BibTeX records: Shiqing Ma

download as .bib file

@inproceedings{DBLP:conf/aaai/AnC0X0S0MCHZ24,
  author       = {Shengwei An and
                  Sheng{-}Yen Chou and
                  Kaiyuan Zhang and
                  Qiuling Xu and
                  Guanhong Tao and
                  Guangyu Shen and
                  Siyuan Cheng and
                  Shiqing Ma and
                  Pin{-}Yu Chen and
                  Tsung{-}Yi Ho and
                  Xiangyu Zhang},
  editor       = {Michael J. Wooldridge and
                  Jennifer G. Dy and
                  Sriraam Natarajan},
  title        = {Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution
                  Shift},
  booktitle    = {Thirty-Eighth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2024, Thirty-Sixth Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2024, Fourteenth Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2014, February 20-27, 2024, Vancouver,
                  Canada},
  pages        = {10847--10855},
  publisher    = {{AAAI} Press},
  year         = {2024},
  url          = {https://doi.org/10.1609/aaai.v38i10.28958},
  doi          = {10.1609/AAAI.V38I10.28958},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/AnC0X0S0MCHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-00379,
  author       = {Xiaoyu Zhang and
                  Juan Zhai and
                  Shiqing Ma and
                  Chao Shen},
  title        = {{DREAM:} Debugging and Repairing AutoML Pipelines},
  journal      = {CoRR},
  volume       = {abs/2401.00379},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.00379},
  doi          = {10.48550/ARXIV.2401.00379},
  eprinttype    = {arXiv},
  eprint       = {2401.00379},
  timestamp    = {Mon, 15 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-00379.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-05467,
  author       = {Guangyu Shen and
                  Siyuan Cheng and
                  Kaiyuan Zhang and
                  Guanhong Tao and
                  Shengwei An and
                  Lu Yan and
                  Zhuo Zhang and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation
                  and Echopraxia},
  journal      = {CoRR},
  volume       = {abs/2402.05467},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.05467},
  doi          = {10.48550/ARXIV.2402.05467},
  eprinttype    = {arXiv},
  eprint       = {2402.05467},
  timestamp    = {Wed, 14 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-05467.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-02437,
  author       = {Hyejun Jeong and
                  Shiqing Ma and
                  Amir Houmansadr},
  title        = {SoK: Challenges and Opportunities in Federated Unlearning},
  journal      = {CoRR},
  volume       = {abs/2403.02437},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.02437},
  doi          = {10.48550/ARXIV.2403.02437},
  eprinttype    = {arXiv},
  eprint       = {2403.02437},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-02437.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-17188,
  author       = {Siyuan Cheng and
                  Guanhong Tao and
                  Yingqi Liu and
                  Guangyu Shen and
                  Shengwei An and
                  Shiwei Feng and
                  Xiangzhe Xu and
                  Kaiyuan Zhang and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {{LOTUS:} Evasive and Resilient Backdoor Attacks through Sub-Partitioning},
  journal      = {CoRR},
  volume       = {abs/2403.17188},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.17188},
  doi          = {10.48550/ARXIV.2403.17188},
  eprinttype    = {arXiv},
  eprint       = {2403.17188},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-17188.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/TianZWCSMJ23,
  author       = {Yongqiang Tian and
                  Wuqi Zhang and
                  Ming Wen and
                  Shing{-}Chi Cheung and
                  Chengnian Sun and
                  Shiqing Ma and
                  Yu Jiang},
  title        = {Finding Deviated Behaviors of the Compressed {DNN} Models for Image
                  Classifications},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {32},
  number       = {5},
  pages        = {128:1--128:32},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583564},
  doi          = {10.1145/3583564},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/TianZWCSMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/AlhanahnahMGCYJZ23,
  author       = {Mohannad Alhanahnah and
                  Shiqing Ma and
                  Ashish Gehani and
                  Gabriela F. Ciocarlie and
                  Vinod Yegneswaran and
                  Somesh Jha and
                  Xiangyu Zhang},
  title        = {autoMPI: Automated Multiple Perspective Attack Investigation With
                  Semantics Aware Execution Partitioning},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {4},
  pages        = {2761--2775},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3231242},
  doi          = {10.1109/TSE.2022.3231242},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/AlhanahnahMGCYJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/MeiLWZM23,
  author       = {Kai Mei and
                  Zheng Li and
                  Zhenting Wang and
                  Yang Zhang and
                  Shiqing Ma},
  editor       = {Anna Rogers and
                  Jordan L. Boyd{-}Graber and
                  Naoaki Okazaki},
  title        = {{NOTABLE:} Transferable Backdoor Attacks Against Prompt-based {NLP}
                  Models},
  booktitle    = {Proceedings of the 61st Annual Meeting of the Association for Computational
                  Linguistics (Volume 1: Long Papers), {ACL} 2023, Toronto, Canada,
                  July 9-14, 2023},
  pages        = {15551--15565},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.acl-long.867},
  doi          = {10.18653/V1/2023.ACL-LONG.867},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/MeiLWZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/0002T0SXL0M023,
  author       = {Shiwei Feng and
                  Guanhong Tao and
                  Siyuan Cheng and
                  Guangyu Shen and
                  Xiangzhe Xu and
                  Yingqi Liu and
                  Kaiyuan Zhang and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Detecting Backdoors in Pre-trained Encoders},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2023, Vancouver, BC, Canada, June 17-24, 2023},
  pages        = {16352--16362},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CVPR52729.2023.01569},
  doi          = {10.1109/CVPR52729.2023.01569},
  timestamp    = {Wed, 30 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/0002T0SXL0M023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/DingCHTMZ23,
  author       = {Aolin Ding and
                  Matthew Chan and
                  Amin Hass and
                  Nils Ole Tippenhauer and
                  Shiqing Ma and
                  Saman A. Zonouz},
  title        = {Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment
                  of Robotic Aerial Vehicles},
  booktitle    = {53rd Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Network, {DSN} 2023, Porto, Portugal, June 27-30, 2023},
  pages        = {67--80},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSN58367.2023.00020},
  doi          = {10.1109/DSN58367.2023.00020},
  timestamp    = {Tue, 15 Aug 2023 11:43:57 +0200},
  biburl       = {https://dblp.org/rec/conf/dsn/DingCHTMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/0002TX0AL0SCM023,
  author       = {Kaiyuan Zhang and
                  Guanhong Tao and
                  Qiuling Xu and
                  Siyuan Cheng and
                  Shengwei An and
                  Yingqi Liu and
                  Shiwei Feng and
                  Guangyu Shen and
                  Pin{-}Yu Chen and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {{FLIP:} {A} Provable Defense Framework for Backdoor Mitigation in
                  Federated Learning},
  booktitle    = {The Eleventh International Conference on Learning Representations,
