Volgen
Di Tang
Di Tang
Indiana University Bloomington
Geen geverifieerd e-mailadres
Titel
Geciteerd door
Geciteerd door
Jaar
Demon in the variant: Statistical analysis of {DNNs} for robust backdoor contamination detection
D Tang, XF Wang, H Tang, K Zhang
30th USENIX Security Symposium (USENIX Security 21), 1541-1558, 2021
1732021
Invisible mask: Practical attacks on face recognition with infrared
Z Zhou, D Tang, X Wang, W Han, X Liu, K Zhang
arXiv preprint arXiv:1803.04683, 2018
852018
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections
D Tang, Z Zhou, Y Zhang, K Zhang
Network and Distributed Systems Security (NDSS) Symposium 2018, 2018
702018
Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic
S Dong, Z Li, D Tang, J Chen, M Sun, K Zhang
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
662020
Stealthy porn: Understanding real-world adversarial images for illicit online promotion
K Yuan, D Tang, X Liao, XF Wang, X Feng, Y Chen, M Sun, H Lu, K Zhang
2019 IEEE Symposium on Security and Privacy (SP), 952-966, 2019
642019
Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models
J Liu, Y Kang, D Tang, K Song, C Sun, X Wang, W Lu, X Liu
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
202022
Seeing the Forest for the Trees: Understanding Security Hazards in the {3GPP} Ecosystem through Intelligent Analysis on Change Requests
Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, D Zhao
31st USENIX Security Symposium (USENIX Security 22), 17-34, 2022
92022
Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models
D Tang, R Zhu, S Tang, XF Wang, H Tang
2023 IEEE Symposium on Security and Privacy (SP), 682-700, 2022
62022
The trojan detection challenge
M Mazeika, D Hendrycks, H Li, X Xu, S Hough, A Zou, A Rajabi, Q Yao, ...
NeurIPS 2022 Competition Track, 279-291, 2022
52022
{HOMESPY}: The Invisible Sniffer of Infrared Remote Control of Smart {TVs}
K Huang, YT Zhou, K Zhang, J Xu, J Chen, D Tang, K Zhang
32nd USENIX Security Symposium (USENIX Security 23), 4553-4570, 2023
42023
Beware of your screen: Anonymous fingerprinting of device screens for off-line payment protection
Z Zhou, D Tang, W Wang, X Wang, Z Li, K Zhang
Proceedings of the 34th Annual Computer Security Applications Conference, 77-88, 2018
42018
Understanding impacts of task similarity on backdoor attack and detection
D Tang, R Zhu, XF Wang, H Tang, Y Chen
arXiv preprint arXiv:2210.06509, 2022
32022
Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
Y Chen, D Tang, Y Yao, M Zha, XF Wang, X Liu, H Tang, B Liu
32th USENIX Security Symposium (USENIX Security 23), 3529-3545, 2023
22023
Gradient Shaping: Enhancing Backdoor Attack against Reverse Engineering
R Zhu, D Tang, S Tang, G Tao, S Ma, XF Wang, H Tang
Network and Distributed Systems Security (NDSS) Symposium 2024, 2023
22023
Query-free attacks on industry-grade face recognition systems under resource constraints
D Tang, XF Wang, K Zhang
arXiv preprint arXiv:1802.09900, 2018
22018
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection
Z Wang, D Tang, XF Wang, W He, Z Geng, W Wang
33rd USENIX Security Symposium (USENIX Security 24), 2024
2024
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples
D Xu, D Tang, Y Chen, XF Wang, K Chen, H Tang, L Li
33rd USENIX Security Symposium (USENIX Security 24), 2024
2024
Security implications of non-digital components
X Ren, Z Zhou, D Tang, K Zhang
Frontiers in hardware security and trust theory, design and practic, 2020
2020
Security Threats to Face Authentication Systems
D Tang
PQDT-Global, 2020
2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19