Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Shiqing Ma
@inproceedings{DBLP:conf/aaai/AnC0X0S0MCHZ24, author = {Shengwei An and Sheng{-}Yen Chou and Kaiyuan Zhang and Qiuling Xu and Guanhong Tao and Guangyu Shen and Siyuan Cheng and Shiqing Ma and Pin{-}Yu Chen and Tsung{-}Yi Ho and Xiangyu Zhang}, editor = {Michael J. Wooldridge and Jennifer G. Dy and Sriraam Natarajan}, title = {Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift}, booktitle = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI} 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver, Canada}, pages = {10847--10855}, publisher = {{AAAI} Press}, year = {2024}, url = {https://doi.org/10.1609/aaai.v38i10.28958}, doi = {10.1609/AAAI.V38I10.28958}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/AnC0X0S0MCHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-00379, author = {Xiaoyu Zhang and Juan Zhai and Shiqing Ma and Chao Shen}, title = {{DREAM:} Debugging and Repairing AutoML Pipelines}, journal = {CoRR}, volume = {abs/2401.00379}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.00379}, doi = {10.48550/ARXIV.2401.00379}, eprinttype = {arXiv}, eprint = {2401.00379}, timestamp = {Mon, 15 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-00379.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-05467, author = {Guangyu Shen and Siyuan Cheng and Kaiyuan Zhang and Guanhong Tao and Shengwei An and Lu Yan and Zhuo Zhang and Shiqing Ma and Xiangyu Zhang}, title = {Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia}, journal = {CoRR}, volume = {abs/2402.05467}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.05467}, doi = {10.48550/ARXIV.2402.05467}, eprinttype = {arXiv}, eprint = {2402.05467}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-05467.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-02437, author = {Hyejun Jeong and Shiqing Ma and Amir Houmansadr}, title = {SoK: Challenges and Opportunities in Federated Unlearning}, journal = {CoRR}, volume = {abs/2403.02437}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.02437}, doi = {10.48550/ARXIV.2403.02437}, eprinttype = {arXiv}, eprint = {2403.02437}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-02437.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-17188, author = {Siyuan Cheng and Guanhong Tao and Yingqi Liu and Guangyu Shen and Shengwei An and Shiwei Feng and Xiangzhe Xu and Kaiyuan Zhang and Shiqing Ma and Xiangyu Zhang}, title = {{LOTUS:} Evasive and Resilient Backdoor Attacks through Sub-Partitioning}, journal = {CoRR}, volume = {abs/2403.17188}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.17188}, doi = {10.48550/ARXIV.2403.17188}, eprinttype = {arXiv}, eprint = {2403.17188}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-17188.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/TianZWCSMJ23, author = {Yongqiang Tian and Wuqi Zhang and Ming Wen and Shing{-}Chi Cheung and Chengnian Sun and Shiqing Ma and Yu Jiang}, title = {Finding Deviated Behaviors of the Compressed {DNN} Models for Image Classifications}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {32}, number = {5}, pages = {128:1--128:32}, year = {2023}, url = {https://doi.org/10.1145/3583564}, doi = {10.1145/3583564}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/TianZWCSMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/AlhanahnahMGCYJZ23, author = {Mohannad Alhanahnah and Shiqing Ma and Ashish Gehani and Gabriela F. Ciocarlie and Vinod Yegneswaran and Somesh Jha and Xiangyu Zhang}, title = {autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {4}, pages = {2761--2775}, year = {2023}, url = {https://doi.org/10.1109/TSE.2022.3231242}, doi = {10.1109/TSE.2022.3231242}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/AlhanahnahMGCYJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/MeiLWZM23, author = {Kai Mei and Zheng Li and Zhenting Wang and Yang Zhang and Shiqing Ma}, editor = {Anna Rogers and Jordan L. Boyd{-}Graber and Naoaki Okazaki}, title = {{NOTABLE:} Transferable Backdoor Attacks Against Prompt-based {NLP} Models}, booktitle = {Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), {ACL} 2023, Toronto, Canada, July 9-14, 2023}, pages = {15551--15565}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.acl-long.867}, doi = {10.18653/V1/2023.ACL-LONG.867}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/MeiLWZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/0002T0SXL0M023, author = {Shiwei Feng and Guanhong Tao and Siyuan Cheng and Guangyu Shen and Xiangzhe Xu and Yingqi Liu and Kaiyuan Zhang and Shiqing Ma and Xiangyu Zhang}, title = {Detecting Backdoors in Pre-trained Encoders}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023}, pages = {16352--16362}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CVPR52729.2023.01569}, doi = {10.1109/CVPR52729.2023.01569}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/0002T0SXL0M023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/DingCHTMZ23, author = {Aolin Ding and Matthew Chan and Amin Hass and Nils Ole Tippenhauer and Shiqing Ma and Saman A. Zonouz}, title = {Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Aerial Vehicles}, booktitle = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023}, pages = {67--80}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSN58367.2023.00020}, doi = {10.1109/DSN58367.2023.00020}, timestamp = {Tue, 15 Aug 2023 11:43:57 +0200}, biburl = {https://dblp.org/rec/conf/dsn/DingCHTMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/0002TX0AL0SCM023, author = {Kaiyuan Zhang and Guanhong Tao and Qiuling Xu and Siyuan Cheng and Shengwei An and Yingqi Liu and Shiwei Feng and Guangyu Shen and Pin{-}Yu Chen and Shiqing Ma and Xiangyu Zhang}, title = {{FLIP:} {A} Provable Defense Framework for Backdoor Mitigation in Federated Learning}, booktitle = {The Eleventh International Conference on Learning Representations, {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023}, publisher = {OpenReview.net}, year = {2023}, url = {https://openreview.net/pdf?id=Xo2E217\_M4n}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/0002TX0AL0SCM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/WangMZM23, author = {Zhenting Wang and Kai Mei and Juan Zhai and Shiqing Ma}, title = {{UNICORN:} {A} Unified Backdoor Trigger Inversion Framework}, booktitle = {The Eleventh International Conference on Learning Representations, {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023}, publisher = {OpenReview.net}, year = {2023}, url = {https://openreview.net/pdf?id=Mj7K4lglGyj}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/WangMZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/GaoZM00W23, author = {Xuanqi Gao and Juan Zhai and Shiqing Ma and Chao Shen and Yufei Chen and Shiwei Wang}, editor = {Ren{\'{e}} Just and Gordon Fraser}, title = {{CILIATE:} Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement}, booktitle = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July 17-21, 2023}, pages = {475--487}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3597926.3598071}, doi = {10.1145/3597926.3598071}, timestamp = {Mon, 17 Jul 2023 11:49:17 +0200}, biburl = {https://dblp.org/rec/conf/issta/GaoZM00W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/0005TLAX0S0XM023, author = {Siyuan Cheng and Guanhong Tao and Yingqi Liu and Shengwei An and Xiangzhe Xu and Shiwei Feng and Guangyu Shen and Kaiyuan Zhang and Qiuling Xu and Shiqing Ma and Xiangyu Zhang}, title = {{BEAGLE:} Forensics of Deep Learning Backdoor Attack for Better Defense}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/beagle-forensics-of-deep-learning-backdoor-attack-for-better-defense/}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/0005TLAX0S0XM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Shen000LAM023, author = {Guangyu Shen and Siyuan Cheng and Guanhong Tao and Kaiyuan Zhang and Yingqi Liu and Shengwei An and Shiqing Ma and Xiangyu Zhang}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/a102d6cb996be3482c059c1e18bbe523-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/Shen000LAM023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Wang0ZLM23, author = {Zhenting Wang and Chen Chen and Yi Zeng and Lingjuan Lyu and Shiqing Ma}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {Where Did {I} Come From? Origin Attribution of AI-Generated Images}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/ebb4c188fafe7da089b41a9f615ad84d-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/Wang0ZLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AnYXMTCZLSKZ23, author = {Shengwei An and Yuan Yao and Qiuling Xu and Shiqing Ma and Guanhong Tao and Siyuan Cheng and Kaiyuan Zhang and Yingqi Liu and Guangyu Shen and Ian Kelk and Xiangyu Zhang}, title = {ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {899--916}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179360}, doi = {10.1109/SP46215.2023.10179360}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AnYXMTCZLSKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WuM0L00R23, author = {Xinghui Wu and Shiqing Ma and Chao Shen and Chenhao Lin and Qian Wang and Qi Li and Yuan Rao}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{KENKU:} Towards Efficient and Stealthy Black-box Adversarial Attacks against {ASR} Systems}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {247--264}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wu-xinghui}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/WuM0L00R23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DingZNM23, author = {Hailun Ding and Juan Zhai and Yuhong Nan and Shiqing Ma}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {{AIRTAG:} Towards Automated Attack Investigation by Unsupervised Learning with Log Texts}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {373--390}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/ding-hailun-airtag}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DingZNM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DingZ0M23, author = {Hailun Ding and Juan Zhai and Dong Deng and Shiqing Ma}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {The Case for Learned Provenance Graph Storage Systems}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3277--3294}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/ding-hailun-provenance}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DingZ0M23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-06241, author = {Siyuan Cheng and Guanhong Tao and Yingqi Liu and Shengwei An and Xiangzhe Xu and Shiwei Feng and Guangyu Shen and Kaiyuan Zhang and Qiuling Xu and Shiqing Ma and Xiangyu Zhang}, title = {{BEAGLE:} Forensics of Deep Learning Backdoor Attack for Better Defense}, journal = {CoRR}, volume = {abs/2301.06241}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.06241}, doi = {10.48550/ARXIV.2301.06241}, eprinttype = {arXiv}, eprint = {2301.06241}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-06241.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-12318, author = {Rui Zhu and Di Tang and Siyuan Tang and Guanhong Tao and Shiqing Ma and XiaoFeng Wang and Haixu Tang}, title = {Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering}, journal = {CoRR}, volume = {abs/2301.12318}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.12318}, doi = {10.48550/ARXIV.2301.12318}, eprinttype = {arXiv}, eprint = {2301.12318}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-12318.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-15180, author = {Shiwei Feng and Guanhong Tao and Siyuan Cheng and Guangyu Shen and Xiangzhe Xu and Yingqi Liu and Kaiyuan Zhang and Shiqing Ma and Xiangyu Zhang}, title = {Detecting Backdoors in Pre-trained Encoders}, journal = {CoRR}, volume = {abs/2303.15180}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.15180}, doi = {10.48550/ARXIV.2303.15180}, eprinttype = {arXiv}, eprint = {2303.15180}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-15180.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-02786, author = {Zhenting Wang and Kai Mei and Juan Zhai and Shiqing Ma}, title = {{UNICORN:} {A} Unified Backdoor Trigger Inversion Framework}, journal = {CoRR}, volume = {abs/2304.02786}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.02786}, doi = {10.48550/ARXIV.2304.02786}, eprinttype = {arXiv}, eprint = {2304.02786}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-02786.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-04222, author = {Xuanqi Gao and Juan Zhai and Shiqing Ma and Chao Shen and Yufei Chen and Shiwei Wang}, title = {{CILIATE:} Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement}, journal = {CoRR}, volume = {abs/2304.04222}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.04222}, doi = {10.48550/ARXIV.2304.04222}, eprinttype = {arXiv}, eprint = {2304.04222}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-04222.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-17826, author = {Kai Mei and Zheng Li and Zhenting Wang and Yang Zhang and Shiqing Ma}, title = {{NOTABLE:} Transferable Backdoor Attacks Against Prompt-based {NLP} Models}, journal = {CoRR}, volume = {abs/2305.17826}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.17826}, doi = {10.48550/ARXIV.2305.17826}, eprinttype = {arXiv}, eprint = {2305.17826}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-17826.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-18439, author = {Zhenting Wang and Chen Chen and Yi Zeng and Lingjuan Lyu and Shiqing Ma}, title = {Alteration-free and Model-agnostic Origin Attribution of Generated Images}, journal = {CoRR}, volume = {abs/2305.18439}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.18439}, doi = {10.48550/ARXIV.2305.18439}, eprinttype = {arXiv}, eprint = {2305.18439}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-18439.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-03108, author = {Zhenting Wang and Chen Chen and Yuchen Liu and Lingjuan Lyu and Dimitris N. Metaxas and Shiqing Ma}, title = {How to Detect Unauthorized Data Usages in Text-to-image Diffusion Models}, journal = {CoRR}, volume = {abs/2307.03108}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.03108}, doi = {10.48550/ARXIV.2307.03108}, eprinttype = {arXiv}, eprint = {2307.03108}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-03108.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-00050, author = {Shengwei An and Sheng{-}Yen Chou and Kaiyuan Zhang and Qiuling Xu and Guanhong Tao and Guangyu Shen and Siyuan Cheng and Shiqing Ma and Pin{-}Yu Chen and Tsung{-}Yi Ho and Xiangyu Zhang}, title = {Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift}, journal = {CoRR}, volume = {abs/2312.00050}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.00050}, doi = {10.48550/ARXIV.2312.00050}, eprinttype = {arXiv}, eprint = {2312.00050}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-00050.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DoanXMAR22, author = {Bao Gia Doan and Minhui Xue and Shiqing Ma and Ehsan Abbasnejad and Damith C. Ranasinghe}, title = {TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {3816--3830}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3198857}, doi = {10.1109/TIFS.2022.3198857}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/DoanXMAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/TaoSLAXML022, author = {Guanhong Tao and Guangyu Shen and Yingqi Liu and Shengwei An and Qiuling Xu and Shiqing Ma and Pan Li and Xiangyu Zhang}, title = {Better Trigger Inversion Optimization in Backdoor Scanning}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {13358--13368}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01301}, doi = {10.1109/CVPR52688.2022.01301}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/TaoSLAXML022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/LiuSTWM022, author = {Yingqi Liu and Guangyu Shen and Guanhong Tao and Zhenting Wang and Shiqing Ma and Xiangyu Zhang}, title = {Complex Backdoor Detection by Symmetric Feature Differencing}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {14983--14993}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01458}, doi = {10.1109/CVPR52688.2022.01458}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/LiuSTWM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/WangZM22, author = {Zhenting Wang and Juan Zhai and Shiqing Ma}, title = {BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {15054--15063}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01465}, doi = {10.1109/CVPR52688.2022.01465}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/WangZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SalemWBMZ22, author = {Ahmed Salem and Rui Wen and Michael Backes and Shiqing Ma and Yang Zhang}, title = {Dynamic Backdoor Attacks Against Machine Learning Models}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {703--718}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00049}, doi = {10.1109/EUROSP53844.2022.00049}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/SalemWBMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ShenLTX0AM022, author = {Guangyu Shen and Yingqi Liu and Guanhong Tao and Qiuling Xu and Zhuo Zhang and Shengwei An and Shiqing Ma and Xiangyu Zhang}, editor = {Kamalika Chaudhuri and Stefanie Jegelka and Le Song and Csaba Szepesv{\'{a}}ri and Gang Niu and Sivan Sabato}, title = {Constrained Optimization with Dynamic Bound-scaling for Effective {NLP} Backdoor Defense}, booktitle = {International Conference on Machine Learning, {ICML} 2022, 17-23 July 2022, Baltimore, Maryland, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {162}, pages = {19879--19892}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v162/shen22e.html}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/ShenLTX0AM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/GaoZMSCW22, author = {Xuanqi Gao and Juan Zhai and Shiqing Ma and Chao Shen and Yufei Chen and Qian Wang}, title = {Fairneuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons}, booktitle = {44th {IEEE/ACM} 44th International Conference on Software Engineering, {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022}, pages = {921--933}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510003.3510087}, doi = {10.1145/3510003.3510087}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/GaoZMSCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictai/ZhangM22, author = {Brian Zhang and Shiqing Ma}, editor = {Marek Z. Reformat and Du Zhang and Nikolaos G. Bourbakis}, title = {Achieving Both Model Accuracy and Robustness by Adversarial Training with Batch Norm Shaping}, booktitle = {34th {IEEE} International Conference on Tools with Artificial Intelligence, {ICTAI} 2022, Macao, China, October 31 - November 2, 2022}, pages = {591--598}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICTAI56018.2022.00093}, doi = {10.1109/ICTAI56018.2022.00093}, timestamp = {Tue, 25 Apr 2023 16:51:01 +0200}, biburl = {https://dblp.org/rec/conf/ictai/ZhangM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangDZM22, author = {Zhenting Wang and Hailun Ding and Juan Zhai and Shiqing Ma}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Training with More Confidence: Mitigating Injected and Natural Backdoors During Training}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/ec0c9ca85b4ea49c7ebfb503cf55f2ae-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WangDZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangMDZM22, author = {Zhenting Wang and Kai Mei and Hailun Ding and Juan Zhai and Shiqing Ma}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Rethinking the Reverse-engineering of Trojan Triggers}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/3f9bf45ea04c98ad7cb857f951f499e2-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WangMDZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LiuSTAM022, author = {Yingqi Liu and Guangyu Shen and Guanhong Tao and Shengwei An and Shiqing Ma and Xiangyu Zhang}, title = {Piccolo: Exposing Complex Backdoors in {NLP} Transformer Models}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {2025--2042}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833579}, doi = {10.1109/SP46214.2022.9833579}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/LiuSTAM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/LiMXZ22, author = {Shaofeng Li and Shiqing Ma and Minhui Xue and Benjamin Zi Hao Zhao}, title = {Deep Learning Backdoors}, booktitle = {Security and Artificial Intelligence}, pages = {313--334}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-98795-4\_13}, doi = {10.1007/978-3-030-98795-4\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/LiMXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-05749, author = {Guangyu Shen and Yingqi Liu and Guanhong Tao and Qiuling Xu and Zhuo Zhang and Shengwei An and Shiqing Ma and Xiangyu Zhang}, title = {Constrained Optimization with Dynamic Bound-scaling for Effective NLPBackdoor Defense}, journal = {CoRR}, volume = {abs/2202.05749}, year = {2022}, url = {https://arxiv.org/abs/2202.05749}, eprinttype = {arXiv}, eprint = {2202.05749}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-05749.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-06382, author = {Zhenting Wang and Hailun Ding and Juan Zhai and Shiqing Ma}, title = {Neural Network Trojans Analysis and Mitigation from the Input Domain}, journal = {CoRR}, volume = {abs/2202.06382}, year = {2022}, url = {https://arxiv.org/abs/2202.06382}, eprinttype = {arXiv}, eprint = {2202.06382}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-06382.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-02567, author = {Xuanqi Gao and Juan Zhai and Shiqing Ma and Chao Shen and Yufei Chen and Qian Wang}, title = {FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons}, journal = {CoRR}, volume = {abs/2204.02567}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.02567}, doi = {10.48550/ARXIV.2204.02567}, eprinttype = {arXiv}, eprint = {2204.02567}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-02567.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-13383, author = {Zhenting Wang and Juan Zhai and Shiqing Ma}, title = {BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning}, journal = {CoRR}, volume = {abs/2205.13383}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.13383}, doi = {10.48550/ARXIV.2205.13383}, eprinttype = {arXiv}, eprint = {2205.13383}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-13383.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-11082, author = {Xiaoyi Chen and Baisong Xin and Shengfang Zhai and Shiqing Ma and Qingni Shen and Zhonghai Wu}, title = {Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via Contrastive Learning}, journal = {CoRR}, volume = {abs/2210.11082}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.11082}, doi = {10.48550/ARXIV.2210.11082}, eprinttype = {arXiv}, eprint = {2210.11082}, timestamp = {Tue, 25 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-11082.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-12873, author = {Kaiyuan Zhang and Guanhong Tao and Qiuling Xu and Siyuan Cheng and Shengwei An and Yingqi Liu and Shiwei Feng and Guangyu Shen and Pin{-}Yu Chen and Shiqing Ma and Xiangyu Zhang}, title = {{FLIP:} {A} Provable Defense Framework for Backdoor Mitigation in Federated Learning}, journal = {CoRR}, volume = {abs/2210.12873}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.12873}, doi = {10.48550/ARXIV.2210.12873}, eprinttype = {arXiv}, eprint = {2210.12873}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-12873.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-15127, author = {Zhenting Wang and Kai Mei and Hailun Ding and Juan Zhai and Shiqing Ma}, title = {Rethinking the Reverse-engineering of Trojan Triggers}, journal = {CoRR}, volume = {abs/2210.15127}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.15127}, doi = {10.48550/ARXIV.2210.15127}, eprinttype = {arXiv}, eprint = {2210.15127}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-15127.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-15929, author = {Guanhong Tao and Zhenting Wang and Siyuan Cheng and Shiqing Ma and Shengwei An and Yingqi Liu and Guangyu Shen and Zhuo Zhang and Yunshu Mao and Xiangyu Zhang}, title = {Backdoor Vulnerabilities in Normally Trained Deep Learning Models}, journal = {CoRR}, volume = {abs/2211.15929}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.15929}, doi = {10.48550/ARXIV.2211.15929}, eprinttype = {arXiv}, eprint = {2211.15929}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-15929.