Model-reuse attacks on deep learning systems Y Ji, X Zhang, S Ji, X Luo, T Wang Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 199 | 2018 |
Backdoor attacks against learning systems Y Ji, X Zhang, T Wang 2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017 | 79 | 2017 |
Chinese social media analysis for disease surveillance X Cui, N Yang, Z Wang, C Hu, W Zhu, H Li, Y Ji, C Liu Personal and Ubiquitous Computing 19, 1125-1132, 2015 | 36 | 2015 |
Deepclean: data cleaning via question asking X Zhang, Y Ji, C Nguyen, T Wang 2018 IEEE 5th International Conference on Data Science and Advanced …, 2018 | 3 | 2018 |
EagleEye: Attack-agnostic defense against adversarial inputs (technical report) Y Ji, X Zhang, T Wang arXiv preprint arXiv:1808.00123, 2018 | 3 | 2018 |
Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge X Zhang, Y Ji, T Wang arXiv preprint arXiv:1708.07807, 2017 | 3 | 2017 |
Towards Understanding the Dynamics of Adversarial Attacks Y Ji, T Wang Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | | 2018 |
Where Classification Fails, Interpretation Rises C Nguyen, G Georgiev, Y Ji, T Wang arXiv preprint arXiv:1712.00558, 2017 | | 2017 |
On the Dynamics of Adversarial Input Attacks Y Ji, T Wang | | |
Data Cleaning via Question Asking X Zhang, Y Ji, C Nguyen, T Wang | | |