Follow
Tianyu Du
Tianyu Du
Ph.D. Student of Zhejiang University
Verified email at zju.edu.cn - Homepage
Title
Cited by
Cited by
Year
Textbugger: Generating adversarial text against real-world applications
J Li, S Ji, T Du, B Li, T Wang
Proceedings of the 26th Annual Network and Distributed System Security …, 2019
3282019
Sirenattack: Generating adversarial audio for end-to-end acoustic systems
T Du, S Ji, J Li, Q Gu, T Wang, R Beyah
15th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2020), 2020
662020
Online e-commerce fraud: a large-scale detection and analysis
H Weng, Z Li, S Ji, C Chu, H Lu, T Du, Q He
2018 IEEE 34th International Conference on Data Engineering (ICDE), 1435-1440, 2018
312018
Spreading social influence with both positive and negative opinions in online networks
JS He, M Han, S Ji, T Du, Z Li
Big Data Mining and Analytics 2 (2), 100-117, 2019
202019
{TextShield}: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation
J Li, T Du, S Ji, R Zhang, Q Lu, M Yang, T Wang
29th USENIX Security Symposium (USENIX Security 20), 1381-1398, 2020
172020
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique
J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji
Computers & Security 104, 102220, 2021
82021
Invisible poisoning: Highly stealthy targeted poisoning attack
J Chen, H Zheng, M Su, T Du, C Lin, S Ji
International Conference on Information Security and Cryptology, 173-198, 2019
82019
机器学习模型可解释性方法, 应用与安全研究综述
纪守领, 李进锋, 杜天宇, 李博
计算机研究与发展 56 (10), 2071-2096, 2019
82019
Static taint analysis method for intent injection vulnerability in android applications
B Xiong, G Xiang, T Du, JS He, S Ji
International Symposium on Cyberspace Safety and Security, 16-31, 2017
62017
Quantifying graph anonymity, utility, and de-anonymity
S Ji, T Du, Z Hong, T Wang, R Beyah
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1736-1744, 2018
42018
NeuronFair: interpretable white-box fairness testing through biased neuron identification
H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ti, J Wang, Y Yu, J Chen
2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE …, 2022
22022
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS, 516-534, 2021
22021
深度学习模型鲁棒性研究综述
纪守领, 杜天宇, 邓水光, 程鹏, 时杰, 杨珉, 李博
计算机学报 45 (1), 2022
12022
Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation
J Li, T Du, X Liu, R Zhang, H Xue, S Ji
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
12021
You are what you search: Attribute inference attacks through Web search queries
T Du, T Tao, B Liu, X Jin, J Li, S Ji
International Conference on Security with Intelligent Computing and Big-data …, 2018
12018
Influence spread in social networks with both positive and negative influences
JS He, Y Xie, T Du, S Ji, Z Li
International Computing and Combinatorics Conference, 615-629, 2017
12017
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks
T Du, S Ji, B Wang, S He, J Li, B Li, T Wei, Y Jia, R Beyah, T Wang
International Journal of Intelligent Systems, 2022
2022
机器学习模型安全与隐私研究综述
纪守领, 杜天宇, 李进锋, 沈超, 李博
软件学报 32 (1), 41-67, 2021
2021
Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking Policy
Y Chen, Q Liu, T Du, Y Chen, S Ji
International Conference on Information Security and Cryptology, 157-172, 2019
2019
Neural Network Model for Classifying the Economic Recession and Construction of Financial Stress Index
L Shen, T Du, S Ji
International Conference of Pioneering Computer Scientists, Engineers and …, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20