                  {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023},
  publisher    = {OpenReview.net},
  year         = {2023},
  url          = {https://openreview.net/pdf?id=Xo2E217\_M4n},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/0002TX0AL0SCM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/WangMZM23,
  author       = {Zhenting Wang and
                  Kai Mei and
                  Juan Zhai and
                  Shiqing Ma},
  title        = {{UNICORN:} {A} Unified Backdoor Trigger Inversion Framework},
  booktitle    = {The Eleventh International Conference on Learning Representations,
                  {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023},
  publisher    = {OpenReview.net},
  year         = {2023},
  url          = {https://openreview.net/pdf?id=Mj7K4lglGyj},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/WangMZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/GaoZM00W23,
  author       = {Xuanqi Gao and
                  Juan Zhai and
                  Shiqing Ma and
                  Chao Shen and
                  Yufei Chen and
                  Shiwei Wang},
  editor       = {Ren{\'{e}} Just and
                  Gordon Fraser},
  title        = {{CILIATE:} Towards Fairer Class-Based Incremental Learning by Dataset
                  and Training Refinement},
  booktitle    = {Proceedings of the 32nd {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, {ISSTA} 2023, Seattle, WA, USA, July
                  17-21, 2023},
  pages        = {475--487},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3597926.3598071},
  doi          = {10.1145/3597926.3598071},
  timestamp    = {Mon, 17 Jul 2023 11:49:17 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/GaoZM00W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/0005TLAX0S0XM023,
  author       = {Siyuan Cheng and
                  Guanhong Tao and
                  Yingqi Liu and
                  Shengwei An and
                  Xiangzhe Xu and
                  Shiwei Feng and
                  Guangyu Shen and
                  Kaiyuan Zhang and
                  Qiuling Xu and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {{BEAGLE:} Forensics of Deep Learning Backdoor Attack for Better Defense},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/beagle-forensics-of-deep-learning-backdoor-attack-for-better-defense/},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/0005TLAX0S0XM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/Shen000LAM023,
  author       = {Guangyu Shen and
                  Siyuan Cheng and
                  Guanhong Tao and
                  Kaiyuan Zhang and
                  Yingqi Liu and
                  Shengwei An and
                  Shiqing Ma and
                  Xiangyu Zhang},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {Django: Detecting Trojans in Object Detection Models via Gaussian
                  Focus Calibration},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/a102d6cb996be3482c059c1e18bbe523-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/Shen000LAM023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/Wang0ZLM23,
  author       = {Zhenting Wang and
                  Chen Chen and
                  Yi Zeng and
                  Lingjuan Lyu and
                  Shiqing Ma},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {Where Did {I} Come From? Origin Attribution of AI-Generated Images},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/ebb4c188fafe7da089b41a9f615ad84d-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/Wang0ZLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AnYXMTCZLSKZ23,
  author       = {Shengwei An and
                  Yuan Yao and
                  Qiuling Xu and
                  Shiqing Ma and
                  Guanhong Tao and
                  Siyuan Cheng and
                  Kaiyuan Zhang and
                  Yingqi Liu and
                  Guangyu Shen and
                  Ian Kelk and
                  Xiangyu Zhang},
  title        = {ImU: Physical Impersonating Attack for Face Recognition System with
                  Natural Style Changes},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {899--916},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179360},
  doi          = {10.1109/SP46215.2023.10179360},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AnYXMTCZLSKZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WuM0L00R23,
  author       = {Xinghui Wu and
                  Shiqing Ma and
                  Chao Shen and
                  Chenhao Lin and
                  Qian Wang and
                  Qi Li and
                  Yuan Rao},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{KENKU:} Towards Efficient and Stealthy Black-box Adversarial Attacks
                  against {ASR} Systems},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {247--264},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/wu-xinghui},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/WuM0L00R23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DingZNM23,
  author       = {Hailun Ding and
                  Juan Zhai and
                  Yuhong Nan and
                  Shiqing Ma},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {{AIRTAG:} Towards Automated Attack Investigation by Unsupervised Learning
                  with Log Texts},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {373--390},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/ding-hailun-airtag},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DingZNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DingZ0M23,
  author       = {Hailun Ding and
                  Juan Zhai and
                  Dong Deng and
                  Shiqing Ma},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {The Case for Learned Provenance Graph Storage Systems},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3277--3294},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/ding-hailun-provenance},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DingZ0M23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-06241,
  author       = {Siyuan Cheng and
                  Guanhong Tao and
                  Yingqi Liu and
                  Shengwei An and
                  Xiangzhe Xu and
                  Shiwei Feng and
                  Guangyu Shen and
                  Kaiyuan Zhang and
                  Qiuling Xu and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {{BEAGLE:} Forensics of Deep Learning Backdoor Attack for Better Defense},
  journal      = {CoRR},
  volume       = {abs/2301.06241},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.06241},
  doi          = {10.48550/ARXIV.2301.06241},
  eprinttype    = {arXiv},
  eprint       = {2301.06241},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-06241.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-12318,
  author       = {Rui Zhu and
                  Di Tang and
                  Siyuan Tang and
                  Guanhong Tao and
                  Shiqing Ma and
                  XiaoFeng Wang and
                  Haixu Tang},
  title        = {Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering},
  journal      = {CoRR},
  volume       = {abs/2301.12318},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.12318},
  doi          = {10.48550/ARXIV.2301.12318},
  eprinttype    = {arXiv},
  eprint       = {2301.12318},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-12318.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-15180,
  author       = {Shiwei Feng and
                  Guanhong Tao and
                  Siyuan Cheng and
                  Guangyu Shen and
                  Xiangzhe Xu and
                  Yingqi Liu and
                  Kaiyuan Zhang and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Detecting Backdoors in Pre-trained Encoders},
  journal      = {CoRR},
  volume       = {abs/2303.15180},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.15180},
  doi          = {10.48550/ARXIV.2303.15180},
  eprinttype    = {arXiv},
  eprint       = {2303.15180},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-15180.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-02786,
  author       = {Zhenting Wang and
                  Kai Mei and
                  Juan Zhai and
                  Shiqing Ma},
  title        = {{UNICORN:} {A} Unified Backdoor Trigger Inversion Framework},
  journal      = {CoRR},
  volume       = {abs/2304.02786},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.02786},
  doi          = {10.48550/ARXIV.2304.02786},
  eprinttype    = {arXiv},
  eprint       = {2304.02786},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-02786.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-04222,
  author       = {Xuanqi Gao and
                  Juan Zhai and
                  Shiqing Ma and
                  Chao Shen and
                  Yufei Chen and
                  Shiwei Wang},
  title        = {{CILIATE:} Towards Fairer Class-based Incremental Learning by Dataset
                  and Training Refinement},
  journal      = {CoRR},
  volume       = {abs/2304.04222},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.04222},
  doi          = {10.48550/ARXIV.2304.04222},
  eprinttype    = {arXiv},
  eprint       = {2304.04222},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-04222.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-17826,
  author       = {Kai Mei and
                  Zheng Li and
                  Zhenting Wang and
                  Yang Zhang and
                  Shiqing Ma},
  title        = {{NOTABLE:} Transferable Backdoor Attacks Against Prompt-based {NLP}
                  Models},
  journal      = {CoRR},
  volume       = {abs/2305.17826},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.17826},
  doi          = {10.48550/ARXIV.2305.17826},
  eprinttype    = {arXiv},
  eprint       = {2305.17826},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-17826.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-18439,
  author       = {Zhenting Wang and
                  Chen Chen and
                  Yi Zeng and
                  Lingjuan Lyu and
                  Shiqing Ma},
  title        = {Alteration-free and Model-agnostic Origin Attribution of Generated
                  Images},
  journal      = {CoRR},
  volume       = {abs/2305.18439},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.18439},
  doi          = {10.48550/ARXIV.2305.18439},
  eprinttype    = {arXiv},
  eprint       = {2305.18439},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-18439.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-03108,
  author       = {Zhenting Wang and
                  Chen Chen and
                  Yuchen Liu and
                  Lingjuan Lyu and
                  Dimitris N. Metaxas and
                  Shiqing Ma},
  title        = {How to Detect Unauthorized Data Usages in Text-to-image Diffusion
                  Models},
  journal      = {CoRR},
  volume       = {abs/2307.03108},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.03108},
  doi          = {10.48550/ARXIV.2307.03108},
  eprinttype    = {arXiv},
  eprint       = {2307.03108},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-03108.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-00050,
  author       = {Shengwei An and
                  Sheng{-}Yen Chou and
                  Kaiyuan Zhang and
                  Qiuling Xu and
                  Guanhong Tao and
                  Guangyu Shen and
                  Siyuan Cheng and
                  Shiqing Ma and
                  Pin{-}Yu Chen and
                  Tsung{-}Yi Ho and
                  Xiangyu Zhang},
  title        = {Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution
                  Shift},
  journal      = {CoRR},
  volume       = {abs/2312.00050},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.00050},
  doi          = {10.48550/ARXIV.2312.00050},
  eprinttype    = {arXiv},
  eprint       = {2312.00050},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-00050.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DoanXMAR22,
  author       = {Bao Gia Doan and
                  Minhui Xue and
                  Shiqing Ma and
                  Ehsan Abbasnejad and
                  Damith C. Ranasinghe},
  title        = {TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep
                  Neural Network Systems},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {3816--3830},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3198857},
  doi          = {10.1109/TIFS.2022.3198857},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/DoanXMAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/TaoSLAXML022,
  author       = {Guanhong Tao and
                  Guangyu Shen and
                  Yingqi Liu and
                  Shengwei An and
                  Qiuling Xu and
                  Shiqing Ma and
                  Pan Li and
                  Xiangyu Zhang},
  title        = {Better Trigger Inversion Optimization in Backdoor Scanning},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {13358--13368},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.01301},
  doi          = {10.1109/CVPR52688.2022.01301},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/TaoSLAXML022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/LiuSTWM022,
  author       = {Yingqi Liu and
                  Guangyu Shen and
                  Guanhong Tao and
                  Zhenting Wang and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Complex Backdoor Detection by Symmetric Feature Differencing},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {14983--14993},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.01458},
  doi          = {10.1109/CVPR52688.2022.01458},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/LiuSTWM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/WangZM22,
  author       = {Zhenting Wang and
                  Juan Zhai and
                  Shiqing Ma},
  title        = {BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural
                  Networks via Image Quantization and Contrastive Adversarial Learning},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {15054--15063},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.01465},
  doi          = {10.1109/CVPR52688.2022.01465},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cvpr/WangZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SalemWBMZ22,
  author       = {Ahmed Salem and
                  Rui Wen and
                  Michael Backes and
                  Shiqing Ma and
                  Yang Zhang},
  title        = {Dynamic Backdoor Attacks Against Machine Learning Models},
  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022, Genoa, Italy, June 6-10, 2022},
  pages        = {703--718},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSP53844.2022.00049},
  doi          = {10.1109/EUROSP53844.2022.00049},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/SalemWBMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/ShenLTX0AM022,
  author       = {Guangyu Shen and
                  Yingqi Liu and
                  Guanhong Tao and
                  Qiuling Xu and
                  Zhuo Zhang and
                  Shengwei An and
                  Shiqing Ma and
                  Xiangyu Zhang},
  editor       = {Kamalika Chaudhuri and
                  Stefanie Jegelka and
                  Le Song and
                  Csaba Szepesv{\'{a}}ri and
                  Gang Niu and
                  Sivan Sabato},
  title        = {Constrained Optimization with Dynamic Bound-scaling for Effective
                  {NLP} Backdoor Defense},
  booktitle    = {International Conference on Machine Learning, {ICML} 2022, 17-23 July
                  2022, Baltimore, Maryland, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {162},
  pages        = {19879--19892},
  publisher    = {{PMLR}},
  year         = {2022},
  url          = {https://proceedings.mlr.press/v162/shen22e.html},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/ShenLTX0AM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GaoZMSCW22,
  author       = {Xuanqi Gao and
                  Juan Zhai and
                  Shiqing Ma and
                  Chao Shen and
                  Yufei Chen and
                  Qian Wang},
  title        = {Fairneuron: Improving Deep Neural Network Fairness with Adversary
                  Games on Selective Neurons},
