing.
CoRR, 2018

Differentially Private Releasing via Deep Generative Model.
CoRR, 2018

Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method.
Proceedings of the Services - SERVICES 2018, 2018

Quantifying Graph Anonymity, Utility, and De-anonymity.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Online E-Commerce Fraud: A Large-Scale Detection and Analysis.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

T-PriDO: A Tree-based Privacy-Preserving and Contextual Collaborative Online Big Data Processing System.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Model-Reuse Attacks on Deep Learning Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Zero-Sum Password Cracking Game: A Large-Scale Empirical Study on the Crackability, Correlation, and Security of Passwords.
IEEE Trans. Dependable Secur. Comput., 2017

Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey.
IEEE Commun. Surv. Tutorials, 2017

Blind De-anonymization Attacks using Social Networks.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol.
Proceedings of the Security and Privacy in Communication Networks, 2017

HSTS Measurement and an Enhanced Stripping Attack Against HTTPS.
Proceedings of the Security and Privacy in Communication Networks, 2017

Password correlation: Quantification, evaluation and application.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

PBUF: Sharing Buffer to Mitigate Flooding Attacks.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

Fraud Detection via Coding Nominal Attributes.
Proceedings of the 2nd International Conference on Multimedia Systems and Signal Processing, 2017

How to Quantify Graph De-anonymization Risks.
Proceedings of the Information Systems Security and Privacy, 2017

Quantification of De-anonymization Risks in Social Networks.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Private, Yet Practical, Multiparty Deep Learning.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Influence Spread in Social Networks with both Positive and Negative Influences.
Proceedings of the Computing and Combinatorics - 23rd International Conference, 2017

Internet of Things (IoT)-based Learning Framework to Facilitate STEM Undergraduate Education.
Proceedings of the 2017 ACM Southeast Regional Conference, 2017

2016
Evaluating the security of anonymized big graph/structural data.
PhD thesis, 2016

Structural Data De-Anonymization: Theory and Practice.
IEEE/ACM Trans. Netw., 2016

Semi-Structure Routing and Analytical Frameworks for Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2016

General Graph Data De-Anonymization: From Mobility Traces to Social Networks.
ACM Trans. Inf. Syst. Secur., 2016

Seed-Based De-Anonymizability Quantification of Social Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Sapprox: Enabling Efficient and Accurate Approximations on Sub-datasets with Distribution-aware Online Sampling.
Proc. VLDB Endow., 2016

On the relative de-anonymizability of graph data: Quantification and evaluation.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Towards a Framework to Facilitate the Mobile Advertising Ecosystem.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

SmartWalk: Enhancing Social Network Security via Adaptive Random Walks.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Broadcast Scheduling With Latency and Redundancy Analysis for Cognitive Radio Networks.
IEEE Trans. Veh. Technol., 2015

Constructing load-balanced virtual backbones in probabilistic wireless sensor networks via multi-objective genetic algorithm.
Trans. Emerg. Telecommun. Technol., 2015

Optimal routing with scheduling and channel assignment in multi-power multi-radio wireless sensor networks.
Ad Hoc Networks, 2015

SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization.
Proceedings of the 24th USENIX Security Symposium, 2015

Whitespace measurement and virtual backbone construction for Cognitive Radio Networks: From the social perspective.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Primary social behavior aware routing and scheduling for Cognitive Radio Networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

PARS: A Uniform and Open-source Password Analysis and Research System.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Multi-regional query scheduling in wireless sensor networks with minimum latency.
Wirel. Commun. Mob. Comput., 2014

Greedy construction of load-balanced virtual backbones in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Distributed and Asynchronous Data Collection in Cognitive Radio Networks with Fairness Consideration.
IEEE Trans. Parallel Distributed Syst., 2014

Snapshot and Continuous Data Collection in Probabilistic Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2014

Strengthen nodal cooperation for data dissemination in mobile social networks.
Pers. Ubiquitous Comput., 2014

Neighborhood-based uncertainty generation in social networks.
J. Comb. Optim., 2014

A Genetic Algorithm with Immigrants Schemes for Constructing a σ-Reliable MCDS in Probabilistic Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Data aggregation scheduling in wireless networks with Cognitive Radio capability.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Minimum-sized influential node set selection for social networks under the independent cascade model.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Structure Based Data De-Anonymization of Social Networks and Mobility Traces.
Proceedings of the Information Security - 17th International Conference, 2014

Structural Data De-anonymization: Quantification, Practice, and Implications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Cell-based snapshot and continuous data collection in wireless sensor networks.
ACM Trans. Sens. Networks, 2013

Distributed Data Collection in Large-Scale Asynchronous Wireless Sensor Networks Under the Generalized Physical Interference Model.
IEEE/ACM Trans. Netw., 2013

Approximation algorithms for load-balanced virtual backbone construction in wireless sensor networks.
Theor. Comput. Sci., 2013

Continuous data aggregation and capacity in probabilistic wireless sensor networks.
J. Parallel Distributed Comput., 2013

Practical unicast and convergecast scheduling schemes for cognitive radio networks.
J. Comb. Optim., 2013

Minimum-Latency Broadcast Scheduling for Cognitive Radio Networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Minimum-sized Positive Influential Node Set selection for social networks: Considering both positive and negative influences.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Time efficient data aggregation scheduling in Cognitive Radio Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A Multi-Objective Genetic Algorithm for constructing load-balanced virtual backbones in probabilistic Wireless Sensor Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Generating Uncertain Networks Based on Historical Network Snapshots.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

2012
Continuous Data Collection Capacity of Dual-Radio Multichannel Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Load-balanced CDS construction in wireless sensor networks via genetic algorithm.
Int. J. Sens. Networks, 2012

Data caching-based query processing in multi-sink wireless sensor networks.
Int. J. Sens. Networks, 2012

Distributed data collection and its capacity in asynchronous wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Snapshot/Continuous Data Collection capacity for large-scale probabilistic Wireless Sensor Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Optimal Distributed Data Collection for Asynchronous Cognitive Radio Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Constructing a load-balanced virtual backbone in Wireless Sensor Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks.
Proceedings of the Combinatorial Optimization and Applications, 2012

2011
A Genetic Algorithm for Constructing a Reliable MCDS in Probabilistic Wireless Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

Genetic-algorithm-based construction of Load-Balanced CDSs in Wireless Sensor Networks.
Proceedings of the MILCOM 2011, 2011

Continuous Data Collection Capacity of Wireless Sensor Networks under Physical Interference Model.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Minimum latency scheduling for Multi-Regional Query in Wireless Sensor Networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Generalized broadcast scheduling in duty-cycle multi-hop wireless networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Capacity of dual-radio multi-channel wireless sensor networks for continuous data collection.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
ARM: An asynchronous receiver-initiated multichannel MAC protocol with duty cycling for WSNs.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010

M-cube: A Duty Cycle Based Multi-channel MAC Protocol with Multiple Channel Reservation for WSNs.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

RCS: A Random Channel Selection with Probabilistic Backoff for Multi-Channel MAC Protocols in WSNs.
Proceedings of the Global Communications Conference, 2010

2009
Data Caching Based Queries in Multi-sink Sensor Networks.
Proceedings of the MSN 2009, 2009

2008
Routing in Multi-Sink Sensor Networks Based on Gravitational Field.
Proceedings of the International Conference on Embedded Software and Systems, 2008


  Loading...