Search

Your search keyword '"Guo, Shanqing"' showing total 225 results

Search Constraints

Start Over You searched for: Author "Guo, Shanqing" Remove constraint Author: "Guo, Shanqing"
225 results on '"Guo, Shanqing"'

Search Results

1. Jailbreaking Text-to-Image Models with LLM-Based Agents

2. Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks

3. AVA: Inconspicuous Attribute Variation-based Adversarial Attack bypassing DeepFake Detection

4. RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks

5. An Extensive Study of Residential Proxies in China

6. Security Research for Android Remote Assistance Apps

7. Multi-granularity Deep Vulnerability Detection Using Graph Neural Networks

9. Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

11. SoK: A Modularized Approach to Study the Security of Automatic Speech Recognition Systems

13. Marginal Release Under Multi-party Personalized Differential Privacy

14. Learning Symmetric and Asymmetric Steganography via Adversarial Training

15. How to Prove Your Model Belongs to You: A Blind-Watermark based Framework to Protect Intellectual Property of DNN

17. DRLGENCERT: Deep Learning-based Automated Testing of Certificate Verification in SSL/TLS Implementations

20. TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing

25. An Empirical Study of Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks

30. WalkToTopics: Inferring Topic Relations from a Feature Learning Perspective

31. Deep Packet Inspection with Delayed Signature Matching in Network Auditing

32. Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling

33. Supervised Class Graph Preserving Hashing for Image Retrieval and Classification

34. M3LH: Multi-modal Multi-label Hashing for Large Scale Data Search

40. SOMH: A Self-Organizing Map Based Topology Preserving Hashing Method

43. MonkeyDroid: Detecting Unreasonable Privacy Leakages of Android Applications

44. Hashing Multi-Instance Data from Bag and Instance Level

46. DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models.

49. SafeBrowsingCloud: Detecting Drive-by-Downloads Attack Using Cloud Computing Environment

50. TrafficS: A Behavior-Based Network Traffic Classification Benchmark System with Traffic Sampling Functionality

Catalog

Books, media, physical & digital resources