Kang Liu
Citeras av
Citeras av
Fine-pruning: Defending against backdooring attacks on deep neural networks
K Liu, B Dolan-Gavitt, S Garg
International symposium on research in attacks, intrusions, and defenses …, 2018
Badnets: Evaluating backdooring attacks on deep neural networks
T Gu, K Liu, B Dolan-Gavitt, S Garg
IEEE Access 7, 47230-47244, 2019
Nnoculation: Catching badnets in the wild
AK Veldanda, K Liu, B Tan, P Krishnamurthy, F Khorrami, R Karri, ...
Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security …, 2021
Building robust machine learning systems: Current progress, research challenges, and opportunities
JJ Zhang, K Liu, F Khalid, MA Hanif, S Rehman, T Theocharides, A Artussi, ...
Proceedings of the 56th Annual Design Automation Conference 2019, 1-4, 2019
An energy-efficient cyclic diversionary routing strategy against global eavesdroppers in wireless sensor networks
J Ren, Y Zhang, K Liu
International Journal of Distributed Sensor Networks 9 (4), 834245, 2013
Adversarial perturbation attacks on ML-based CAD: A case study on CNN-based lithographic hotspot detection
K Liu, H Yang, Y Ma, B Tan, B Yu, EFY Young, R Karri, S Garg
ACM Transactions on Design Automation of Electronic Systems (TODAES) 25 (5 …, 2020
Poisoning the (data) well in ML-based CAD: A case study of hiding lithographic hotspots
K Liu, B Tan, R Karri, S Garg
2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 306-309, 2020
Secret key generation using physical channels with imperfect CSI
S Primak, K Liu, X Wang
2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), 1-5, 2014
Attacking a CNN-based layout hotspot detector using group gradient method
H Yang, S Zhang, K Liu, S Liu, B Tan, R Karri, S Garg, B Yu, EFY Young
Proceedings of the 26th Asia and South Pacific Design Automation Conference …, 2021
Bias busters: Robustifying DL-based lithographic hotspot detectors against backdooring attacks
K Liu, B Tan, GR Reddy, S Garg, Y Makris, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
Multiple k-hop clusters based routing scheme to preserve source-location privacy in WSNs
J Ren, Y Zhang, K Liu
Journal of Central South University 21 (8), 3155-3168, 2014
Lack of robustness of lidar-based deep learning systems to small adversarial perturbations
N Patel, K Liu, P Krishnamurthy, S Garg, F Khorrami
ISR 2018; 50th International Symposium on Robotics, 1-7, 2018
Manipulation Attacks on Learned Image Compression
K Liu, D Wu, Y Wu, Y Wang, D Feng, B Tan, S Garg
IEEE Transactions on Artificial Intelligence, 2023
On secret key generation from multiple observations of wireless channels
K Liu, S Primak, X Wang
2014 IEEE International Conference on Communication Systems, 147-151, 2014
Subverting privacy-preserving gans: Hiding secrets in sanitized images
K Liu, B Tan, S Garg
Proceedings of the AAAI Conference on Artificial Intelligence 35 (17), 14849 …, 2021
Training data poisoning in ml-cad: Backdooring dl-based lithographic hotspot detectors
K Liu, B Tan, R Karri, S Garg
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
Robust computing for machine learning-based systems
MA Hanif, F Khalid, RVW Putra, MT Teimoori, F Kriebel, J Zhang, K Liu, ...
Dependable Embedded Systems, 479-503, 2021
Can we trust machine learning for electronic design automation?
K Liu, JJ Zhang, B Tan, D Feng
2021 IEEE 34th International System-on-Chip Conference (SOCC), 135-140, 2021
On enhancements of physical layer secret key generation and its application in wireless communication systems
K Liu
The University of Western Ontario (Canada), 2015
CAMO: Correlation-Aware Mask Optimization with Modulated Reinforcement Learning
X Liang, H Yang, K Liu, B Yu, Y Ma
arXiv preprint arXiv:2404.00980, 2024
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20