Följ
Ruigang Liang
Titel
Citeras av
Citeras av
År
Seeing isn't believing: Towards more robust adversarial attack against real world object detectors
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1692019
{FuzzGuard}: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning
P Zong, T Lv, D Wang, Z Deng, R Liang, K Chen
29th USENIX security symposium (USENIX security 20), 2255-2269, 2020
1222020
An inside look at IoT malware
A Wang, R Liang, X Liu, Y Zhang, K Chen, J Li
Industrial IoT Technologies and Applications: Second EAI International …, 2017
612017
Dbia: Data-free backdoor injection attack against transformer networks
P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang
arXiv preprint arXiv:2111.11870, 2021
142021
A survey of audiovisual deepfake detection techniques
R Liang, M Li, K Chen
Journal of Cyber Security 5 (2), 1-17, 2020
142020
Neutron: an attention-based neural decompiler
R Liang, Y Cao, P Hu, K Chen
Cybersecurity 4, 1-13, 2021
132021
Evaluation indicators for open-source software: a review
Y Zhao, R Liang, X Chen, J Zou
Cybersecurity 4, 1-24, 2021
122021
A robustness-assured white-box watermark in neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li
IEEE Transactions on Dependable and Secure Computing, 2023
92023
Invisible backdoor attacks using data poisoning in the frequency domain
C Yue, P Lv, R Liang, K Chen
arXiv preprint arXiv:2207.04209, 2022
82022
视听觉深度伪造检测技术研究综述
梁瑞刚, 吕培卓, 赵月, 陈鹏, 邢豪, 张颖君, 韩冀中, 赫然, 赵险峰, 李明, ...
信息安全学报 5 (2), 1-17, 2020
72020
HufuNet: embedding the left piece as watermark and keeping the right piece for ownership verification in deep neural networks
P Lv, P Li, S Zhang, K Chen, R Liang, Y Zhao, Y Li
arXiv preprint arXiv:2103.13628, 2021
62021
Boosting neural networks to decompile optimized binaries
Y Cao, R Liang, K Chen, P Hu
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
32022
Ssl-wm: A black-box watermarking approach for encoders pre-trained by self-supervised learning
P Lv, P Li, S Zhu, S Zhang, K Chen, R Liang, C Yue, F Xiang, Y Cai, H Ma, ...
arXiv preprint arXiv:2209.03563, 2022
32022
Semantics-recovering decompilation through neural machine translation
R Liang, Y Cao, P Hu, J He, K Chen
arXiv preprint arXiv:2112.15491, 2021
32021
{AURC}: Detecting Errors in Program Code and Documentation
P Hu, R Liang, Y Cao, K Chen, R Zhang
32nd USENIX Security Symposium (USENIX Security 23), 1415-1432, 2023
22023
A data-free backdoor injection approach in neural networks
P Lv, C Yue, R Liang, Y Yang, S Zhang, H Ma, K Chen
32nd USENIX Security Symposium (USENIX Security 23), 2671-2688, 2023
12023
Seeing isn't Believing
Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
12019
MEA-Defender: A Robust Watermark against Model Extraction Attack
P Lv, H Ma, K Chen, J Zhou, S Zhang, R Liang, S Zhu, P Li, Y Zhang
arXiv preprint arXiv:2401.15239, 2024
2024
Using ensemble models to detect deepfake images of human faces
W Jiang, Z Guo, R Liang
Proceedings of the 2023 International Conference on Mathematics, Intelligent …, 2023
2023
DBIA: Data-Free Backdoor Attack Against Transformer Networks
P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang
2023 IEEE International Conference on Multimedia and Expo (ICME), 2819-2824, 2023
2023
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20