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/TianMWLCZ21, author = {Yongqiang Tian and Shiqing Ma and Ming Wen and Yepang Liu and Shing{-}Chi Cheung and Xiangyu Zhang}, title = {To what extent do DNN-based image classification models make unreliable inferences?}, journal = {Empir. Softw. Eng.}, volume = {26}, number = {4}, pages = {84}, year = {2021}, url = {https://doi.org/10.1007/s10664-021-09985-1}, doi = {10.1007/S10664-021-09985-1}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ese/TianMWLCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/0005LMZ21, author = {Siyuan Cheng and Yingqi Liu and Shiqing Ma and Xiangyu Zhang}, title = {Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification}, booktitle = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021}, pages = {1148--1156}, publisher = {{AAAI} Press}, year = {2021}, url = {https://doi.org/10.1609/aaai.v35i2.16201}, doi = {10.1609/AAAI.V35I2.16201}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/0005LMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chen0C0MSW021, author = {Xiaoyi Chen and Ahmed Salem and Dingfan Chen and Michael Backes and Shiqing Ma and Qingni Shen and Zhonghai Wu and Yang Zhang}, title = {BadNL: Backdoor Attacks against {NLP} Models with Semantic-preserving Improvements}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {554--569}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485837}, doi = {10.1145/3485832.3485837}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Chen0C0MSW021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ShenLTAX0M021, author = {Guangyu Shen and Yingqi Liu and Guanhong Tao and Shengwei An and Qiuling Xu and Siyuan Cheng and Shiqing Ma and Xiangyu Zhang}, editor = {Marina Meila and Tong Zhang}, title = {Backdoor Scanning for Deep Neural Networks through K-Arm Optimization}, booktitle = {Proceedings of the 38th International Conference on Machine Learning, {ICML} 2021, 18-24 July 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {139}, pages = {9525--9536}, publisher = {{PMLR}}, year = {2021}, url = {http://proceedings.mlr.press/v139/shen21c.html}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/ShenLTAX0M021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhangZMS21, author = {Xiaoyu Zhang and Juan Zhai and Shiqing Ma and Chao Shen}, title = {{AUTOTRAINER:} An Automatic {DNN} Training Problem Detection and Repair System}, booktitle = {43rd {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2021, Madrid, Spain, 22-30 May 2021}, pages = {359--371}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICSE43902.2021.00043}, doi = {10.1109/ICSE43902.2021.00043}, timestamp = {Sat, 06 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/ZhangZMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YuMZT0XULCYG21, author = {Le Yu and Shiqing Ma and Zhuo Zhang and Guanhong Tao and Xiangyu Zhang and Dongyan Xu and Vincent E. Urias and Han Wei Lin and Gabriela F. Ciocarlie and Vinod Yegneswaran and Ashish Gehani}, title = {ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/alchemist-fusing-application-and-audit-logs-for-precise-attack-provenance-without-instrumentation/}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/YuMZT0XULCYG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KavousiYMC21, author = {Mohammad Kavousi and Runqing Yang and Shiqing Ma and Yan Chen}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Shujun Li and Radha Poovendran and Herv{\'{e}} Debar and Moti Yung}, title = {SemFlow: Accurate Semantic Identification from Low-Level System Data}, booktitle = {Security and Privacy in Communication Networks - 17th {EAI} International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {398}, pages = {513--535}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90019-9\_26}, doi = {10.1007/978-3-030-90019-9\_26}, timestamp = {Thu, 04 Nov 2021 12:25:36 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KavousiYMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlsaheelNMYWC0X21, author = {Abdulellah Alsaheel and Yuhong Nan and Shiqing Ma and Le Yu and Gregory Walkup and Z. Berkay Celik and Xiangyu Zhang and Dongyan Xu}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ATLAS:} {A} Sequence-based Learning Approach for Attack Investigation}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3005--3022}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/alsaheel}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlsaheelNMYWC0X21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DingYZM21, author = {Hailun Ding and Shenao Yan and Juan Zhai and Shiqing Ma}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {{ELISE:} {A} Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {3023--3040}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/ding}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/DingYZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-05123, author = {Guangyu Shen and Yingqi Liu and Guanhong Tao and Shengwei An and Qiuling Xu and Siyuan Cheng and Shiqing Ma and Xiangyu Zhang}, title = {Backdoor Scanning for Deep Neural Networks through K-Arm Optimization}, journal = {CoRR}, volume = {abs/2102.05123}, year = {2021}, url = {https://arxiv.org/abs/2102.05123}, eprinttype = {arXiv}, eprint = {2102.05123}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-05123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-08820, author = {Yingqi Liu and Guangyu Shen and Guanhong Tao and Zhenting Wang and Shiqing Ma and Xiangyu Zhang}, title = {{EX-RAY:} Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry}, journal = {CoRR}, volume = {abs/2103.08820}, year = {2021}, url = {https://arxiv.org/abs/2103.08820}, eprinttype = {arXiv}, eprint = {2103.08820}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-08820.