  booktitle    = {44th {IEEE/ACM} 44th International Conference on Software Engineering,
                  {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022},
  pages        = {921--933},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510003.3510087},
  doi          = {10.1145/3510003.3510087},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/GaoZMSCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/ZhangM22,
  author       = {Brian Zhang and
                  Shiqing Ma},
  editor       = {Marek Z. Reformat and
                  Du Zhang and
                  Nikolaos G. Bourbakis},
  title        = {Achieving Both Model Accuracy and Robustness by Adversarial Training
                  with Batch Norm Shaping},
  booktitle    = {34th {IEEE} International Conference on Tools with Artificial Intelligence,
                  {ICTAI} 2022, Macao, China, October 31 - November 2, 2022},
  pages        = {591--598},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICTAI56018.2022.00093},
  doi          = {10.1109/ICTAI56018.2022.00093},
  timestamp    = {Tue, 25 Apr 2023 16:51:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ictai/ZhangM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangDZM22,
  author       = {Zhenting Wang and
                  Hailun Ding and
                  Juan Zhai and
                  Shiqing Ma},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {Training with More Confidence: Mitigating Injected and Natural Backdoors
                  During Training},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/ec0c9ca85b4ea49c7ebfb503cf55f2ae-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/WangDZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangMDZM22,
  author       = {Zhenting Wang and
                  Kai Mei and
                  Hailun Ding and
                  Juan Zhai and
                  Shiqing Ma},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {Rethinking the Reverse-engineering of Trojan Triggers},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/3f9bf45ea04c98ad7cb857f951f499e2-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/WangMDZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LiuSTAM022,
  author       = {Yingqi Liu and
                  Guangyu Shen and
                  Guanhong Tao and
                  Shengwei An and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Piccolo: Exposing Complex Backdoors in {NLP} Transformer Models},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {2025--2042},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833579},
  doi          = {10.1109/SP46214.2022.9833579},
  timestamp    = {Thu, 21 Sep 2023 15:57:27 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LiuSTAM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/LiMXZ22,
  author       = {Shaofeng Li and
                  Shiqing Ma and
                  Minhui Xue and
                  Benjamin Zi Hao Zhao},
  title        = {Deep Learning Backdoors},
  booktitle    = {Security and Artificial Intelligence},
  pages        = {313--334},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-98795-4\_13},
  doi          = {10.1007/978-3-030-98795-4\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/LiMXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-05749,
  author       = {Guangyu Shen and
                  Yingqi Liu and
                  Guanhong Tao and
                  Qiuling Xu and
                  Zhuo Zhang and
                  Shengwei An and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Constrained Optimization with Dynamic Bound-scaling for Effective
                  NLPBackdoor Defense},
  journal      = {CoRR},
  volume       = {abs/2202.05749},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.05749},
  eprinttype    = {arXiv},
  eprint       = {2202.05749},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-05749.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-06382,
  author       = {Zhenting Wang and
                  Hailun Ding and
                  Juan Zhai and
                  Shiqing Ma},
  title        = {Neural Network Trojans Analysis and Mitigation from the Input Domain},
  journal      = {CoRR},
  volume       = {abs/2202.06382},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.06382},
  eprinttype    = {arXiv},
  eprint       = {2202.06382},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-06382.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-02567,
  author       = {Xuanqi Gao and
                  Juan Zhai and
                  Shiqing Ma and
                  Chao Shen and
                  Yufei Chen and
                  Qian Wang},
  title        = {FairNeuron: Improving Deep Neural Network Fairness with Adversary
                  Games on Selective Neurons},
  journal      = {CoRR},
  volume       = {abs/2204.02567},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.02567},
  doi          = {10.48550/ARXIV.2204.02567},
  eprinttype    = {arXiv},
  eprint       = {2204.02567},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-02567.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-13383,
  author       = {Zhenting Wang and
                  Juan Zhai and
                  Shiqing Ma},
  title        = {BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural
                  Networks via Image Quantization and Contrastive Adversarial Learning},
  journal      = {CoRR},
  volume       = {abs/2205.13383},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.13383},
  doi          = {10.48550/ARXIV.2205.13383},
  eprinttype    = {arXiv},
  eprint       = {2205.13383},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-13383.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-11082,
  author       = {Xiaoyi Chen and
                  Baisong Xin and
                  Shengfang Zhai and
                  Shiqing Ma and
                  Qingni Shen and
                  Zhonghai Wu},
  title        = {Apple of Sodom: Hidden Backdoors in Superior Sentence Embeddings via
                  Contrastive Learning},
  journal      = {CoRR},
  volume       = {abs/2210.11082},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.11082},
  doi          = {10.48550/ARXIV.2210.11082},
  eprinttype    = {arXiv},
  eprint       = {2210.11082},
  timestamp    = {Tue, 25 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-11082.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-12873,
  author       = {Kaiyuan Zhang and
                  Guanhong Tao and
                  Qiuling Xu and
                  Siyuan Cheng and
                  Shengwei An and
                  Yingqi Liu and
                  Shiwei Feng and
                  Guangyu Shen and
                  Pin{-}Yu Chen and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {{FLIP:} {A} Provable Defense Framework for Backdoor Mitigation in
                  Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2210.12873},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.12873},
  doi          = {10.48550/ARXIV.2210.12873},
  eprinttype    = {arXiv},
  eprint       = {2210.12873},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-12873.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-15127,
  author       = {Zhenting Wang and
                  Kai Mei and
                  Hailun Ding and
                  Juan Zhai and
                  Shiqing Ma},
  title        = {Rethinking the Reverse-engineering of Trojan Triggers},
  journal      = {CoRR},
  volume       = {abs/2210.15127},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.15127},
  doi          = {10.48550/ARXIV.2210.15127},
  eprinttype    = {arXiv},
  eprint       = {2210.15127},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-15127.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-15929,
  author       = {Guanhong Tao and
                  Zhenting Wang and
                  Siyuan Cheng and
                  Shiqing Ma and
                  Shengwei An and
                  Yingqi Liu and
                  Guangyu Shen and
                  Zhuo Zhang and
                  Yunshu Mao and
                  Xiangyu Zhang},
  title        = {Backdoor Vulnerabilities in Normally Trained Deep Learning Models},
  journal      = {CoRR},
