Demon in the variant: Statistical analysis of {DNNs} for robust backdoor contamination detection D Tang, XF Wang, H Tang, K Zhang 30th USENIX Security Symposium (USENIX Security 21), 1541-1558, 2021 | 173 | 2021 |
Invisible mask: Practical attacks on face recognition with infrared Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang arXiv preprint arXiv:1803.04683, 2018 | 85 | 2018 |
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections D Tang, Z Zhou, Y Zhang, K Zhang Network and Distributed Systems Security (NDSS) Symposium 2018, 2018 | 70 | 2018 |
Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 66 | 2020 |
Stealthy porn: Understanding real-world adversarial images for illicit online promotion K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang 2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019 | 64 | 2019 |
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models J Liu, Y Kang, D Tang, K Song, C Sun, X Wang, W Lu, X Liu Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 20 | 2022 |
Seeing the Forest for the Trees: Understanding Security Hazards in the {3GPP} Ecosystem through Intelligent Analysis on Change Requests Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, D Zhao 31st USENIX Security Symposium (USENIX Security 22), 17-34, 2022 | 9 | 2022 |
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models D Tang, R Zhu, S Tang, XF Wang, H Tang 2023 IEEE Symposium on Security and Privacy (SP), 682-700, 2022 | 6 | 2022 |
The trojan detection challenge M Mazeika, D Hendrycks, H Li, X Xu, S Hough, A Zou, A Rajabi, Q Yao, ... NeurIPS 2022 Competition Track, 279-291, 2022 | 5 | 2022 |
{HOMESPY}: The Invisible Sniffer of Infrared Remote Control of Smart {TVs} K Huang, YT Zhou, K Zhang, J Xu, J Chen, D Tang, K Zhang 32nd USENIX Security Symposium (USENIX Security 23), 4553-4570, 2023 | 4 | 2023 |
Beware of your screen: Anonymous fingerprinting of device screens for off-line payment protection Z Zhou, D Tang, W Wang, X Wang, Z Li, K Zhang Proceedings of the 34th Annual Computer Security Applications Conference, 77-88, 2018 | 4 | 2018 |
Understanding impacts of task similarity on backdoor attack and detection D Tang, R Zhu, XF Wang, H Tang, Y Chen arXiv preprint arXiv:2210.06509, 2022 | 3 | 2022 |
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, B Liu 32th USENIX Security Symposium (USENIX Security 23), 3529-3545, 2023 | 2 | 2023 |
Gradient Shaping: Enhancing Backdoor Attack against Reverse Engineering R Zhu, D Tang, S Tang, G Tao, S Ma, XF Wang, H Tang Network and Distributed Systems Security (NDSS) Symposium 2024, 2023 | 2 | 2023 |
Query-free attacks on industry-grade face recognition systems under resource constraints D Tang, XF Wang, K Zhang arXiv preprint arXiv:1802.09900, 2018 | 2 | 2018 |
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection Z Wang, D Tang, XF Wang, W He, Z Geng, W Wang 33rd USENIX Security Symposium (USENIX Security 24), 2024 | | 2024 |
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples D Xu, D Tang, Y Chen, XF Wang, K Chen, H Tang, L Li 33rd USENIX Security Symposium (USENIX Security 24), 2024 | | 2024 |
Security implications of non-digital components X Ren, Z Zhou, D Tang, K Zhang Frontiers in hardware security and trust theory, design and practic, 2020 | | 2020 |
Security Threats to Face Authentication Systems D Tang PQDT-Global, 2020 | | 2020 |