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-09999, author = {Bao Gia Doan and Minhui Xue and Shiqing Ma and Ehsan Abbasnejad and Damith C. Ranasinghe}, title = {TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems}, journal = {CoRR}, volume = {abs/2111.09999}, year = {2021}, url = {https://arxiv.org/abs/2111.09999}, eprinttype = {arXiv}, eprint = {2111.09999}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-09999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-02819, author = {Yongqiang Tian and Wuqi Zhang and Ming Wen and Shing{-}Chi Cheung and Chengnian Sun and Shiqing Ma and Yu Jiang}, title = {Fast Test Input Generation for Finding Deviated Behaviors in Compressed Deep Neural Network}, journal = {CoRR}, volume = {abs/2112.02819}, year = {2021}, url = {https://arxiv.org/abs/2112.02819}, eprinttype = {arXiv}, eprint = {2112.02819}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-02819.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/TaoMLXZ20, author = {Guanhong Tao and Shiqing Ma and Yingqi Liu and Qiuling Xu and Xiangyu Zhang}, editor = {Gregg Rothermel and Doo{-}Hwan Bae}, title = {{TRADER:} trace divergence analysis and embedding regulation for debugging recurrent neural networks}, booktitle = {{ICSE} '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020}, pages = {986--998}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377811.3380423}, doi = {10.1145/3377811.3380423}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/TaoMLXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhaiXSTPMXZTZ20, author = {Juan Zhai and Xiangzhe Xu and Yu Shi and Guanhong Tao and Minxue Pan and Shiqing Ma and Lei Xu and Weifeng Zhang and Lin Tan and Xiangyu Zhang}, editor = {Gregg Rothermel and Doo{-}Hwan Bae}, title = {{CPC:} automatically classifying and propagating natural language comments via program analysis}, booktitle = {{ICSE} '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020}, pages = {1359--1371}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3377811.3380427}, doi = {10.1145/3377811.3380427}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/ZhaiXSTPMXZTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/ZhangSZM20, author = {Yang Zhang and Shuai Shao and Juan Zhai and Shiqing Ma}, editor = {Sarfraz Khurshid and Corina S. Pasareanu}, title = {FineLock: automatically refactoring coarse-grained locks into fine-grained locks}, booktitle = {{ISSTA} '20: 29th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Virtual Event, USA, July 18-22, 2020}, pages = {565--568}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3395363.3404368}, doi = {10.1145/3395363.3404368}, timestamp = {Wed, 15 Jul 2020 15:59:31 +0200}, biburl = {https://dblp.org/rec/conf/issta/ZhangSZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YangMXZ020, author = {Runqing Yang and Shiqing Ma and Haitao Xu and Xiangyu Zhang and Yan Chen}, title = {UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for {GUI} Applications}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/uiscope-accurate-instrumentation-free-and-visible-attack-investigation-for-gui-applications/}, timestamp = {Thu, 05 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/YangMXZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ZhaiSPZLFM0020, author = {Juan Zhai and Yu Shi and Minxue Pan and Guian Zhou and Yongxiang Liu and Chunrong Fang and Shiqing Ma and Lin Tan and Xiangyu Zhang}, editor = {Prem Devanbu and Myra B. Cohen and Thomas Zimmermann}, title = {{C2S:} translating natural language comments to formal program specifications}, booktitle = {{ESEC/FSE} '20: 28th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual Event, USA, November 8-13, 2020}, pages = {25--37}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3368089.3409716}, doi = {10.1145/3368089.3409716}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/ZhaiSPZLFM0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/YanTLZMX020, author = {Shenao Yan and Guanhong Tao and Xuwei Liu and Juan Zhai and Shiqing Ma and Lei Xu and Xiangyu Zhang}, editor = {Prem Devanbu and Myra B. Cohen and Thomas Zimmermann}, title = {Correlations between deep neural network model coverage criteria and model quality}, booktitle = {{ESEC/FSE} '20: 28th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Virtual Event, USA, November 8-13, 2020}, pages = {775--787}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3368089.3409671}, doi = {10.1145/3368089.3409671}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/YanTLZMX020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-03675, author = {Ahmed Salem and Rui Wen and Michael Backes and Shiqing Ma and Yang Zhang}, title = {Dynamic Backdoor Attacks Against Machine Learning Models}, journal = {CoRR}, volume = {abs/2003.03675}, year = {2020}, url = {https://arxiv.org/abs/2003.03675}, eprinttype = {arXiv}, eprint = {2003.03675}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-03675.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-01043, author = {Xiaoyi Chen and Ahmed Salem and Michael Backes and Shiqing Ma and Yang Zhang}, title = {BadNL: Backdoor Attacks Against {NLP} Models}, journal = {CoRR}, volume = {abs/2006.01043}, year = {2020}, url = {https://arxiv.org/abs/2006.01043}, eprinttype = {arXiv}, eprint = {2006.01043}, timestamp = {Wed, 19 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-01043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-08273, author = {Shaofeng Li and Shiqing Ma and Minhui Xue and Benjamin Zi Hao Zhao}, title = {Deep Learning Backdoors}, journal = {CoRR}, volume = {abs/2007.08273}, year = {2020}, url = {https://arxiv.org/abs/2007.08273}, eprinttype = {arXiv}, eprint = {2007.08273}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-08273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-11212, author = {Siyuan Cheng and Yingqi Liu and Shiqing Ma and Xiangyu Zhang}, title = {Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification}, journal = {CoRR}, volume = {abs/2012.11212}, year = {2020}, url = {https://arxiv.org/abs/2012.11212}, eprinttype = {arXiv}, eprint = {2012.11212}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-11212.