  volume       = {abs/2211.15929},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.15929},
  doi          = {10.48550/ARXIV.2211.15929},
  eprinttype    = {arXiv},
  eprint       = {2211.15929},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-15929.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ese/TianMWLCZ21,
  author       = {Yongqiang Tian and
                  Shiqing Ma and
                  Ming Wen and
                  Yepang Liu and
                  Shing{-}Chi Cheung and
                  Xiangyu Zhang},
  title        = {To what extent do DNN-based image classification models make unreliable
                  inferences?},
  journal      = {Empir. Softw. Eng.},
  volume       = {26},
  number       = {4},
  pages        = {84},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10664-021-09985-1},
  doi          = {10.1007/S10664-021-09985-1},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ese/TianMWLCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/0005LMZ21,
  author       = {Siyuan Cheng and
                  Yingqi Liu and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Deep Feature Space Trojan Attack of Neural Networks by Controlled
                  Detoxification},
  booktitle    = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI}
                  2021, Thirty-Third Conference on Innovative Applications of Artificial
                  Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances
                  in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9,
                  2021},
  pages        = {1148--1156},
  publisher    = {{AAAI} Press},
  year         = {2021},
  url          = {https://doi.org/10.1609/aaai.v35i2.16201},
  doi          = {10.1609/AAAI.V35I2.16201},
  timestamp    = {Mon, 04 Sep 2023 12:29:24 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/0005LMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chen0C0MSW021,
  author       = {Xiaoyi Chen and
                  Ahmed Salem and
                  Dingfan Chen and
                  Michael Backes and
                  Shiqing Ma and
                  Qingni Shen and
                  Zhonghai Wu and
                  Yang Zhang},
  title        = {BadNL: Backdoor Attacks against {NLP} Models with Semantic-preserving
                  Improvements},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {554--569},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485837},
  doi          = {10.1145/3485832.3485837},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Chen0C0MSW021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/ShenLTAX0M021,
  author       = {Guangyu Shen and
                  Yingqi Liu and
                  Guanhong Tao and
                  Shengwei An and
                  Qiuling Xu and
                  Siyuan Cheng and
                  Shiqing Ma and
                  Xiangyu Zhang},
  editor       = {Marina Meila and
                  Tong Zhang},
  title        = {Backdoor Scanning for Deep Neural Networks through K-Arm Optimization},
  booktitle    = {Proceedings of the 38th International Conference on Machine Learning,
                  {ICML} 2021, 18-24 July 2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {139},
  pages        = {9525--9536},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {http://proceedings.mlr.press/v139/shen21c.html},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/ShenLTAX0M021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhangZMS21,
  author       = {Xiaoyu Zhang and
                  Juan Zhai and
                  Shiqing Ma and
                  Chao Shen},
  title        = {{AUTOTRAINER:} An Automatic {DNN} Training Problem Detection and Repair
                  System},
  booktitle    = {43rd {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2021, Madrid, Spain, 22-30 May 2021},
  pages        = {359--371},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICSE43902.2021.00043},
  doi          = {10.1109/ICSE43902.2021.00043},
  timestamp    = {Sat, 06 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/ZhangZMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YuMZT0XULCYG21,
  author       = {Le Yu and
                  Shiqing Ma and
                  Zhuo Zhang and
                  Guanhong Tao and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Vincent E. Urias and
                  Han Wei Lin and
                  Gabriela F. Ciocarlie and
                  Vinod Yegneswaran and
                  Ashish Gehani},
  title        = {ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance
                  without Instrumentation},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/alchemist-fusing-application-and-audit-logs-for-precise-attack-provenance-without-instrumentation/},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/YuMZT0XULCYG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KavousiYMC21,
  author       = {Mohammad Kavousi and
                  Runqing Yang and
                  Shiqing Ma and
                  Yan Chen},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {SemFlow: Accurate Semantic Identification from Low-Level System Data},
  booktitle    = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {398},
  pages        = {513--535},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90019-9\_26},
  doi          = {10.1007/978-3-030-90019-9\_26},
  timestamp    = {Thu, 04 Nov 2021 12:25:36 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KavousiYMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlsaheelNMYWC0X21,
  author       = {Abdulellah Alsaheel and
                  Yuhong Nan and
                  Shiqing Ma and
                  Le Yu and
                  Gregory Walkup and
                  Z. Berkay Celik and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ATLAS:} {A} Sequence-based Learning Approach for Attack Investigation},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3005--3022},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/alsaheel},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlsaheelNMYWC0X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DingYZM21,
  author       = {Hailun Ding and
                  Shenao Yan and
                  Juan Zhai and
                  Shiqing Ma},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {{ELISE:} {A} Storage Efficient Logging System Powered by Redundancy
                  Reduction and Representation Learning},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {3023--3040},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/ding},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/DingYZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-05123,
  author       = {Guangyu Shen and
                  Yingqi Liu and
                  Guanhong Tao and
                  Shengwei An and
                  Qiuling Xu and
                  Siyuan Cheng and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Backdoor Scanning for Deep Neural Networks through K-Arm Optimization},
  journal      = {CoRR},
  volume       = {abs/2102.05123},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.05123},
  eprinttype    = {arXiv},
  eprint       = {2102.05123},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-05123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-08820,
  author       = {Yingqi Liu and
                  Guangyu Shen and
                  Guanhong Tao and
                  Zhenting Wang and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {{EX-RAY:} Distinguishing Injected Backdoor from Natural Features in
                  Neural Networks by Examining Differential Feature Symmetry},
  journal      = {CoRR},
  volume       = {abs/2103.08820},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.08820},
  eprinttype    = {arXiv},
  eprint       = {2103.08820},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-08820.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-09999,
  author       = {Bao Gia Doan and
                  Minhui Xue and
                  Shiqing Ma and
                  Ehsan Abbasnejad and
                  Damith C. Ranasinghe},
  title        = {TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep
                  Neural Network Systems},
  journal      = {CoRR},
