Xueluan Gong

Orcid: 0000-0003-2190-8117

According to our database1, Xueluan Gong authored at least 38 papers between 2020 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
ARMOR: Shielding Unlearnable Examples against Data Augmentation.
CoRR, January, 2025

A Survey on Facial Image Privacy Preservation in Cloud-Based Services.
CoRR, January, 2025

Augmenting Model Extraction Attacks Against Disruption-Based Defenses.
IEEE Trans. Inf. Forensics Secur., 2025

2024
Ubi-AD: Towards Ubiquitous, Passive Alzheimer Detection using the Smartwatch.
ACM Trans. Sens. Networks, September, 2024

Backdoor Attack With Sparse and Invisible Trigger.
IEEE Trans. Inf. Forensics Secur., 2024

Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models.
IEEE Trans. Dependable Secur. Comput., 2024

KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework.
IEEE Trans. Dependable Secur. Comput., 2024

An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers.
CoRR, 2024

Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer.
CoRR, 2024

Neutralizing Backdoors through Information Conflicts for Large Language Models.
CoRR, 2024

Hidden Data Privacy Breaches in Federated Learning.
CoRR, 2024

Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs.
CoRR, 2024

Leveraging Label Information for Stealthy Data Stealing in Vertical Federated Learning.
CoRR, 2024

Beowulf: Mitigating Model Extraction Attacks Via Reshaping Decision Regions.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
B<sup>3</sup>: Backdoor Attacks against Black-box Machine Learning Models.
ACM Trans. Priv. Secur., November, 2023

Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023

Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions.
IEEE Wirel. Commun., April, 2023

Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions.
IEEE Trans. Ind. Informatics, 2023

A GAN-Based Defense Framework Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters.
IEEE Trans. Dependable Secur. Comput., 2023

MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges.
IEEE Netw., 2023

Backdoor Attack with Sparse and Invisible Trigger.
CoRR, 2023

NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023

Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
Proceedings of the 32nd USENIX Security Symposium, 2023

Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

D-DAE: Defense-Penetrating Model Extraction Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Orion: Online Backdoor Sample Detection via Evolution Deviance.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

2022
MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks.
IEEE Trans. Netw. Serv. Manag., 2022

Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers.
IEEE Netw., 2022

Wet-Ra: Monitoring Diapers Wetness with Wireless Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions.
IEEE Commun. Mag., 2022

ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment.
IEEE J. Sel. Areas Commun., 2021

InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

2020
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments.
IEEE Netw., 2020

Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT.
IEEE Internet Things J., 2020

Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models.
IEEE Commun. Mag., 2020


  Loading...