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuLTMAZ19, author = {Yingqi Liu and Wen{-}Chuan Lee and Guanhong Tao and Shiqing Ma and Yousra Aafer and Xiangyu Zhang}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{ABS:} Scanning Neural Networks for Back-doors by Artificial Brain Stimulation}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1265--1282}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363216}, doi = {10.1145/3319535.3363216}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuLTMAZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgo/LeeLLMCZ019, author = {Wen{-}Chuan Lee and Yingqi Liu and Peng Liu and Shiqing Ma and Hongjun Choi and Xiangyu Zhang and Rajiv Gupta}, editor = {Mahmut Taylan Kandemir and Alexandra Jimborean and Tipp Moseley}, title = {White-Box Program Tuning}, booktitle = {{IEEE/ACM} International Symposium on Code Generation and Optimization, {CGO} 2019, Washington, DC, USA, February 16-20, 2019}, pages = {122--135}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CGO.2019.8661177}, doi = {10.1109/CGO.2019.8661177}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cgo/LeeLLMCZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/YouLMPZ019, author = {Wei You and Xuwei Liu and Shiqing Ma and David Mitchel Perry and Xiangyu Zhang and Bin Liang}, editor = {Joanne M. Atlee and Tevfik Bultan and Jon Whittle}, title = {{SLF:} fuzzing without valid seed inputs}, booktitle = {Proceedings of the 41st International Conference on Software Engineering, {ICSE} 2019, Montreal, QC, Canada, May 25-31, 2019}, pages = {712--723}, publisher = {{IEEE} / {ACM}}, year = {2019}, url = {https://doi.org/10.1109/ICSE.2019.00080}, doi = {10.1109/ICSE.2019.00080}, timestamp = {Tue, 24 May 2022 15:28:49 +0200}, biburl = {https://dblp.org/rec/conf/icse/YouLMPZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MaLTL019, author = {Shiqing Ma and Yingqi Liu and Guanhong Tao and Wen{-}Chuan Lee and Xiangyu Zhang}, title = {{NIC:} Detecting Adversarial Samples with Neural Network Invariant Checking}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/nic-detecting-adversarial-samples-with-neural-network-invariant-checking/}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/MaLTL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/LeeLLMZ19, author = {Wen{-}Chuan Lee and Peng Liu and Yingqi Liu and Shiqing Ma and Xiangyu Zhang}, editor = {Kathryn S. McKinley and Kathleen Fisher}, title = {Programming support for autonomizing software}, booktitle = {Proceedings of the 40th {ACM} {SIGPLAN} Conference on Programming Language Design and Implementation, {PLDI} 2019, Phoenix, AZ, USA, June 22-26, 2019}, pages = {702--716}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314221.3314593}, doi = {10.1145/3314221.3314593}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pldi/LeeLLMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YouWMHZ0019, author = {Wei You and Xueqiang Wang and Shiqing Ma and Jianjun Huang and Xiangyu Zhang and XiaoFeng Wang and Bin Liang}, title = {ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {769--786}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00057}, doi = {10.1109/SP.2019.00057}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/YouWMHZ0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-03824, author = {Yongqiang Tian and Shiqing Ma and Ming Wen and Yepang Liu and Shing{-}Chi Cheung and Xiangyu Zhang}, title = {Testing Deep Learning Models for Image Analysis Using Object-Relevant Metamorphic Relations}, journal = {CoRR}, volume = {abs/1909.03824}, year = {2019}, url = {http://arxiv.org/abs/1909.03824}, eprinttype = {arXiv}, eprint = {1909.03824}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-03824.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangKMZX18, author = {Fei Wang and Yonghwi Kwon and Shiqing Ma and Xiangyu Zhang and Dongyan Xu}, title = {Lprov: Practical Library-aware Provenance Tracing}, booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference, {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018}, pages = {605--617}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3274694.3274751}, doi = {10.1145/3274694.3274751}, timestamp = {Wed, 19 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/WangKMZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/XuMZZX18, author = {Zhaogui Xu and Shiqing Ma and Xiangyu Zhang and Shuofei Zhu and Baowen Xu}, editor = {Michel Chaudron and Ivica Crnkovic and Marsha Chechik and Mark Harman}, title = {Debugging with intelligence via probabilistic inference}, booktitle = {Proceedings of the 40th International Conference on Software Engineering, {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018}, pages = {1171--1181}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3180155.3180237}, doi = {10.1145/3180155.3180237}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/XuMZZX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/TangZPAM0Z18, author = {Zhenhao Tang and Juan Zhai and Minxue Pan and Yousra Aafer and Shiqing Ma and Xiangyu Zhang and Jianhua Zhao}, editor = {Marianne Huchard and Christian K{\"{a}}stner and Gordon Fraser}, title = {Dual-force: understanding WebView malware via cross-language forced execution}, booktitle = {Proceedings of the 33rd {ACM/IEEE} International Conference on Automated Software Engineering, {ASE} 2018, Montpellier, France, September 3-7, 2018}, pages = {714--725}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3238147.3238221}, doi = {10.1145/3238147.3238221}, timestamp = {Thu, 23 Jun 2022 19:54:17 +0200}, biburl = {https://dblp.org/rec/conf/kbse/TangZPAM0Z18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Kwon0WLLM0XJCGY18, author = {Yonghwi Kwon and Fei Wang and Weihang Wang and Kyu Hyung Lee and Wen{-}Chuan Lee and Shiqing Ma and Xiangyu Zhang and Dongyan Xu and Somesh Jha and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran}, title = {{MCI} : Modeling-based Causality Inference in Audit Logging for Attack