Follow
Ren Pang
Title
Cited by
Cited by
Year
Graph backdoor
Z Xi, R Pang, S Ji, T Wang
30th USENIX Security Symposium (USENIX Security 21), 1523-1540, 2021
1732021
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models
R Pang, H Shen, X Zhang, S Ji, Y Vorobeychik, X Luo, A Liu, T Wang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
1162020
TROJANZOO: Towards unified, holistic, and practical evaluation of neural backdoors
R Pang, Z Zhang, X Gao, Z Xi, S Ji, P Cheng, X Luo, T Wang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 684-702, 2022
80*2022
An embarrassingly simple backdoor attack on self-supervised learning
C Li, R Pang, Z Xi, T Du, S Ji, Y Yao, T Wang
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
38*2023
AdvMind: Inferring Adversary Intent of Black-Box Attacks
R Pang, X Zhang, S Ji, X Luo, T Wang
Proceedings of the ACM SIGKDD International Conference on Knowledge …, 2020
372020
Defending pre-trained language models as few-shot learners against backdoor attacks
Z Xi, T Du, C Li, R Pang, S Ji, J Chen, F Ma, T Wang
Advances in Neural Information Processing Systems 36, 2024
102024
Model extraction attacks revisited
J Liang, R Pang, C Li, T Wang
Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024
92024
On the Security Risks of AutoML
R Pang, Z Xi, S Ji, X Luo, T Wang
31th USENIX Security Symposium (USENIX Security 22), 2021
92021
On the security risks of knowledge graph reasoning
Z Xi, T Du, C Li, R Pang, S Ji, X Luo, X Xiao, F Ma, T Wang
32nd USENIX Security Symposium (USENIX Security 23), 3259-3276, 2023
52023
I-Algebra: Towards interactive interpretability of deep neural networks
X Zhang, R Pang, S Ji, F Ma, T Wang
Proceedings of the AAAI Conference on Artificial Intelligence 35 (13), 11691 …, 2021
52021
The Dark Side of AutoML: Towards Architectural Backdoor Search
R Pang, C Li, Z Xi, S Ji, T Wang
The 11th International Conference on Learning Representations, 2023
42023
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks
C Li, R Pang, B Cao, Z Xi, J Chen, S Ji, T Wang
33rd USENIX Security Symposium (USENIX Security 24), 2901-2918, 2024
12024
Reasoning over Multi-view Knowledge Graphs
Z Xi, R Pang, C Li, T Du, S Ji, F Ma, T Wang
arXiv preprint arXiv:2209.13702, 2022
12022
A Change of Heart: Backdoor Attacks on Security-Centric Diffusion Models
C Li, R Pang, B Cao, J Chen, T Wang
1
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models
C Li, R Pang, B Cao, J Chen, F Ma, S Ji, T Wang
arXiv preprint arXiv:2406.09669, 2024
2024
Towards Robust Reasoning over Knowledge Graphs
Z Xi, R Pang, C Li, S Ji, X Luo, X Xiao, T Wang
arXiv preprint arXiv:2110.14693, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–16