  volume       = {abs/2111.09999},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.09999},
  eprinttype    = {arXiv},
  eprint       = {2111.09999},
  timestamp    = {Mon, 22 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-09999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-02819,
  author       = {Yongqiang Tian and
                  Wuqi Zhang and
                  Ming Wen and
                  Shing{-}Chi Cheung and
                  Chengnian Sun and
                  Shiqing Ma and
                  Yu Jiang},
  title        = {Fast Test Input Generation for Finding Deviated Behaviors in Compressed
                  Deep Neural Network},
  journal      = {CoRR},
  volume       = {abs/2112.02819},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.02819},
  eprinttype    = {arXiv},
  eprint       = {2112.02819},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-02819.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/TaoMLXZ20,
  author       = {Guanhong Tao and
                  Shiqing Ma and
                  Yingqi Liu and
                  Qiuling Xu and
                  Xiangyu Zhang},
  editor       = {Gregg Rothermel and
                  Doo{-}Hwan Bae},
  title        = {{TRADER:} trace divergence analysis and embedding regulation for debugging
                  recurrent neural networks},
  booktitle    = {{ICSE} '20: 42nd International Conference on Software Engineering,
                  Seoul, South Korea, 27 June - 19 July, 2020},
  pages        = {986--998},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377811.3380423},
  doi          = {10.1145/3377811.3380423},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/TaoMLXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhaiXSTPMXZTZ20,
  author       = {Juan Zhai and
                  Xiangzhe Xu and
                  Yu Shi and
                  Guanhong Tao and
                  Minxue Pan and
                  Shiqing Ma and
                  Lei Xu and
                  Weifeng Zhang and
                  Lin Tan and
                  Xiangyu Zhang},
  editor       = {Gregg Rothermel and
                  Doo{-}Hwan Bae},
  title        = {{CPC:} automatically classifying and propagating natural language
                  comments via program analysis},
  booktitle    = {{ICSE} '20: 42nd International Conference on Software Engineering,
                  Seoul, South Korea, 27 June - 19 July, 2020},
  pages        = {1359--1371},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377811.3380427},
  doi          = {10.1145/3377811.3380427},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/ZhaiXSTPMXZTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/ZhangSZM20,
  author       = {Yang Zhang and
                  Shuai Shao and
                  Juan Zhai and
                  Shiqing Ma},
  editor       = {Sarfraz Khurshid and
                  Corina S. Pasareanu},
  title        = {FineLock: automatically refactoring coarse-grained locks into fine-grained
                  locks},
  booktitle    = {{ISSTA} '20: 29th {ACM} {SIGSOFT} International Symposium on Software
                  Testing and Analysis, Virtual Event, USA, July 18-22, 2020},
  pages        = {565--568},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3395363.3404368},
  doi          = {10.1145/3395363.3404368},
  timestamp    = {Wed, 15 Jul 2020 15:59:31 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/ZhangSZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YangMXZ020,
  author       = {Runqing Yang and
                  Shiqing Ma and
                  Haitao Xu and
                  Xiangyu Zhang and
                  Yan Chen},
  title        = {UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation
                  for {GUI} Applications},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/uiscope-accurate-instrumentation-free-and-visible-attack-investigation-for-gui-applications/},
  timestamp    = {Thu, 05 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/YangMXZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZhaiSPZLFM0020,
  author       = {Juan Zhai and
                  Yu Shi and
                  Minxue Pan and
                  Guian Zhou and
                  Yongxiang Liu and
                  Chunrong Fang and
                  Shiqing Ma and
                  Lin Tan and
                  Xiangyu Zhang},
  editor       = {Prem Devanbu and
                  Myra B. Cohen and
                  Thomas Zimmermann},
  title        = {{C2S:} translating natural language comments to formal program specifications},
  booktitle    = {{ESEC/FSE} '20: 28th {ACM} Joint European Software Engineering Conference
                  and Symposium on the Foundations of Software Engineering, Virtual
                  Event, USA, November 8-13, 2020},
  pages        = {25--37},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3368089.3409716},
  doi          = {10.1145/3368089.3409716},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ZhaiSPZLFM0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/YanTLZMX020,
  author       = {Shenao Yan and
                  Guanhong Tao and
                  Xuwei Liu and
                  Juan Zhai and
                  Shiqing Ma and
                  Lei Xu and
                  Xiangyu Zhang},
  editor       = {Prem Devanbu and
                  Myra B. Cohen and
                  Thomas Zimmermann},
  title        = {Correlations between deep neural network model coverage criteria and
                  model quality},
  booktitle    = {{ESEC/FSE} '20: 28th {ACM} Joint European Software Engineering Conference
                  and Symposium on the Foundations of Software Engineering, Virtual
                  Event, USA, November 8-13, 2020},
  pages        = {775--787},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3368089.3409671},
  doi          = {10.1145/3368089.3409671},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/YanTLZMX020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-03675,
  author       = {Ahmed Salem and
                  Rui Wen and
                  Michael Backes and
                  Shiqing Ma and
                  Yang Zhang},
  title        = {Dynamic Backdoor Attacks Against Machine Learning Models},
  journal      = {CoRR},
  volume       = {abs/2003.03675},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.03675},
  eprinttype    = {arXiv},
  eprint       = {2003.03675},
  timestamp    = {Tue, 24 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-03675.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-01043,
  author       = {Xiaoyi Chen and
                  Ahmed Salem and
                  Michael Backes and
                  Shiqing Ma and
                  Yang Zhang},
  title        = {BadNL: Backdoor Attacks Against {NLP} Models},
  journal      = {CoRR},
  volume       = {abs/2006.01043},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.01043},
  eprinttype    = {arXiv},
  eprint       = {2006.01043},
  timestamp    = {Wed, 19 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-01043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-08273,
  author       = {Shaofeng Li and
                  Shiqing Ma and
                  Minhui Xue and
                  Benjamin Zi Hao Zhao},
  title        = {Deep Learning Backdoors},
  journal      = {CoRR},
  volume       = {abs/2007.08273},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.08273},
  eprinttype    = {arXiv},
  eprint       = {2007.08273},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-08273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-11212,
  author       = {Siyuan Cheng and
                  Yingqi Liu and
                  Shiqing Ma and
                  Xiangyu Zhang},
  title        = {Deep Feature Space Trojan Attack of Neural Networks by Controlled
                  Detoxification},
  journal      = {CoRR},
  volume       = {abs/2012.11212},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.11212},
  eprinttype    = {arXiv},
  eprint       = {2012.11212},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-11212.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuLTMAZ19,
  author       = {Yingqi Liu and
                  Wen{-}Chuan Lee and
                  Guanhong Tao and
                  Shiqing Ma and
