Gangsweep: Sweep out neural backdoors by gan L Zhu, R Ning, C Wang, C Xin, H Wu Proceedings of the 28th ACM International Conference on Multimedia, 3173-3181, 2020 | 56 | 2020 |
Capjack: Capture in-browser crypto-jacking by deep capsule network through behavioral analysis R Ning, C Wang, CS Xin, J Li, L Zhu, H Wu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 1873-1881, 2019 | 42 | 2019 |
CLEAR: Clean-up sample-targeted backdoor in neural networks L Zhu, R Ning, C Xin, C Wang, H Wu Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 9 | 2021 |
DeapSECURE Computational Training for Cybersecurity Students: Improvements, Mid-Stage Evaluation, and Lessons Learned W Purwanto, Y He, J Ossom, Q Zhang, L Zhu, K Arcaute, M Sosonkina, ... Journal of Computational Science Education 12 (2), 2021 | 3 | 2021 |
Most and Least Retrievable Images in Visual-Language Query Systems L Zhu, R Ning, J Li, C Xin, H Wu European Conference on Computer Vision, 1-18, 2022 | 1 | 2022 |
SEER: Backdoor Detection for Vision-Language Models through Searching Target Text and Image Trigger Jointly L Zhu, R Ning, J Li, C Xin, H Wu Proceedings of the AAAI Conference on Artificial Intelligence 38 (7), 7766-7774, 2024 | | 2024 |
Towards a Robust Defense: A Multifaceted Approach to the Detection and Mitigation of Neural Backdoor Attacks through Feature Space Exploration and Analysis L Zhu Old Dominion University, 2023 | | 2023 |