关注
Minghui Li
Minghui Li
在 hust.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
CReam: A smart contract enabled collusion-resistant e-auction
S Wu, Y Chen, Q Wang, M Li, C Wang, X Luo
IEEE Transactions on Information Forensics and Security 14 (7), 1687-1701, 2018
1062018
Protecting facial privacy: Generating adversarial identity masks via style-robust makeup transfer
S Hu, X Liu, Y Zhang, M Li, LY Zhang, H Jin, L Wu
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022
912022
Optimizing privacy-preserving outsourced convolutional neural network predictions
M Li, SSM Chow, S Hu, Y Yan, S Chao, Q Wang
IEEE Transactions on Dependable and Secure Computing, 2020
542020
Survive and thrive: A stochastic game for DDoS attacks in bitcoin mining pools
S Wu, Y Chen, M Li, X Luo, Z Liu, L Liu
IEEE/ACM Transactions On Networking 28 (2), 874-887, 2020
512020
Outsourced biometric identification with privacy
S Hu, M Li, Q Wang, SSM Chow, M Du
IEEE Transactions on information forensics and security 13 (10), 2448-2463, 2018
512018
Adversarial examples for automatic speech recognition: Attacks and countermeasures
S Hu, X Shang, Z Qin, M Li, Q Wang, C Wang
IEEE Communications Magazine 57 (10), 120-126, 2019
462019
Advclip: Downstream-agnostic adversarial examples in multimodal contrastive learning
Z Zhou, S Hu, M Li, H Zhang, Y Zhang, H Jin
Proceedings of the 31st ACM International Conference on Multimedia, 6311-6320, 2023
302023
Advhash: Set-to-set targeted attack on deep hashing with one single adversarial patch
S Hu, Y Zhang, X Liu, LY Zhang, M Li, H Jin
Proceedings of the 29th ACM international conference on multimedia, 2335-2343, 2021
302021
InstantCryptoGram: Secure image retrieval service
M Li, M Zhang, Q Wang, SSM Chow, M Du, Y Chen, C Lit
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2222-2230, 2018
292018
Detecting backdoors during the inference stage based on corruption robustness consistency
X Liu, M Li, H Wang, S Hu, D Ye, H Jin, L Wu, C Xiao
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
272023
ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum
Y Chen, X Tian, Q Wang, M Li, M Du, Q Li
IEEE Transactions on Mobile Computing 18 (10), 2270-2284, 2018
272018
SAFE: A general secure and fair auction framework for wireless markets with privacy preservation
Y Chen, X Tian, Q Wang, J Jiang, M Li, Q Zhang
IEEE Transactions on Dependable and Secure Computing 19 (3), 2038-2053, 2020
192020
A four-pronged defense against byzantine attacks in federated learning
W Wan, S Hu, M Li, J Lu, L Zhang, LY Zhang, H Jin
Proceedings of the 31st ACM International Conference on Multimedia, 7394-7402, 2023
132023
Secure prediction of neural network in the cloud
M Li, Y Yan, Q Wang, M Du, Z Qin, C Wang
IEEE Network 35 (1), 251-257, 2020
122020
Why does little robustness help? a further step towards understanding adversarial transferability
Y Zhang, S Hu, LY Zhang, J Shi, M Li, X Liu, H Jin
Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P’24) 2, 2024
102024
Pointcrt: Detecting backdoor in 3d point cloud via corruption robustness
S Hu, W Liu, M Li, Y Zhang, X Liu, X Wang, LY Zhang, J Hou
Proceedings of the 31st ACM International Conference on Multimedia, 666-675, 2023
102023
Pointca: Evaluating the robustness of 3d point cloud completion models against adversarial examples
S Hu, J Zhang, W Liu, J Hou, M Li, LY Zhang, H Jin, L Sun
Proceedings of the AAAI conference on artificial intelligence 37 (1), 872-880, 2023
72023
Corrupting convolution-based unlearnable datasets with pixel-based image transformations
X Wang, S Hu, M Li, Z Yu, Z Zhou, LY Zhang, H Jin
arXiv preprint arXiv:2311.18403, 2023
52023
针对深度学习模型的对抗性攻击与防御
李明慧, 江沛佩, 王骞, 沈超, 李琦
计算机研究与发展 58 (5), 909-926, 2021
52021
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints
M Li, W Wan, J Lu, S Hu, J Shi, LY Zhang, M Zhou, Y Zheng
2022 18th International Conference on Mobility, Sensing and Networking (MSN …, 2022
42022
系统目前无法执行此操作,请稍后再试。
文章 1–20