ABS: Scanning neural networks for back-doors by artificial brain stimulation Y Liu, WC Lee, G Tao, S Ma, Y Aafer, X Zhang ACM SIGSAC Conference on Computer and Communications Security (CCS 2019 …, 2019 | 473 | 2019 |
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking S Ma, Y Liu, G Tao, WC Lee, X Zhang Network and Distributed System Security Symposium (NDSS 2019), 2019 | 317 | 2019 |
Attacks meet interpretability: Attribute-steered detection of adversarial samples G Tao, S Ma, Y Liu, X Zhang International Conference on Neural Information Processing Systems (NeurIPS 2018), 2018 | 196 | 2018 |
MalPat: Mining patterns of malicious and benign Android apps via permission-related APIs G Tao, Z Zheng, Z Guo, MR Lyu IEEE Transactions on Reliability 67 (1), 355-369, 2017 | 120 | 2017 |
Backdoor scanning for deep neural networks through k-arm optimization G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang International Conference on Machine Learning (ICML 2021), 9525-9536, 2021 | 115 | 2021 |
Physical attack on monocular depth estimation with optimal adversarial patches Z Cheng, J Liang, H Choi, G Tao, Z Cao, D Liu, X Zhang European Conference on Computer Vision (ECCV 2022), 514-532, 2022 | 96 | 2022 |
Correlations between deep neural network model coverage criteria and model quality S Yan, G Tao, X Liu, J Zhai, S Ma, L Xu, X Zhang ESEC/FSE 2020: ACM Joint Meeting on European Software Engineering Conference …, 2020 | 82 | 2020 |
Better trigger inversion optimization in backdoor scanning G Tao, G Shen, Y Liu, S An, Q Xu, S Ma, P Li, X Zhang IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2022 …, 2022 | 75 | 2022 |
Piccolo: Exposing complex backdoors in nlp transformer models Y Liu, G Shen, G Tao, S An, S Ma, X Zhang IEEE Symposium on Security and Privacy (SP 2022), 2025-2042, 2022 | 71 | 2022 |
Precise android api protection mapping derivation and reasoning Y Aafer, G Tao, J Huang, X Zhang, N Li ACM SIGSAC Conference on Computer and Communications Security (CCS 2018 …, 2018 | 65 | 2018 |
Complex backdoor detection by symmetric feature differencing Y Liu, G Shen, G Tao, Z Wang, S Ma, X Zhang IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2022 …, 2022 | 64* | 2022 |
Towards feature space adversarial attack by style perturbation Q Xu, G Tao, S Cheng, X Zhang AAAI Conference on Artificial Intelligence (AAAI 2021) 35 (12), 10523-10531, 2021 | 58* | 2021 |
Code search based on context-aware code translation W Sun, C Fang, Y Chen, G Tao, T Han, Q Zhang International Conference on Software Engineering (ICSE 2022), 388-400, 2022 | 52 | 2022 |
CPC: Automatically classifying and propagating natural language comments via program analysis J Zhai, X Xu, Y Shi, G Tao, M Pan, S Ma, L Xu, W Zhang, L Tan, X Zhang ACM/IEEE International Conference on Software Engineering (ICSE 2020), 1359-1371, 2020 | 50 | 2020 |
Model orthogonalization: Class distance hardening in neural networks for better security G Tao, Y Liu, G Shen, Q Xu, S An, Z Zhang, X Zhang IEEE Symposium on Security and Privacy (SP 2022), 1372-1389, 2022 | 49 | 2022 |
Mirror: Model inversion for deep learning network with high fidelity S An, G Tao, Q Xu, Y Liu, G Shen, Y Yao, J Xu, X Zhang Network and Distributed System Security Symposium (NDSS 2022), 2022 | 46 | 2022 |
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation. L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias, HW Lin, ... Network and Distributed System Security Symposium (NDSS 2021), 2021 | 44 | 2021 |
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang IEEE Symposium on Security and Privacy (SP 2021), 813-832, 2021 | 42 | 2021 |
Flip: A provable defense framework for backdoor mitigation in federated learning K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ... International Conference on Learning Representations (ICLR 2022), 2022 | 40 | 2022 |
Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting Z Zhang, W You, G Tao, Y Aafer, X Liu, X Zhang IEEE Symposium on Security and Privacy (SP 2021), 659-676, 2021 | 39 | 2021 |