Investigation}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07B-2\_Kwon\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Kwon0WLLM0XJCGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/LiuMALZW018, author = {Yingqi Liu and Shiqing Ma and Yousra Aafer and Wen{-}Chuan Lee and Juan Zhai and Weihang Wang and Xiangyu Zhang}, title = {Trojaning Attack on Neural Networks}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03A-5\_Liu\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/LiuMALZW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/TaoMLZ18, author = {Guanhong Tao and Shiqing Ma and Yingqi Liu and Xiangyu Zhang}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {7728--7739}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/b994697479c5716eda77e8e9713e5f0f-Abstract.html}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/TaoMLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/MaLLZG18, author = {Shiqing Ma and Yingqi Liu and Wen{-}Chuan Lee and Xiangyu Zhang and Ananth Grama}, editor = {Gary T. Leavens and Alessandro Garcia and Corina S. Pasareanu}, title = {{MODE:} automated neural network model debugging via state differential analysis and input selection}, booktitle = {Proceedings of the 2018 {ACM} Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/SIGSOFT} {FSE} 2018, Lake Buena Vista, FL, USA, November 04-09, 2018}, pages = {175--186}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3236024.3236082}, doi = {10.1145/3236024.3236082}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/MaLLZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/MaZKL0CGYXJ18, author = {Shiqing Ma and Juan Zhai and Yonghwi Kwon and Kyu Hyung Lee and Xiangyu Zhang and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran and Dongyan Xu and Somesh Jha}, editor = {Haryadi S. Gunawi and Benjamin C. Reed}, title = {Kernel-Supported Cost-Effective Audit Logging for Causality Tracking}, booktitle = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston, MA, USA, July 11-13, 2018}, pages = {241--254}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/atc18/presentation/ma-shiqing}, timestamp = {Sat, 25 Feb 2023 23:39:37 +0100}, biburl = {https://dblp.org/rec/conf/usenix/MaZKL0CGYXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-11580, author = {Guanhong Tao and Shiqing Ma and Yingqi Liu and Xiangyu Zhang}, title = {Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples}, journal = {CoRR}, volume = {abs/1810.11580}, year = {2018}, url = {http://arxiv.org/abs/1810.11580}, eprinttype = {arXiv}, eprint = {1810.11580}, timestamp = {Tue, 29 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-11580.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangMZRYH17, author = {Chonghua Wang and Shiqing Ma and Xiangyu Zhang and Junghwan Rhee and Xiaochun Yun and Zhiyu Hao}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware}, booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, pages = {778--792}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78813-5\_42}, doi = {10.1007/978-3-319-78813-5\_42}, timestamp = {Wed, 22 Dec 2021 13:40:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/WangMZRYH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/MaAXLZLZ17, author = {Shiqing Ma and Yousra Aafer and Zhaogui Xu and Wen{-}Chuan Lee and Juan Zhai and Yingqi Liu and Xiangyu Zhang}, editor = {Eric Bodden and Wilhelm Sch{\"{a}}fer and Arie van Deursen and Andrea Zisman}, title = {{LAMP:} data provenance for graph based machine learning algorithms through derivative computation}, booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017}, pages = {786--797}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3106237.3106291}, doi = {10.1145/3106237.3106291}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/MaAXLZLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MaZ0LZX17, author = {Shiqing Ma and Juan Zhai and Fei Wang and Kyu Hyung Lee and Xiangyu Zhang and Dongyan Xu}, editor = {Engin Kirda and Thomas Ristenpart}, title = {{MPI:} Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1111--1128}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ma}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/MaZ0LZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PeiGSM0ZSZX16, author = {Kexin Pei and Zhongshu Gu and Brendan Saltaformaggio and Shiqing Ma and Fei Wang and Zhiwei Zhang and Luo Si and Xiangyu Zhang and Dongyan Xu}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {{HERCULE:} attack story reconstruction via community discovery on correlated log graph}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {583--595}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991122}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PeiGSM0ZSZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhaiHMZTZQ16, author = {Juan Zhai and Jianjun Huang and Shiqing Ma and Xiangyu Zhang and Lin Tan and Jianhua Zhao and Feng Qin}, editor = {Laura K. Dillon and Willem Visser and Laurie A. Williams}, title = {Automatic model generation from documentation for Java {API} functions}, booktitle = {Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016}, pages = {380--391}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2884781.2884881}, doi = {10.1145/2884781.2884881}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/ZhaiHMZTZQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MaZX16, author = {Shiqing Ma and Xiangyu Zhang and Dongyan Xu}, title = {ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/protracer-towards-practical-provenance-tracing-alternating-logging-tainting.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/MaZX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MaLKRZX15, author = {Shiqing Ma and Kyu Hyung Lee and Chung Hwan Kim and Junghwan Rhee and Xiangyu Zhang and Dongyan Xu}, title = {Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows}, booktitle = {Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015}, pages = {401--410}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2818000.2818039}, doi = {10.1145/2818000.2818039}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MaLKRZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.