Follow
Huiying Li
Title
Cited by
Cited by
Year
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
12492019
Latent Backdoor Attacks on Deep Neural Networks
Y Yao, H Li, H Zheng, BY Zhao
2019 ACM SIGSAC Conference on Computer and Communications Security (CCS ’19), 2019
3692019
Fawkes: Protecting privacy against unauthorized deep learning models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020
2482020
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
2022 Conference 31th USENIX security symposium (USENIX Security 22), 2022
76*2022
Wearable Microphone Jamming
Y Chen, H Li, SY Teng, S Nagels, Z Li, P Lopes, BY Zhao, H Zheng
The ACM CHI Conference on Human Factors in Computing Systems, 2020, 2020
73*2020
Piracy Resistant Watermarks for Deep Neural Networks
H Li, E Wenger, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2020
63*2020
Can Backdoor Attacks Survive Time-Varying Models?
H Li, AN Bhagoji, BY Zhao, H Zheng
arXiv preprint arXiv:2206.04677, 2022
32022
Demonstrating Wearable Microphone Jamming
Y Chen, H Li, SY Teng, S Nagels, Z Li, P Lopes, H Zheng, BY Zhao
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–8