                  Yousra Aafer and
                  Xiangyu Zhang},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{ABS:} Scanning Neural Networks for Back-doors by Artificial Brain
                  Stimulation},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1265--1282},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363216},
  doi          = {10.1145/3319535.3363216},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuLTMAZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cgo/LeeLLMCZ019,
  author       = {Wen{-}Chuan Lee and
                  Yingqi Liu and
                  Peng Liu and
                  Shiqing Ma and
                  Hongjun Choi and
                  Xiangyu Zhang and
                  Rajiv Gupta},
  editor       = {Mahmut Taylan Kandemir and
                  Alexandra Jimborean and
                  Tipp Moseley},
  title        = {White-Box Program Tuning},
  booktitle    = {{IEEE/ACM} International Symposium on Code Generation and Optimization,
                  {CGO} 2019, Washington, DC, USA, February 16-20, 2019},
  pages        = {122--135},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CGO.2019.8661177},
  doi          = {10.1109/CGO.2019.8661177},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cgo/LeeLLMCZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/YouLMPZ019,
  author       = {Wei You and
                  Xuwei Liu and
                  Shiqing Ma and
                  David Mitchel Perry and
                  Xiangyu Zhang and
                  Bin Liang},
  editor       = {Joanne M. Atlee and
                  Tevfik Bultan and
                  Jon Whittle},
  title        = {{SLF:} fuzzing without valid seed inputs},
  booktitle    = {Proceedings of the 41st International Conference on Software Engineering,
                  {ICSE} 2019, Montreal, QC, Canada, May 25-31, 2019},
  pages        = {712--723},
  publisher    = {{IEEE} / {ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICSE.2019.00080},
  doi          = {10.1109/ICSE.2019.00080},
  timestamp    = {Tue, 24 May 2022 15:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/YouLMPZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MaLTL019,
  author       = {Shiqing Ma and
                  Yingqi Liu and
                  Guanhong Tao and
                  Wen{-}Chuan Lee and
                  Xiangyu Zhang},
  title        = {{NIC:} Detecting Adversarial Samples with Neural Network Invariant
                  Checking},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/nic-detecting-adversarial-samples-with-neural-network-invariant-checking/},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/MaLTL019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/LeeLLMZ19,
  author       = {Wen{-}Chuan Lee and
                  Peng Liu and
                  Yingqi Liu and
                  Shiqing Ma and
                  Xiangyu Zhang},
  editor       = {Kathryn S. McKinley and
                  Kathleen Fisher},
  title        = {Programming support for autonomizing software},
  booktitle    = {Proceedings of the 40th {ACM} {SIGPLAN} Conference on Programming
                  Language Design and Implementation, {PLDI} 2019, Phoenix, AZ, USA,
                  June 22-26, 2019},
  pages        = {702--716},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314221.3314593},
  doi          = {10.1145/3314221.3314593},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pldi/LeeLLMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YouWMHZ0019,
  author       = {Wei You and
                  Xueqiang Wang and
                  Shiqing Ma and
                  Jianjun Huang and
                  Xiangyu Zhang and
                  XiaoFeng Wang and
                  Bin Liang},
  title        = {ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability
                  Discovery},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {769--786},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00057},
  doi          = {10.1109/SP.2019.00057},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YouWMHZ0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-03824,
  author       = {Yongqiang Tian and
                  Shiqing Ma and
                  Ming Wen and
                  Yepang Liu and
                  Shing{-}Chi Cheung and
                  Xiangyu Zhang},
  title        = {Testing Deep Learning Models for Image Analysis Using Object-Relevant
                  Metamorphic Relations},
  journal      = {CoRR},
  volume       = {abs/1909.03824},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.03824},
  eprinttype    = {arXiv},
  eprint       = {1909.03824},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-03824.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangKMZX18,
  author       = {Fei Wang and
                  Yonghwi Kwon and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Lprov: Practical Library-aware Provenance Tracing},
  booktitle    = {Proceedings of the 34th Annual Computer Security Applications Conference,
                  {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages        = {605--617},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3274694.3274751},
  doi          = {10.1145/3274694.3274751},
  timestamp    = {Wed, 19 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/WangKMZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/XuMZZX18,
  author       = {Zhaogui Xu and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Shuofei Zhu and
                  Baowen Xu},
  editor       = {Michel Chaudron and
                  Ivica Crnkovic and
                  Marsha Chechik and
                  Mark Harman},
  title        = {Debugging with intelligence via probabilistic inference},
  booktitle    = {Proceedings of the 40th International Conference on Software Engineering,
                  {ICSE} 2018, Gothenburg, Sweden, May 27 - June 03, 2018},
  pages        = {1171--1181},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3180155.3180237},
  doi          = {10.1145/3180155.3180237},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/XuMZZX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/TangZPAM0Z18,
  author       = {Zhenhao Tang and
                  Juan Zhai and
                  Minxue Pan and
                  Yousra Aafer and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Jianhua Zhao},
  editor       = {Marianne Huchard and
                  Christian K{\"{a}}stner and
                  Gordon Fraser},
  title        = {Dual-force: understanding WebView malware via cross-language forced
                  execution},
  booktitle    = {Proceedings of the 33rd {ACM/IEEE} International Conference on Automated
                  Software Engineering, {ASE} 2018, Montpellier, France, September 3-7,
                  2018},
  pages        = {714--725},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3238147.3238221},
  doi          = {10.1145/3238147.3238221},
  timestamp    = {Thu, 23 Jun 2022 19:54:17 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/TangZPAM0Z18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Kwon0WLLM0XJCGY18,
  author       = {Yonghwi Kwon and
                  Fei Wang and
                  Weihang Wang and
                  Kyu Hyung Lee and
                  Wen{-}Chuan Lee and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Somesh Jha and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Vinod Yegneswaran},
  title        = {{MCI} : Modeling-based Causality Inference in Audit Logging for Attack
                  Investigation},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07B-2\_Kwon\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Kwon0WLLM0XJCGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/LiuMALZW018,
  author       = {Yingqi Liu and
                  Shiqing Ma and
                  Yousra Aafer and
                  Wen{-}Chuan Lee and
                  Juan Zhai and
                  Weihang Wang and
                  Xiangyu Zhang},
  title        = {Trojaning Attack on Neural Networks},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_03A-5\_Liu\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/LiuMALZW018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/TaoMLZ18,
