Search

Your search keyword '"Ji, Shouling"' showing total 511 results

Search Constraints

Start Over You searched for: Author "Ji, Shouling" Remove constraint Author: "Ji, Shouling"
511 results on '"Ji, Shouling"'

Search Results

1. CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models

2. CAMH: Advancing Model Hijacking Attack in Machine Learning

3. Enhancing Adversarial Transferability with Adversarial Weight Tuning

4. Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs

5. A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild

6. Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization

7. Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models

8. Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting

9. Emulating Full Client Participation: A Long-Term Client Selection Strategy for Federated Learning

10. Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective

11. A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning

12. How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data?

13. Is Mamba Compatible with Trajectory Optimization in Offline Reinforcement Learning?

14. Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models

15. Marlin: Knowledge-Driven Analysis of Provenance Graphs for Efficient and Robust Detection of Cyber Attacks

16. PRSA: PRompt Stealing Attacks against Large Language Models

17. SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems

18. The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness

19. AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service

20. MEAOD: Model Extraction Attack against Object Detectors

21. Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval

22. On the Difficulty of Defending Contrastive Learning against Backdoor Attacks

23. AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection

24. Exploring ChatGPT's Capabilities on Vulnerability Management

25. Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection

26. CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code

27. Facial Data Minimization: Shallow Model as Your Privacy Filter

28. F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns

29. SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices

30. Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks

31. ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning

32. Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting

33. UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware

34. G$^2$uardFL: Safeguarding Federated Learning Against Backdoor Attacks through Attributed Client Graph Clustering

35. Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization

36. On the Security Risks of Knowledge Graph Reasoning

37. RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks

40. Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection

42. Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection

43. Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models

44. Edge Deep Learning Model Protection via Neuron Authorization

45. MINER: A Hybrid Data-Driven Approach for REST API Fuzzing

46. FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases

47. TextDefense: Adversarial Text Detection based on Word Importance Entropy

49. Towards Comprehensively Understanding the Run-time Security of Programmable Logic Controllers: A 3-year Empirical Study

50. One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware

Catalog

Books, media, physical & digital resources