Flip: A provable defense framework for backdoor mitigation in federated learning K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ... ICLR 2023 (Best Paper Award at ECCV 2022 AROW Workshop), 2022 | 32 | 2022 |
DRGraph: An efficient graph layout algorithm for large-scale graphs by dimensionality reduction M Zhu, W Chen, Y Hu, Y Hou, L Liu, K Zhang IEEE Transactions on Visualization and Computer Graphics 27 (2), 1666-1676, 2020 | 31 | 2020 |
Detecting backdoors in pre-trained encoders S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 26 | 2023 |
Enhancing statistical charts: toward better data visualization and analysis X Luo, Y Yuan, K Zhang, J Xia, Z Zhou, L Chang, T Gu Journal of Visualization 22, 819-832, 2019 | 14 | 2019 |
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ... 30th Annual Network And Distributed System Security Symposium (NDSS 2023), 2023 | 8 | 2023 |
Your exploit is mine: Instantly synthesizing counterattack smart contract Z Zhang, Z Lin, M Morales, X Zhang, K Zhang 32nd USENIX Security Symposium (USENIX Security 23), 1757-1774, 2023 | 6 | 2023 |
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift S An, SY Chou, K Zhang, Q Xu, G Tao, G Shen, S Cheng, S Ma, PY Chen, ... AAAI 2024, 2023 | 4 | 2023 |
ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP L Yan, Z Zhang, G Tao, K Zhang, X Chen, G Shen, X Zhang NeurIPS 2023, 2023 | 4 | 2023 |
Django: Detecting trojans in object detection models via gaussian focus calibration G Shen, S Cheng, G Tao, K Zhang, Y Liu, S An, S Ma, X Zhang Advances in Neural Information Processing Systems 36, 2024 | 2 | 2024 |
Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia G Shen, S Cheng, K Zhang, G Tao, S An, L Yan, Z Zhang, S Ma, X Zhang arXiv preprint arXiv:2402.05467, 2024 | 2 | 2024 |
: Detoxing Deep Learning Dataset L Yan, S Cheng, G Shen, G Tao, X Chen, K Zhang, Y Mao, X Zhang NeurIPS 2023 Workshop on Backdoors in Deep Learning-The Good, the Bad, and …, 2023 | 2 | 2023 |
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioning S Cheng, G Tao, Y Liu, G Shen, S An, S Feng, X Xu, K Zhang, S Ma, ... CVPR 2024, 2024 | 1 | 2024 |
How to remove backdoors in diffusion models? S An, SY Chou, K Zhang, Q Xu, G Tao, G Shen, S Cheng, S Ma, PY Chen, ... NeurIPS 2023 Workshop on Backdoors in Deep Learning-The Good, the Bad, and …, 2023 | 1 | 2023 |
Source Code Foundation Models are Transferable Binary Analysis Knowledge Bases Z Su, X Xu, Z Huang, K Zhang, X Zhang arXiv preprint arXiv:2405.19581, 2024 | | 2024 |
Exploring the Orthogonality and Linearity of Backdoor Attacks K Zhang, S Cheng, G Shen, G Tao, S An, A Makur, S Ma, X Zhang 2024 IEEE Symposium on Security and Privacy (SP), 225-225, 2024 | | 2024 |
ODSCAN: Backdoor Scanning for Object Detection Models S Cheng, G Shen, G Tao, K Zhang, Z Zhang, S An, X Xu, Y Liu, S Ma, ... 2024 IEEE Symposium on Security and Privacy (SP), 119-119, 2024 | | 2024 |
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes S An, Y Yao, Q Xu, S Ma, G Tao, S Cheng, K Zhang, Y Liu, G Shen, I Kelk, ... 2023 IEEE Symposium on Security and Privacy (SP), 899-916, 2023 | | 2023 |