Graph backdoor Z Xi, R Pang, S Ji, T Wang 30th USENIX Security Symposium (USENIX Security 21), 1523-1540, 2021 | 173 | 2021 |
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models R Pang, H Shen, X Zhang, S Ji, Y Vorobeychik, X Luo, A Liu, T Wang Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 116 | 2020 |
TROJANZOO: Towards unified, holistic, and practical evaluation of neural backdoors R Pang, Z Zhang, X Gao, Z Xi, S Ji, P Cheng, X Luo, T Wang 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 684-702, 2022 | 80* | 2022 |
An embarrassingly simple backdoor attack on self-supervised learning C Li, R Pang, Z Xi, T Du, S Ji, Y Yao, T Wang Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023 | 38* | 2023 |
AdvMind: Inferring Adversary Intent of Black-Box Attacks R Pang, X Zhang, S Ji, X Luo, T Wang Proceedings of the ACM SIGKDD International Conference on Knowledge …, 2020 | 37 | 2020 |
Defending pre-trained language models as few-shot learners against backdoor attacks Z Xi, T Du, C Li, R Pang, S Ji, J Chen, F Ma, T Wang Advances in Neural Information Processing Systems 36, 2024 | 10 | 2024 |
Model extraction attacks revisited J Liang, R Pang, C Li, T Wang Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 9 | 2024 |
On the Security Risks of AutoML R Pang, Z Xi, S Ji, X Luo, T Wang 31th USENIX Security Symposium (USENIX Security 22), 2021 | 9 | 2021 |
On the security risks of knowledge graph reasoning Z Xi, T Du, C Li, R Pang, S Ji, X Luo, X Xiao, F Ma, T Wang 32nd USENIX Security Symposium (USENIX Security 23), 3259-3276, 2023 | 5 | 2023 |
I-Algebra: Towards interactive interpretability of deep neural networks X Zhang, R Pang, S Ji, F Ma, T Wang Proceedings of the AAAI Conference on Artificial Intelligence 35 (13), 11691 …, 2021 | 5 | 2021 |
The Dark Side of AutoML: Towards Architectural Backdoor Search R Pang, C Li, Z Xi, S Ji, T Wang The 11th International Conference on Learning Representations, 2023 | 4 | 2023 |
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks C Li, R Pang, B Cao, Z Xi, J Chen, S Ji, T Wang 33rd USENIX Security Symposium (USENIX Security 24), 2901-2918, 2024 | 1 | 2024 |
Reasoning over Multi-view Knowledge Graphs Z Xi, R Pang, C Li, T Du, S Ji, F Ma, T Wang arXiv preprint arXiv:2209.13702, 2022 | 1 | 2022 |
A Change of Heart: Backdoor Attacks on Security-Centric Diffusion Models C Li, R Pang, B Cao, J Chen, T Wang | 1 | |
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models C Li, R Pang, B Cao, J Chen, F Ma, S Ji, T Wang arXiv preprint arXiv:2406.09669, 2024 | | 2024 |
Towards Robust Reasoning over Knowledge Graphs Z Xi, R Pang, C Li, S Ji, X Luo, X Xiao, T Wang arXiv preprint arXiv:2110.14693, 2021 | | 2021 |