Backdoor attacks and countermeasures on deep learning: A comprehensive review Y Gao, BG Doan, Z Zhang, S Ma, J Zhang, A Fu, S Nepal, H Kim arXiv preprint arXiv:2007.10760, 2020 | 210 | 2020 |
Design and evaluation of a multi-domain trojan detection method on deep neural networks Y Gao, Y Kim, BG Doan, Z Zhang, G Zhang, S Nepal, DC Ranasinghe, ... IEEE Transactions on Dependable and Secure Computing 19 (4), 2349-2364, 2021 | 81 | 2021 |
Pthammer: Cross-user-kernel-boundary rowhammer through implicit accesses Z Zhang, Y Cheng, D Liu, S Nepal, Z Wang, Y Yarom Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'20), 28-41, 2020 | 76 | 2020 |
APMSA: Adversarial perturbation against model stealing attacks J Zhang, S Peng, Y Gao, Z Zhang, Q Hong IEEE Transactions on Information Forensics and Security 18, 1667-1679, 2023 | 73 | 2023 |
Evaluation and optimization of distributed machine learning techniques for internet of things Y Gao, M Kim, C Thapa, A Abuadbba, Z Zhang, S Camtepe, H Kim, ... IEEE Transactions on Computers 71 (10), 2538-2552, 2021 | 57 | 2021 |
Dramdig: A knowledge-assisted tool to uncover dram address mapping M Wang, Z Zhang, Y Cheng, S Nepal ACM/IEEE Design Automation Conference (DAC'20), 1-6, 2020 | 48 | 2020 |
KASR: A reliable and practical approach to attack surface reduction of commodity OS kernels Z Zhang, Y Cheng, S Nepal, D Liu, Q Shen, F Rabhi International Symposium on Research in Attacks, Intrusions and Defenses …, 2018 | 45* | 2018 |
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh Z Zhang, Y Cheng, M Wang, W He, W Wang, S Nepal, Y Gao, K Li, ... USENIX Annual Technical Conference (ATC'22), 399-414, 2022 | 35 | 2022 |
CATTmew: Defeating software-only physical kernel isolation Y Cheng, Z Zhang, S Nepal, Z Wang IEEE Transactions on Dependable and Secure Computing 18 (4), 1989-2004, 2019 | 34* | 2019 |
Quantization backdoors to deep learning commercial frameworks H Ma, H Qiu, Y Gao, Z Zhang, A Abuadbba, M Xue, A Fu, Z Jiliang, ... IEEE Transactions on Dependable and Secure Computing, 2023 | 32 | 2023 |
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses Z Zhang, W He, Y Cheng, W Wang, Y Gao, D Liu, K Li, S Nepal, A Fu, ... IEEE Transactions on Dependable and Secure Computing 20 (5), 3716-3733, 2022 | 26* | 2022 |
Dangerous cloaking: Natural trigger based backdoor attacks on object detectors in the physical world H Ma, Y Li, Y Gao, A Abuadbba, Z Zhang, A Fu, H Kim, SF Al-Sarawi, ... arXiv preprint arXiv:2201.08619, 2022 | 25 | 2022 |
PPA: preference profiling attack against federated learning C Zhou, Y Gao, A Fu, K Chen, Z Dai, Z Zhang, M Xue, Y Zhang Network and Distributed System Security Symposium (NDSS'23), 2023 | 21 | 2023 |
Design and Evaluate Recomposited OR-AND-XOR-PUF J Yao, L Pang, Y Su, Z Zhang, W Yang, A Fu, Y Gao IEEE Transactions on Emerging Topics in Computing 10 (2), 662-677, 2022 | 21 | 2022 |
TransCAB: Transferable Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World H Ma, Y Li, Y Gao, Z Zhang, A Abuadbba, A Fu, SF Al-Sarawi, S Nepal, ... International Symposium on Reliable Distributed Systems (SRDS'23), 82-92, 2023 | 17* | 2023 |
NTD: Non-transferability enabled deep learning backdoor detection Y Li, H Ma, Z Zhang, Y Gao, A Abuadbba, M Xue, A Fu, Y Zheng, ... IEEE Transactions on Information Forensics and Security, 2023 | 15* | 2023 |
Detecting hardware-assisted virtualization with inconspicuous features Z Zhang, Y Cheng, Y Gao, S Nepal, D Liu, Y Zou IEEE Transactions on Information Forensics and Security 16, 16-27, 2020 | 14 | 2020 |
Whistleblower: A system-level empirical study on rowhammer W He, Z Zhang, Y Cheng, W Wang, W Song, Y Gao, Q Zhang, K Li, D Liu, ... IEEE Transactions on Computers, 2023 | 12 | 2023 |
A covert channel using event channel state on xen hypervisor Q Shen, M Wan, Z Zhang, Z Zhang, S Qing, Z Wu International Conference on Information and Communications Security (ICICS …, 2013 | 11 | 2013 |
CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences S Wang, Y Gao, A Fu, Z Zhang, Y Zhang, W Susilo ACM ASIA Conference on Computer and Communications Security (ASIACCS'23), 2023 | 10 | 2023 |