Follow
Huiying Li
Title
Cited by
Cited by
Year
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
7302019
Latent Backdoor Attacks on Deep Neural Networks
Y Yao, H Li, H Zheng, BY Zhao
2019 ACM SIGSAC Conference on Computer and Communications Security (CCS ’19), 2019
2182019
Fawkes: Protecting privacy against unauthorized deep learning models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020
1362020
Wearable Microphone Jamming
Y Chen, H Li, SY Teng, S Nagels, Z Li, P Lopes, BY Zhao, H Zheng
The ACM CHI Conference on Human Factors in Computing Systems, 2020, 2020
49*2020
Piracy Resistant Watermarks for Deep Neural Networks
H Li, E Wenger, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2020
42*2020
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
2022 Conference 31th USENIX security symposium (USENIX Security 22), 2022
27*2022
Can Backdoor Attacks Survive Time-Varying Models?
H Li, AN Bhagoji, BY Zhao, H Zheng
arXiv preprint arXiv:2206.04677, 2022
12022
Demonstrating Wearable Microphone Jamming
Y Chen, H Li, SY Teng, S Nagels, Z Li, P Lopes, H Zheng, BY Zhao
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–8