Följ
Tianyu Du
Tianyu Du
Verifierad e-postadress på psu.edu - Startsida
Titel
Citeras av
Citeras av
År
Textbugger: Generating adversarial text against real-world applications
J Li, S Ji, T Du, B Li, T Wang
Proceedings of the 26th Annual Network and Distributed System Security …, 2019
3702019
Sirenattack: Generating adversarial audio for end-to-end acoustic systems
T Du, S Ji, J Li, Q Gu, T Wang, R Beyah
15th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2020), 2020
772020
Online e-commerce fraud: a large-scale detection and analysis
H Weng, Z Li, S Ji, C Chu, H Lu, T Du, Q He
2018 IEEE 34th International Conference on Data Engineering (ICDE), 1435-1440, 2018
342018
Spreading social influence with both positive and negative opinions in online networks
JS He, M Han, S Ji, T Du, Z Li
Big Data Mining and Analytics 2 (2), 100-117, 2019
212019
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation
J Li, T Du, S Ji, R Zhang, Q Lu, M Yang, T Wang
29th USENIX Security Symposium (USENIX Security 20), 1381-1398, 2020
202020
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique
J Chen, H Zheng, H Xiong, R Chen, T Du, Z Hong, S Ji
Computers & Security 104, 102220, 2021
122021
Invisible poisoning: Highly stealthy targeted poisoning attack
J Chen, H Zheng, M Su, T Du, C Lin, S Ji
International Conference on Information Security and Cryptology, 173-198, 2019
122019
机器学习模型可解释性方法, 应用与安全研究综述
纪守领, 李进锋, 杜天宇, 李博
计算机研究与发展 56 (10), 2071-2096, 2019
92019
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS, 516-534, 2021
72021
Static taint analysis method for intent injection vulnerability in android applications
B Xiong, G Xiang, T Du, JS He, S Ji
International Symposium on Cyberspace Safety and Security, 16-31, 2017
62017
Quantifying graph anonymity, utility, and de-anonymity
S Ji, T Du, Z Hong, T Wang, R Beyah
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1736-1744, 2018
42018
Neuronfair: Interpretable white-box fairness testing through biased neuron identification
H Zheng, Z Chen, T Du, X Zhang, Y Cheng, S Ji, J Wang, Y Yu, J Chen
Proceedings of the 44th International Conference on Software Engineering …, 2022
32022
Your Labels Are Selling You Out: Relation Leaks in Vertical Federated Learning
P Qiu, X Zhang, S Ji, T Du, Y Pu, J Zhou, T Wang
IEEE Transactions on Dependable and Secure Computing, 2022
22022
Enhancing Model Robustness by Incorporating Adversarial Knowledge into Semantic Representation
J Li, T Du, X Liu, R Zhang, H Xue, S Ji
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
22021
深度学习模型鲁棒性研究综述
纪守领, 杜天宇, 邓水光, 程鹏, 时杰, 杨珉, 李博
计算机学报 45 (1), 2022
12022
机器学习模型安全与隐私研究综述
纪守领, 杜天宇, 李进锋, 沈超, 李博
软件学报 32 (1), 41-67, 2021
12021
You are what you search: Attribute inference attacks through Web search queries
T Du, T Tao, B Liu, X Jin, J Li, S Ji
International Conference on Security with Intelligent Computing and Big-data …, 2018
12018
Influence spread in social networks with both positive and negative influences
JS He, Y Xie, T Du, S Ji, Z Li
International Computing and Combinatorics Conference, 615-629, 2017
12017
Demystifying Self-supervised Trojan Attacks
C Li, R Pang, Z Xi, T Du, S Ji, Y Yao, T Wang
arXiv preprint arXiv:2210.07346, 2022
2022
Reasoning over Multi-view Knowledge Graphs
Z Xi, R Pang, C Li, T Du, S Ji, F Ma, T Wang
arXiv preprint arXiv:2209.13702, 2022
2022
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20