CReam: A smart contract enabled collusion-resistant e-auction S Wu, Y Chen, Q Wang, M Li, C Wang, X Luo IEEE Transactions on Information Forensics and Security 14 (7), 1687-1701, 2018 | 106 | 2018 |
Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer S Hu, X Liu, Y Zhang, M Li, LY Zhang, H Jin, L Wu Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022 | 91 | 2022 |
Optimizing privacy-preserving outsourced convolutional neural network predictions M Li, SSM Chow, S Hu, Y Yan, S Chao, Q Wang IEEE Transactions on Dependable and Secure Computing, 2020 | 54 | 2020 |
Survive and thrive: A stochastic game for DDoS attacks in bitcoin mining pools S Wu, Y Chen, M Li, X Luo, Z Liu, L Liu IEEE/ACM Transactions On Networking 28 (2), 874-887, 2020 | 51 | 2020 |
Outsourced biometric identification with privacy S Hu, M Li, Q Wang, SSM Chow, M Du IEEE Transactions on information forensics and security 13 (10), 2448-2463, 2018 | 51 | 2018 |
Adversarial examples for automatic speech recognition: Attacks and countermeasures S Hu, X Shang, Z Qin, M Li, Q Wang, C Wang IEEE Communications Magazine 57 (10), 120-126, 2019 | 46 | 2019 |
Advclip: Downstream-agnostic adversarial examples in multimodal contrastive learning Z Zhou, S Hu, M Li, H Zhang, Y Zhang, H Jin Proceedings of the 31st ACM International Conference on Multimedia, 6311-6320, 2023 | 30 | 2023 |
Advhash: Set-to-set targeted attack on deep hashing with one single adversarial patch S Hu, Y Zhang, X Liu, LY Zhang, M Li, H Jin Proceedings of the 29th ACM international conference on multimedia, 2335-2343, 2021 | 30 | 2021 |
InstantCryptoGram: Secure image retrieval service M Li, M Zhang, Q Wang, SSM Chow, M Du, Y Chen, C Lit IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2222-2230, 2018 | 29 | 2018 |
Detecting backdoors during the inference stage based on corruption robustness consistency X Liu, M Li, H Wang, S Hu, D Ye, H Jin, L Wu, C Xiao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 27 | 2023 |
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum Y Chen, X Tian, Q Wang, M Li, M Du, Q Li IEEE Transactions on Mobile Computing 18 (10), 2270-2284, 2018 | 27 | 2018 |
SAFE: A general secure and fair auction framework for wireless markets with privacy preservation Y Chen, X Tian, Q Wang, J Jiang, M Li, Q Zhang IEEE Transactions on Dependable and Secure Computing 19 (3), 2038-2053, 2020 | 19 | 2020 |
A four-pronged defense against byzantine attacks in federated learning W Wan, S Hu, M Li, J Lu, L Zhang, LY Zhang, H Jin Proceedings of the 31st ACM International Conference on Multimedia, 7394-7402, 2023 | 13 | 2023 |
Secure prediction of neural network in the cloud M Li, Y Yan, Q Wang, M Du, Z Qin, C Wang IEEE Network 35 (1), 251-257, 2020 | 12 | 2020 |
Why does little robustness help? a further step towards understanding adversarial transferability Y Zhang, S Hu, LY Zhang, J Shi, M Li, X Liu, H Jin Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P’24) 2, 2024 | 10 | 2024 |
Pointcrt: Detecting backdoor in 3d point cloud via corruption robustness S Hu, W Liu, M Li, Y Zhang, X Liu, X Wang, LY Zhang, J Hou Proceedings of the 31st ACM International Conference on Multimedia, 666-675, 2023 | 10 | 2023 |
Pointca: Evaluating the robustness of 3d point cloud completion models against adversarial examples S Hu, J Zhang, W Liu, J Hou, M Li, LY Zhang, H Jin, L Sun Proceedings of the AAAI conference on artificial intelligence 37 (1), 872-880, 2023 | 7 | 2023 |
Corrupting convolution-based unlearnable datasets with pixel-based image transformations X Wang, S Hu, M Li, Z Yu, Z Zhou, LY Zhang, H Jin arXiv preprint arXiv:2311.18403, 2023 | 5 | 2023 |
针对深度学习模型的对抗性攻击与防御 李明慧, 江沛佩, 王骞, 沈超, 李琦 计算机研究与发展 58 (5), 909-926, 2021 | 5 | 2021 |
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints M Li, W Wan, J Lu, S Hu, J Shi, LY Zhang, M Zhou, Y Zheng 2022 18th International Conference on Mobility, Sensing and Networking (MSN …, 2022 | 4 | 2022 |