关注
Shiwei Feng
Shiwei Feng
在 purdue.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Graph-to-tree neural networks for learning structured input-output translation with applications to semantic parsing and math word problem
S Li, L Wu, S Feng, F Xu, F Xu, S Zhong
arXiv preprint arXiv:2004.13781, 2020
772020
Flip: A provable defense framework for backdoor mitigation in federated learning
K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ...
arXiv preprint arXiv:2210.12873, 2022
362022
Detecting backdoors in pre-trained encoders
S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
332023
Beagle: Forensics of deep learning backdoor attack for better defense
S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ...
arXiv preprint arXiv:2301.06241, 2023
112023
Distribution preserving backdoor attack in self-supervised learning
G Tao, Z Wang, S Feng, G Shen, S Ma, X Zhang
2024 IEEE Symposium on Security and Privacy (SP), 29-29, 2023
102023
Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, and Xiangyu Zhang. 2023
X Xu, S Feng, Y Ye, G Shen
Improving Binary Code Similarity Transformer Models by Semantics-Driven …, 2023
82023
Fusion is Not Enough: Single Modal Attacks on Fusion Models for 3D Object Detection
Z Cheng, H Choi, J Liang, S Feng, G Tao, D Liu, M Zuzak, X Zhang
arXiv preprint arXiv:2304.14614, 2023
72023
Improving binary code similarity transformer models by semantics-driven instruction deemphasis
X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ...
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
62023
Lmpa: Improving decompilation by synergy of large language model and program analysis
X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang
arXiv preprint arXiv:2306.02546, 2023
62023
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks
Z Cheng, Z Liu, T Guo, S Feng, D Liu, M Tang, X Zhang
arXiv preprint arXiv:2404.00924, 2024
22024
Lotus: Evasive and resilient backdoor attacks through sub-partitioning
S Cheng, G Tao, Y Liu, G Shen, S An, S Feng, X Xu, K Zhang, S Ma, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024
22024
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model
X Xu, Z Xuan, S Feng, S Cheng, Y Ye, Q Shi, G Tao, L Yu, Z Zhang, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
12023
Leveraging Generative Models to Recover Variable Names from Stripped Binary
X Xu, Z Zhang, Z Su, Z Huang, S Feng, Y Ye, N Jiang, D Xie, S Cheng, ...
arXiv preprint arXiv:2306.02546, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–13