Graph-to-tree neural networks for learning structured input-output translation with applications to semantic parsing and math word problem S Li, L Wu, S Feng, F Xu, F Xu, S Zhong arXiv preprint arXiv:2004.13781, 2020 | 77 | 2020 |
Flip: A provable defense framework for backdoor mitigation in federated learning K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ... arXiv preprint arXiv:2210.12873, 2022 | 36 | 2022 |
Detecting backdoors in pre-trained encoders S Feng, G Tao, S Cheng, G Shen, X Xu, Y Liu, K Zhang, S Ma, X Zhang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 33 | 2023 |
Beagle: Forensics of deep learning backdoor attack for better defense S Cheng, G Tao, Y Liu, S An, X Xu, S Feng, G Shen, K Zhang, Q Xu, S Ma, ... arXiv preprint arXiv:2301.06241, 2023 | 11 | 2023 |
Distribution preserving backdoor attack in self-supervised learning G Tao, Z Wang, S Feng, G Shen, S Ma, X Zhang 2024 IEEE Symposium on Security and Privacy (SP), 29-29, 2023 | 10 | 2023 |
Zian Su, Siyuan Cheng, Guanhong Tao, Qingkai Shi, Zhuo Zhang, and Xiangyu Zhang. 2023 X Xu, S Feng, Y Ye, G Shen Improving Binary Code Similarity Transformer Models by Semantics-Driven …, 2023 | 8 | 2023 |
Fusion is Not Enough: Single Modal Attacks on Fusion Models for 3D Object Detection Z Cheng, H Choi, J Liang, S Feng, G Tao, D Liu, M Zuzak, X Zhang arXiv preprint arXiv:2304.14614, 2023 | 7 | 2023 |
Improving binary code similarity transformer models by semantics-driven instruction deemphasis X Xu, S Feng, Y Ye, G Shen, Z Su, S Cheng, G Tao, Q Shi, Z Zhang, ... Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 6 | 2023 |
Lmpa: Improving decompilation by synergy of large language model and program analysis X Xu, Z Zhang, S Feng, Y Ye, Z Su, N Jiang, S Cheng, L Tan, X Zhang arXiv preprint arXiv:2306.02546, 2023 | 6 | 2023 |
BadPart: Unified Black-box Adversarial Patch Attacks against Pixel-wise Regression Tasks Z Cheng, Z Liu, T Guo, S Feng, D Liu, M Tang, X Zhang arXiv preprint arXiv:2404.00924, 2024 | 2 | 2024 |
Lotus: Evasive and resilient backdoor attacks through sub-partitioning S Cheng, G Tao, Y Liu, G Shen, S An, S Feng, X Xu, K Zhang, S Ma, ... Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024 | 2 | 2024 |
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model X Xu, Z Xuan, S Feng, S Cheng, Y Ye, Q Shi, G Tao, L Yu, Z Zhang, ... Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 1 | 2023 |
Leveraging Generative Models to Recover Variable Names from Stripped Binary X Xu, Z Zhang, Z Su, Z Huang, S Feng, Y Ye, N Jiang, D Xie, S Cheng, ... arXiv preprint arXiv:2306.02546, 2023 | | 2023 |