Xueluan Gong

Orcid: 0000-0003-2190-8117

According to our database1, Xueluan Gong authored at least 29 papers between 2020 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Backdoor Attack With Sparse and Invisible Trigger.
IEEE Trans. Inf. Forensics Secur., 2024

Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models.
IEEE Trans. Dependable Secur. Comput., 2024

KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework.
IEEE Trans. Dependable Secur. Comput., 2024

Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs.
CoRR, 2024

Leveraging Label Information for Stealthy Data Stealing in Vertical Federated Learning.
CoRR, 2024

2023
B<sup>3</sup>: Backdoor Attacks against Black-box Machine Learning Models.
ACM Trans. Priv. Secur., November, 2023

Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., September, 2023

Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions.
IEEE Wirel. Commun., April, 2023

Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions.
IEEE Trans. Ind. Informatics, 2023

A GAN-Based Defense Framework Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters.
IEEE Trans. Dependable Secur. Comput., 2023

MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges.
IEEE Netw., 2023

Backdoor Attack with Sparse and Invisible Trigger.
CoRR, 2023

NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples.
Proceedings of the ACM Web Conference 2023, 2023

Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion.
Proceedings of the 32nd USENIX Security Symposium, 2023

Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

D-DAE: Defense-Penetrating Model Extraction Attacks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Orion: Online Backdoor Sample Detection via Evolution Deviance.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

2022
MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks.
IEEE Trans. Netw. Serv. Manag., 2022

Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers.
IEEE Netw., 2022

Wet-Ra: Monitoring Diapers Wetness with Wireless Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions.
IEEE Commun. Mag., 2022

ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment.
IEEE J. Sel. Areas Commun., 2021

InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

2020
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments.
IEEE Netw., 2020

Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT.
IEEE Internet Things J., 2020

Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models.
IEEE Commun. Mag., 2020


  Loading...