  author       = {Guanhong Tao and
                  Shiqing Ma and
                  Yingqi Liu and
                  Xiangyu Zhang},
  editor       = {Samy Bengio and
                  Hanna M. Wallach and
                  Hugo Larochelle and
                  Kristen Grauman and
                  Nicol{\`{o}} Cesa{-}Bianchi and
                  Roman Garnett},
  title        = {Attacks Meet Interpretability: Attribute-steered Detection of Adversarial
                  Samples},
  booktitle    = {Advances in Neural Information Processing Systems 31: Annual Conference
                  on Neural Information Processing Systems 2018, NeurIPS 2018, December
                  3-8, 2018, Montr{\'{e}}al, Canada},
  pages        = {7728--7739},
  year         = {2018},
  url          = {https://proceedings.neurips.cc/paper/2018/hash/b994697479c5716eda77e8e9713e5f0f-Abstract.html},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/TaoMLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/MaLLZG18,
  author       = {Shiqing Ma and
                  Yingqi Liu and
                  Wen{-}Chuan Lee and
                  Xiangyu Zhang and
                  Ananth Grama},
  editor       = {Gary T. Leavens and
                  Alessandro Garcia and
                  Corina S. Pasareanu},
  title        = {{MODE:} automated neural network model debugging via state differential
                  analysis and input selection},
  booktitle    = {Proceedings of the 2018 {ACM} Joint Meeting on European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/SIGSOFT} {FSE} 2018, Lake Buena Vista, FL, USA, November 04-09,
                  2018},
  pages        = {175--186},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3236024.3236082},
  doi          = {10.1145/3236024.3236082},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/MaLLZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/MaZKL0CGYXJ18,
  author       = {Shiqing Ma and
                  Juan Zhai and
                  Yonghwi Kwon and
                  Kyu Hyung Lee and
                  Xiangyu Zhang and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Dongyan Xu and
                  Somesh Jha},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {Kernel-Supported Cost-Effective Audit Logging for Causality Tracking},
  booktitle    = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston,
                  MA, USA, July 11-13, 2018},
  pages        = {241--254},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/ma-shiqing},
  timestamp    = {Sat, 25 Feb 2023 23:39:37 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/MaZKL0CGYXJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-11580,
  author       = {Guanhong Tao and
                  Shiqing Ma and
                  Yingqi Liu and
                  Xiangyu Zhang},
  title        = {Attacks Meet Interpretability: Attribute-steered Detection of Adversarial
                  Samples},
  journal      = {CoRR},
  volume       = {abs/1810.11580},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.11580},
  eprinttype    = {arXiv},
  eprint       = {1810.11580},
  timestamp    = {Tue, 29 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-11580.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/WangMZRYH17,
  author       = {Chonghua Wang and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Junghwan Rhee and
                  Xiaochun Yun and
                  Zhiyu Hao},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {A Hypervisor Level Provenance System to Reconstruct Attack Story Caused
                  by Kernel Malware},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {778--792},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_42},
  doi          = {10.1007/978-3-319-78813-5\_42},
  timestamp    = {Wed, 22 Dec 2021 13:40:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/WangMZRYH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/MaAXLZLZ17,
  author       = {Shiqing Ma and
                  Yousra Aafer and
                  Zhaogui Xu and
                  Wen{-}Chuan Lee and
                  Juan Zhai and
                  Yingqi Liu and
                  Xiangyu Zhang},
  editor       = {Eric Bodden and
                  Wilhelm Sch{\"{a}}fer and
                  Arie van Deursen and
                  Andrea Zisman},
  title        = {{LAMP:} data provenance for graph based machine learning algorithms
                  through derivative computation},
  booktitle    = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages        = {786--797},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3106237.3106291},
  doi          = {10.1145/3106237.3106291},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/MaAXLZLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MaZ0LZX17,
  author       = {Shiqing Ma and
                  Juan Zhai and
                  Fei Wang and
                  Kyu Hyung Lee and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {{MPI:} Multiple Perspective Attack Investigation with Semantic Aware
                  Execution Partitioning},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1111--1128},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/ma},
  timestamp    = {Mon, 01 Feb 2021 08:42:59 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MaZ0LZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PeiGSM0ZSZX16,
  author       = {Kexin Pei and
                  Zhongshu Gu and
                  Brendan Saltaformaggio and
                  Shiqing Ma and
                  Fei Wang and
                  Zhiwei Zhang and
                  Luo Si and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {{HERCULE:} attack story reconstruction via community discovery on
                  correlated log graph},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {583--595},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991122},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PeiGSM0ZSZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhaiHMZTZQ16,
  author       = {Juan Zhai and
                  Jianjun Huang and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Lin Tan and
                  Jianhua Zhao and
                  Feng Qin},
  editor       = {Laura K. Dillon and
                  Willem Visser and
                  Laurie A. Williams},
  title        = {Automatic model generation from documentation for Java {API} functions},
  booktitle    = {Proceedings of the 38th International Conference on Software Engineering,
                  {ICSE} 2016, Austin, TX, USA, May 14-22, 2016},
  pages        = {380--391},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2884781.2884881},
  doi          = {10.1145/2884781.2884881},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/ZhaiHMZTZQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MaZX16,
  author       = {Shiqing Ma and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {ProTracer: Towards Practical Provenance Tracing by Alternating Between
                  Logging and Tainting},
  booktitle    = {23rd Annual Network and Distributed System Security Symposium, {NDSS}
                  2016, San Diego, California, USA, February 21-24, 2016},
  publisher    = {The Internet Society},
  year         = {2016},
  url          = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/protracer-towards-practical-provenance-tracing-alternating-logging-tainting.pdf},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/MaZX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MaLKRZX15,
  author       = {Shiqing Ma and
                  Kyu Hyung Lee and
                  Chung Hwan Kim and
                  Junghwan Rhee and
                  Xiangyu Zhang and
                  Dongyan Xu},
  title        = {Accurate, Low Cost and Instrumentation-Free Security Audit Logging
                  for Windows},
  booktitle    = {Proceedings of the 31st Annual Computer Security Applications Conference,
                  Los Angeles, CA, USA, December 7-11, 2015},
  pages        = {401--410},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2818000.2818039},
  doi          = {10.1145/2818000.2818039},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MaLKRZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics