Delving into transferable adversarial examples and black-box attacks Y Liu, X Chen, C Liu, D Song arXiv preprint arXiv:1611.02770, 2016 | 1950 | 2016 |
Targeted backdoor attacks on deep learning systems using data poisoning X Chen, C Liu, B Li, K Lu, D Song arXiv preprint arXiv:1712.05526, 2017 | 1754 | 2017 |
The secret sharer: Evaluating and testing unintended memorization in neural networks N Carlini, C Liu, Ú Erlingsson, J Kos, D Song 28th USENIX security symposium (USENIX security 19), 267-284, 2019 | 1068 | 2019 |
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li 2018 IEEE symposium on security and privacy (SP), 19-35, 2018 | 937 | 2018 |
Neural network-based graph embedding for cross-platform binary code similarity detection X Xu, C Liu, Q Feng, H Yin, L Song, D Song Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 702 | 2017 |
ObliVM: A Programming Framework for Secure Computation C Liu, XS Wang, K Nayak, Y Huang, E Shi IEEE Symposium on Security and Privacy (S & P), 2015 | 440 | 2015 |
Sqlnet: Generating structured queries from natural language without reinforcement learning X Xu, C Liu, D Song arXiv preprint arXiv:1711.04436, 2017 | 415 | 2017 |
Tree-to-tree neural networks for program translation X Chen, C Liu, D Song Advances in neural information processing systems 31, 2018 | 290 | 2018 |
Oblivious data structures XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 259 | 2014 |
The secret sharer: Measuring unintended neural network memorization & extracting secrets N Carlini, C Liu, J Kos, Ú Erlingsson, D Song arXiv preprint arXiv:1802.08232 5, 2018 | 217 | 2018 |
Ghostrider: A hardware-software system for memory trace oblivious computation C Liu, A Harris, M Maas, M Hicks, M Tiwari, E Shi ACM SIGPLAN Notices 50 (4), 87-101, 2015 | 200 | 2015 |
Curriculum adversarial training QZ Cai, M Du, C Liu, D Song arXiv preprint arXiv:1805.04807, 2018 | 182 | 2018 |
Execution-guided neural program synthesis X Chen, C Liu, D Song International Conference on Learning Representations, 2018 | 154 | 2018 |
Automating efficient RAM-model secure computation C Liu, Y Huang, E Shi, J Katz, M Hicks 2014 IEEE Symposium on Security and Privacy, 623-638, 2014 | 140 | 2014 |
Lifelong anomaly detection through unlearning M Du, Z Chen, C Liu, R Oak, D Song Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 133 | 2019 |
Robust linear regression against training data poisoning C Liu, B Li, Y Vorobeychik, A Oprea Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017 | 123 | 2017 |
Deepsniffer: A dnn model extraction framework based on learning architectural hints X Hu, L Liang, S Li, L Deng, P Zuo, Y Ji, X Xie, Y Ding, C Liu, T Sherwood, ... Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 122 | 2020 |
Latent attention for if-then program synthesis C Liu, X Chen, EC Shin, M Chen, D Song Advances in Neural Information Processing Systems 29, 2016 | 104 | 2016 |
Memory trace oblivious program execution C Liu, M Hicks, E Shi 2013 IEEE 26th Computer Security Foundations Symposium, 51-65, 2013 | 87 | 2013 |
Fooling vision and language models despite localization and attention mechanism X Xu, X Chen, C Liu, A Rohrbach, T Darrell, D Song Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018 | 75 | 2018 |