Follow
Mingfu Xue
Title
Cited by
Cited by
Year
Machine learning security: Threats, countermeasures, and evaluations
M Xue, C Yuan, H Wu, Y Zhang, W Liu
IEEE Access 8, 74720-74742, 2020
1472020
One-to-N & N-to-One: Two advanced backdoor attacks against deep learning models
M Xue, C He, J Wang, W Liu
IEEE Transactions on Dependable and Secure Computing 19 (3), 1562-1578, 2020
632020
Ten years of hardware Trojans: a survey from the attacker's perspective
M Xue, C Gu, W Liu, S Yu, M O'Neill
IET Computers & Digital Techniques 14 (6), 231-246, 2020
622020
Intellectual property protection for deep learning models: Taxonomy, methods, attacks, and evaluations
M Xue, Y Zhang, J Wang, W Liu
IEEE Transactions on Artificial Intelligence 3 (6), 908-923, 2021
472021
Detecting hardware Trojan through heuristic partition and activity driven test pattern generation
X Mingfu, H Aiqun, L Guyue
IET Digital Library, 2014
412014
An enhanced classification-based golden chips-free hardware Trojan detection technique
M Xue, J Wang, A Hu
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
392016
DNN intellectual property protection: Taxonomy, attacks and evaluations
M Xue, J Wang, W Liu
Proceedings of the 2021 on Great Lakes Symposium on VLSI, 455-460, 2021
332021
Defeating untrustworthy testing parties: A novel hybrid clustering ensemble based golden models-free hardware trojan detection method
M Xue, R Bian, W Liu, J Wang
IEEE Access 7, 5124-5140, 2018
302018
NaturalAE: Natural and robust physical adversarial examples for object detectors
M Xue, C Yuan, C He, J Wang, W Liu
Journal of Information Security and Applications 57, 102694, 2021
262021
Robust backdoor attacks against deep neural networks in real physical world
M Xue, C He, S Sun, J Wang, W Liu
2021 IEEE 20th International Conference on Trust, Security and Privacy in …, 2021
242021
Backdoors hidden in facial features: A novel invisible backdoor attack against face recognition systems
M Xue, C He, J Wang, W Liu
Peer-to-Peer Networking and Applications 14, 1458-1474, 2021
232021
PTB: Robust physical backdoor attacks against deep neural networks in real world
M Xue, C He, Y Wu, S Sun, Y Zhang, J Wang, W Liu
Computers & Security 118, 102726, 2022
192022
Active intellectual property protection for deep neural networks through stealthy backdoor and users’ identities authentication
M Xue, S Sun, Y Zhang, J Wang, W Liu
Applied Intelligence 52 (14), 16497-16511, 2022
182022
AdvParams: An active DNN intellectual property protection technique via adversarial perturbation based parameter encryption
M Xue, Z Wu, Y Zhang, J Wang, W Liu
IEEE Transactions on Emerging Topics in Computing, 2022
172022
Monte Carlo based test pattern generation for hardware Trojan detection
X Mingfu, H Aiqun, H Yi, L Guyue
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure …, 2013
172013
Active DNN IP protection: A novel user fingerprint management and DNN authorization control technique
M Xue, Z Wu, C He, J Wang, W Liu
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
162020
Detect and remove watermark in deep neural networks via generative adversarial networks
S Sun, H Wang, M Xue, Y Zhang, J Wang, W Liu
Information Security: 24th International Conference, ISC 2021, Virtual Event …, 2021
152021
Interlaminar shear property and high-velocity impact resistance of CFRP laminates after cyclic hygrothermal aging
L Liu, Z Zhao, W Chen, M Xue, C Shuang
International Journal of Crashworthiness, 2019
152019
Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs
M Xue, R Bian, J Wang, W Liu
IET Computers & Digital Techniques 13 (4), 348-359, 2019
122019
SSL: A novel image hashing technique using SIFT keypoints with saliency detection and LBP feature extraction against combinatorial manipulations
M Xue, C Yuan, Z Liu, J Wang
Security and Communication Networks 2019, 2019
112019
The system can't perform the operation now. Try again later.
Articles 1–20