


default search action
Shawn Shan
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c17]Wenxin Ding
, Cathy Y. Li
, Shawn Shan
, Ben Y. Zhao
, Hai-Tao Zheng
:
Understanding Implosion in Text-to-Image Generative Models. CCS 2024: 1211-1225 - [c16]Anna Yoo Jeong Ha
, Josephine Passananti
, Ronik Bhaskar
, Shawn Shan
, Reid Southen
, Hai-Tao Zheng
, Ben Y. Zhao
:
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? CCS 2024: 4822-4836 - [c15]Shawn Shan, Wenxin Ding, Josephine Passananti, Stanley Wu, Haitao Zheng, Ben Y. Zhao:
Nightshade: Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. SP 2024: 807-825 - [i14]Anna Yoo Jeong Ha, Josephine Passananti, Ronik Bhaskar, Shawn Shan, Reid Southen, Haitao Zheng, Ben Y. Zhao:
Organic or Diffused: Can We Distinguish Human Art from AI-generated Images? CoRR abs/2402.03214 (2024) - [i13]Josephine Passananti, Stanley Wu, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
Disrupting Style Mimicry Attacks on Video Imagery. CoRR abs/2405.06865 (2024) - [i12]Wenxin Ding, Cathy Y. Li, Shawn Shan, Ben Y. Zhao, Haitao Zheng:
Understanding Implosion in Text-to-Image Generative Models. CoRR abs/2409.12314 (2024) - [i11]Enze Liu, Elisa Luo, Shawn Shan, Geoffrey M. Voelker, Ben Y. Zhao, Stefan Savage:
Somesite I Used To Crawl: Awareness, Agency and Efficacy in Protecting Content Creators From AI Crawlers. CoRR abs/2411.15091 (2024) - 2023
- [c14]Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. SP 2023: 864-881 - [c13]Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao:
Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models. USENIX Security Symposium 2023: 2187-2204 - [i10]Shawn Shan, Jenna Cryan, Emily Wenger, Haitao Zheng, Rana Hanocka, Ben Y. Zhao:
GLAZE: Protecting Artists from Style Mimicry by Text-to-Image Models. CoRR abs/2302.04222 (2023) - [i9]Shawn Shan, Wenxin Ding, Josephine Passananti, Haitao Zheng, Ben Y. Zhao:
Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models. CoRR abs/2310.13828 (2023) - [i8]Shawn Shan, Stanley Wu, Haitao Zheng, Ben Y. Zhao:
A Response to Glaze Purification via IMPRESS. CoRR abs/2312.07731 (2023) - 2022
- [c12]Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. CCS 2022: 2611-2625 - [c11]Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang, Haitao Zheng, Ben Y. Zhao:
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks. USENIX Security Symposium 2022: 2117-2134 - [c10]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks. USENIX Security Symposium 2022: 3575-3592 - [i7]Shawn Shan, Wenxin Ding, Emily Wenger, Haitao Zheng, Ben Y. Zhao:
Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models. CoRR abs/2205.10686 (2022) - 2021
- [c9]Shawn Shan:
Using Honeypots to Catch Adversarial Attacks on Neural Networks. MTD@CCS 2021: 25 - [c8]Shawn Shan, Arjun Nitin Bhagoji
, Haitao Zheng, Ben Y. Zhao:
Patch-based Defenses against Web Fingerprinting Attacks. AISec@CCS 2021: 97-109 - [c7]Teng Xu, Gerard Goossen, Huseyin Kerem Cevahir, Sara Khodeir, Yingyezhe Jin, Frank Li, Shawn Shan, Sagar Patel, David Freeman, Paul Pearce:
Deep Entity Classification: Abusive Account Detection for Online Social Networks. USENIX Security Symposium 2021: 4097-4114 - [i6]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
A Real-time Defense against Website Fingerprinting Attacks. CoRR abs/2102.04291 (2021) - [i5]Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Traceback of Data Poisoning Attacks in Neural Networks. CoRR abs/2110.06904 (2021) - [i4]Emily Wenger, Shawn Shan, Haitao Zheng, Ben Y. Zhao:
SoK: Anti-Facial Recognition Technology. CoRR abs/2112.04558 (2021) - 2020
- [c6]Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao:
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks. CCS 2020: 67-83 - [c5]Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Privacy against Unauthorized Deep Learning Models. USENIX Security Symposium 2020: 1589-1604 - [i3]Shawn Shan, Emily Wenger, Jiayun Zhang, Huiying Li, Haitao Zheng, Ben Y. Zhao:
Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models. CoRR abs/2002.08327 (2020) - [i2]Huiying Li, Shawn Shan, Emily Wenger, Jiayun Zhang
, Haitao Zheng, Ben Y. Zhao:
Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks. CoRR abs/2006.14042 (2020)
2010 – 2019
- 2019
- [c4]Ben Weinshel
, Miranda Wei, Mainack Mondal, Euirim Choi, Shawn Shan, Claire Dolin, Michelle L. Mazurek, Blase Ur:
Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing. CCS 2019: 149-166 - [c3]Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. IEEE Symposium on Security and Privacy 2019: 707-723 - [i1]Shawn Shan, Emily Willson, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao:
Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks. CoRR abs/1904.08554 (2019) - 2018
- [c2]Claire Dolin, Ben Weinshel
, Shawn Shan, Chang Min Hahn, Euirim Choi, Michelle L. Mazurek, Blase Ur:
Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization. CHI 2018: 493 - [c1]Xinyi Zhang, Shawn Shan, Shiliang Tang, Haitao Zheng, Ben Y. Zhao:
Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash. HT 2018: 123-127
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint