default search action
Shouling Ji
Person information
- affiliation: Zhejiang University, College of Computer Science and Technology, China
- affiliation (PhD 2016): Georgia Institute of Technology, Atlanta, GA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j100]Zuohui Chen, Renxuan Wang, Jingyang Xiang, Yue Yu, Xin Xia, Shouling Ji, Qi Xuan, Xiaoniu Yang:
GGT: Graph-guided testing for adversarial sample detection of deep neural network. Comput. Secur. 140: 103710 (2024) - [j99]Yiming Wu, Gaoyun Lin, Lisong Liu, Zhen Hong, Yangyang Wang, Xing Yang, Zoe Lin Jiang, Shouling Ji, Zhenyu Wen:
MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework. IEEE Internet Things J. 11(14): 25136-25146 (2024) - [j98]Ping He, Xuhong Zhang, Changting Lin, Ting Wang, Shouling Ji:
Towards understanding bogus traffic service in online social networks. Frontiers Inf. Technol. Electron. Eng. 25(3): 415-431 (2024) - [j97]Hao Peng, Zhe Wang, Chao Wei, Dandan Zhao, Guangquan Xu, Jianming Han, Shixin Guo, Ming Zhong, Shouling Ji:
TextJuggler: Fooling text classification tasks by generating high-quality adversarial examples. Knowl. Based Syst. 300: 112188 (2024) - [j96]Jie Su, Zhen Hong, Lei Ye, Tao Liu, Sizhuang Liang, Shouling Ji, Gagangeet Singh Aujla, Reheem Beyah, Zhenyu Wen:
Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices. IEEE Trans. Consumer Electron. 70(1): 4605-4616 (2024) - [j95]Yuwei Li, Yuan Chen, Shouling Ji, Xuhong Zhang, Guanglu Yan, Alex X. Liu, Chunming Wu, Zulie Pan, Peng Lin:
G-Fuzz: A Directed Fuzzing Framework for gVisor. IEEE Trans. Dependable Secur. Comput. 21(1): 168-185 (2024) - [j94]Binbin Zhao, Shouling Ji, Jiacheng Xu, Yuan Tian, Qiuyang Wei, Qinying Wang, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware. IEEE Trans. Dependable Secur. Comput. 21(3): 1372-1389 (2024) - [j93]Hui Sun, Tianqing Zhu, Jie Li, Shouling Ji, Wanlei Zhou:
Attribute-Based Membership Inference Attacks and Defenses on GANs. IEEE Trans. Dependable Secur. Comput. 21(4): 2376-2393 (2024) - [j92]Jinyin Chen, Haibin Zheng, Tao Liu, Jiawei Liu, Yao Cheng, Xuhong Zhang, Shouling Ji:
EdgePro: Edge Deep Learning Model Protection via Neuron Authorization. IEEE Trans. Dependable Secur. Comput. 21(5): 4967-4981 (2024) - [j91]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. IEEE Trans. Dependable Secur. Comput. 21(5): 5029-5045 (2024) - [j90]Yuanchao Chen, Yuwei Li, Zulie Pan, Yuliang Lu, Juxing Chen, Shouling Ji:
URadar: Discovering Unrestricted File Upload Vulnerabilities via Adaptive Dynamic Testing. IEEE Trans. Inf. Forensics Secur. 19: 1251-1266 (2024) - [j89]Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. IEEE Trans. Inf. Forensics Secur. 19: 2623-2638 (2024) - [j88]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang:
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 3435-3450 (2024) - [j87]Hao Peng, Jieshuai Yang, Dandan Zhao, Xiaogang Xu, Yuwen Pu, Jianmin Han, Xing Yang, Ming Zhong, Shouling Ji:
MalGNE: Enhancing the Performance and Efficiency of CFG-Based Malware Detector by Graph Node Embedding in Low Dimension Space. IEEE Trans. Inf. Forensics Secur. 19: 4881-4896 (2024) - [j86]Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, Yanchun Zhang:
Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs. IEEE Trans. Inf. Forensics Secur. 19: 7633-7645 (2024) - [j85]Li Wang, Xiangtao Meng, Dan Li, Xuhong Zhang, Shouling Ji, Shanqing Guo:
DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models. ACM Trans. Priv. Secur. 27(1): 10:1-10:34 (2024) - [c153]Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, Lei Yang:
Let All Be Whitened: Multi-Teacher Distillation for Efficient Visual Retrieval. AAAI 2024: 4126-4135 - [c152]Pengyu Qiu, Yuwen Pu, Yongchao Liu, Wenyan Liu, Yun Yue, Xiaowei Zhu, Lichun Li, Jinbao Li, Shouling Ji:
Integer Is Enough: When Vertical Federated Learning Meets Rounding. AAAI 2024: 14704-14712 - [c151]Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji:
AdaCCD: Adaptive Semantic Contrasts Discovery Based Cross Lingual Adaptation for Code Clone Detection. AAAI 2024: 17942-17950 - [c150]Yunruo Zhang, Lujia Shen, Shanqing Guo, Shouling Ji:
GaLileo: General Linear Relaxation Framework for Tightening Robustness Certification of Transformers. AAAI 2024: 21797-21805 - [c149]Jiashui Wang, Peng Qian, Xilin Huang, Xinlei Ying, Yan Chen, Shouling Ji, Jianhai Chen, Jundong Xie, Long Liu:
Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic Alignment. ISSTA 2024: 1174-1185 - [c148]Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang:
Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization. NAACL-HLT (Findings) 2024: 2959-2971 - [c147]Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. NDSS 2024 - [c146]Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. NDSS 2024 - [c145]Jiacheng Xu, Xuhong Zhang, Shouling Ji, Yuan Tian, Binbin Zhao, Qinying Wang, Peng Cheng, Jiming Chen:
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency. NDSS 2024 - [c144]Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. SP 2024: 2310-2387 - [c143]Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild. USENIX Security Symposium 2024 - [c142]Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang:
Exploring ChatGPT's Capabilities on Vulnerability Management. USENIX Security Symposium 2024 - [c141]Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang:
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks. USENIX Security Symposium 2024 - [c140]Dinghao Liu, Shouling Ji, Kangjie Lu, Qinming He:
Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis. USENIX Security Symposium 2024 - [c139]Dinghao Liu, Zhipeng Lu, Shouling Ji, Kangjie Lu, Jianhai Chen, Zhenguang Liu, Dexin Liu, Renyi Cai, Qinming He:
Detecting Kernel Memory Bugs through Inconsistent Memory Management Intention Inferences. USENIX Security Symposium 2024 - [c138]Yi Xiang, Xuhong Zhang, Peiyu Liu, Shouling Ji, Xiao Xiao, Hong Liang, Jiacheng Xu, Wenhai Wang:
Critical Code Guided Directed Greybox Fuzzing for Commits. USENIX Security Symposium 2024 - [i106]Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service. CoRR abs/2401.02615 (2024) - [i105]Mengyao Du, Miao Zhang, Yuwen Pu, Kai Xu, Shouling Ji, Quanjun Yin:
The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness. CoRR abs/2401.14027 (2024) - [i104]Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, Shouling Ji:
SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems. CoRR abs/2402.03741 (2024) - [i103]Yong Yang, Xuhong Zhang, Yi Jiang, Xi Chen, Haoyu Wang, Shouling Ji, Zonghui Wang:
PRSA: Prompt Reverse Stealing Attacks against Large Language Models. CoRR abs/2402.19200 (2024) - [i102]Zhenyuan Li, Yangyang Wei, Xiangmin Shen, Lingzhi Wang, Yan Chen, Haitao Xu, Shouling Ji, Fan Zhang:
TAGS: Real-time Intrusion Detection with Tag-Propagation-based Provenance Graph Alignment on Streaming Events. CoRR abs/2403.12541 (2024) - [i101]Zhe Ma, Xuhong Zhang, Qingming Li, Tianyu Du, Wenzhi Chen, Zonghui Wang, Shouling Ji:
Could It Be Generated? Towards Practical Analysis of Memorization in Text-To-Image Diffusion Models. CoRR abs/2405.05846 (2024) - [i100]Yang Dai, Oubo Ma, Longfei Zhang, Xingxing Liang, Shengchao Hu, Mengzhu Wang, Shouling Ji, Jincai Huang, Li Shen:
Is Mamba Compatible with Trajectory Optimization in Offline Reinforcement Learning? CoRR abs/2405.12094 (2024) - [i99]Yuwen Pu, Jiahao Chen, Chunyi Zhou, Zhou Feng, Qingming Li, Chunqiang Hu, Shouling Ji:
How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data? CoRR abs/2405.12719 (2024) - [i98]Yuwen Pu, Zhuoyuan Ding, Jiahao Chen, Chunyi Zhou, Qingming Li, Chunqiang Hu, Shouling Ji:
A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning. CoRR abs/2405.12751 (2024) - [i97]Jiahao Chen, Zhiqiang Shen, Yuwen Pu, Chunyi Zhou, Changjiang Li, Ting Wang, Shouling Ji:
Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective. CoRR abs/2405.12786 (2024) - [i96]Qingming Li, Juzheng Miao, Puning Zhao, Li Zhou, Shouling Ji, Bowen Zhou, Furui Liu:
Emulating Full Client Participation: A Long-Term Client Selection Strategy for Federated Learning. CoRR abs/2405.13584 (2024) - [i95]Tong Ye, Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji, Wenhai Wang:
Uncovering LLM-Generated Code: A Zero-Shot Synthetic Code Detector via Code Rewriting. CoRR abs/2405.16133 (2024) - [i94]Changjiang Li, Ren Pang, Bochuan Cao, Jinghui Chen, Fenglong Ma, Shouling Ji, Ting Wang:
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models. CoRR abs/2406.09669 (2024) - [i93]Tong Ye, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji, Wenhai Wang:
Iterative or Innovative? A Problem-Oriented Perspective for Code Optimization. CoRR abs/2406.11935 (2024) - [i92]Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild. CoRR abs/2407.02886 (2024) - [i91]Yifan Xia, Zichen Xie, Peiyu Liu, Kangjie Lu, Yan Liu, Wenhai Wang, Shouling Ji:
Exploring Automatic Cryptographic API Misuse Detection in the Era of LLMs. CoRR abs/2407.16576 (2024) - [i90]Jiahao Chen, Zhou Feng, Rui Zeng, Yuwen Pu, Chunyi Zhou, Yi Jiang, Yuyou Gan, Jinbao Li, Shouling Ji:
Enhancing Adversarial Transferability with Adversarial Weight Tuning. CoRR abs/2408.09469 (2024) - [i89]Xing He, Jiahao Chen, Yuwen Pu, Qingming Li, Chunyi Zhou, Yingcai Wu, Jinbao Li, Shouling Ji:
CAMH: Advancing Model Hijacking Attack in Machine Learning. CoRR abs/2408.13741 (2024) - [i88]Rui Zeng, Xi Chen, Yuwen Pu, Xuhong Zhang, Tianyu Du, Shouling Ji:
CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models. CoRR abs/2409.01193 (2024) - 2023
- [j84]Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu:
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. Comput. Secur. 128: 103134 (2023) - [j83]Zhixiao Fu, Xinyuan Chen, Daizong Liu, Xiaoye Qu, Jianfeng Dong, Xuhong Zhang, Shouling Ji:
Multi-level feature disentanglement network for cross-dataset face forgery detection. Image Vis. Comput. 135: 104686 (2023) - [j82]Hao Peng, Shixin Guo, Dandan Zhao, Yiming Wu, Jianming Han, Zhe Wang, Shouling Ji, Ming Zhong:
Query-efficient model extraction for text classification model in a hard label setting. J. King Saud Univ. Comput. Inf. Sci. 35(4): 10-20 (2023) - [j81]Hao Peng, Zhe Wang, Dandan Zhao, Yiming Wu, Jianming Han, Shixin Guo, Shouling Ji, Ming Zhong:
Efficient text-based evolution algorithm to hard-label adversarial attacks on text. J. King Saud Univ. Comput. Inf. Sci. 35(5): 101539 (2023) - [j80]Zhenguang Liu, Shuang Wu, Shuyuan Jin, Shouling Ji, Qi Liu, Shijian Lu, Li Cheng:
Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction. IEEE Trans. Pattern Anal. Mach. Intell. 45(1): 681-697 (2023) - [j79]Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem Beyah:
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study. IEEE Trans. Dependable Secur. Comput. 20(2): 1169-1185 (2023) - [j78]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, Ting Wang:
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 3653-3668 (2023) - [j77]Shuiguang Deng, Yishan Chen, Gong Chen, Shouling Ji, Jianwei Yin, Albert Y. Zomaya:
Incentive-Driven Proactive Application Deployment and Pricing on Distributed Edges. IEEE Trans. Mob. Comput. 22(2): 951-967 (2023) - [j76]Xiang Ling, Lingfei Wu, Saizhuo Wang, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Multilevel Graph Matching Networks for Deep Graph Similarity Learning. IEEE Trans. Neural Networks Learn. Syst. 34(2): 799-813 (2023) - [c137]Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji:
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. CCS 2023: 90-104 - [c136]Yi Jiang, Chenghui Shi, Oubo Ma, Youliang Tian, Shouling Ji:
Text Laundering: Mitigating Malicious Features Through Knowledge Distillation of Large Foundation Models. Inscrypt (2) 2023: 3-23 - [c135]Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang:
CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code. EMNLP 2023: 14740-14752 - [c134]Yifan Xia, Ping He, Xuhong Zhang, Peiyu Liu, Shouling Ji, Wenhai Wang:
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection. ESORICS (2) 2023: 255-276 - [c133]Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang:
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning. ICCV 2023: 4344-4355 - [c132]Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, Ting Wang:
The Dark Side of AutoML: Towards Architectural Backdoor Search. ICLR 2023 - [c131]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang:
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks. NeurIPS 2023 - [c130]Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Jingchang Qin, Wenhai Wang, Wenzhi Chen:
How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices. SP 2023: 3365-3381 - [c129]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. USENIX Security Symposium 2023: 3259-3276 - [c128]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. USENIX Security Symposium 2023: 3421-3438 - [c127]Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng:
Detecting Union Type Confusion in Component Object Model. USENIX Security Symposium 2023: 4265-4281 - [c126]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Peng Cheng, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. USENIX Security Symposium 2023: 4517-4534 - [c125]Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin:
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. USENIX Security Symposium 2023: 6399-6416 - [d1]Jie Su, Zhen Hong, Lei Ye, Tao Liu, Sizhuang Liang, Shouling Ji, Gagangeet Singh Aujla, Reheem Beyah, Zhenyu Wen:
AC Power Consumption Dataset. IEEE DataPort, 2023 - [i87]Lujia Shen, Xuhong Zhang, Shouling Ji, Yuwen Pu, Chunpeng Ge, Xing Yang, Yanghe Feng:
TextDefense: Adversarial Text Detection based on Word Importance Entropy. CoRR abs/2302.05892 (2023) - [i86]Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin:
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. CoRR abs/2302.14500 (2023) - [i85]Chenyang Lyu, Jiacheng Xu, Shouling Ji, Xuhong Zhang, Qinying Wang, Binbin Zhao, Gaoning Pan, Wei Cao, Raheem Beyah:
MINER: A Hybrid Data-Driven Approach for REST API Fuzzing. CoRR abs/2303.02545 (2023) - [i84]Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang, Shouling Ji:
Edge Deep Learning Model Protection via Neuron Authorization. CoRR abs/2303.12397 (2023) - [i83]Yuxuan Duan, Xuhong Zhang, Chuer Yu, Zonghui Wang, Shouling Ji, Wenzhi Chen:
Watch Out for the Confusing Faces: Detecting Face Swapping with the Probability Distribution of Face Identification Models. CoRR abs/2303.13131 (2023) - [i82]Chuer Yu, Xuhong Zhang, Yuxuan Duan, Senbo Yan, Zonghui Wang, Yang Xiang, Shouling Ji, Wenzhi Chen:
Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection. CoRR abs/2303.18174 (2023) - [i81]Yunruo Zhang, Tianyu Du, Shouling Ji, Peng Tang, Shanqing Guo:
RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks. CoRR abs/2304.07980 (2023) - [i80]Yuchen Sun, Tianpeng Liu, Panhe Hu, Qing Liao, Shouling Ji, Nenghai Yu, Deke Guo, Li Liu:
Deep Intellectual Property: A Survey. CoRR abs/2304.14613 (2023) - [i79]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. CoRR abs/2305.02383 (2023) - [i78]Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Wenhai Wang, Shouling Ji:
Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization. CoRR abs/2305.11074 (2023) - [i77]Binbin Zhao, Shouling Ji, Xuhong Zhang, Yuan Tian, Qinying Wang, Yuwen Pu, Chenyang Lyu, Raheem Beyah:
UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware. CoRR abs/2306.11206 (2023) - [i76]Ping He, Yifan Xia, Xuhong Zhang, Shouling Ji:
Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting. CoRR abs/2309.01866 (2023) - [i75]Linkang Du, Min Chen, Mingyang Sun, Shouling Ji, Peng Cheng, Jiming Chen, Zhikun Zhang:
ORL-AUDITOR: Dataset Auditing in Offline Deep Reinforcement Learning. CoRR abs/2309.03081 (2023) - [i74]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang:
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks. CoRR abs/2309.13256 (2023) - [i73]Qinying Wang, Boyu Chang, Shouling Ji, Yuan Tian, Xuhong Zhang, Binbin Zhao, Gaoning Pan, Chenyang Lyu, Mathias Payer, Wenhai Wang, Raheem Beyah:
SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices. CoRR abs/2309.14742 (2023) - [i72]Yaguan Qian, Chenyu Zhao, Zhaoquan Gu, Bin Wang, Shouling Ji, Wei Wang, Boyang Zhou, Pan Zhou:
F2AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns. CoRR abs/2310.14561 (2023) - [i71]Yuwen Pu, Jiahao Chen, Jiayu Pan, Hao Li, Diqun Yan, Xuhong Zhang, Shouling Ji:
Facial Data Minimization: Shallow Model as Your Privacy Filter. CoRR abs/2310.15590 (2023) - [i70]Tong Ye, Lingfei Wu, Tengfei Ma, Xuhong Zhang, Yangkai Du, Peiyu Liu, Shouling Ji, Wenhai Wang:
CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code. CoRR abs/2310.16853 (2023) - [i69]Yifan Xia, Ping He, Xuhong Zhang, Peiyu Liu, Shouling Ji, Wenhai Wang:
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection. CoRR abs/2310.17304 (2023) - [i68]Peiyu Liu, Junming Liu, Lirong Fu, Kangjie Lu, Yifan Xia, Xuhong Zhang, Wenzhi Chen, Haiqin Weng, Shouling Ji, Wenhai Wang:
How ChatGPT is Solving Vulnerability Management Problem. CoRR abs/2311.06530 (2023) - [i67]Yangkai Du, Tengfei Ma, Lingfei Wu, Xuhong Zhang, Shouling Ji:
AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection. CoRR abs/2311.07277 (2023) - [i66]Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. CoRR abs/2311.17400 (2023) - [i65]Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang:
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks. CoRR abs/2312.09057 (2023) - [i64]Zhe Ma, Jianfeng Dong, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Zonghui Wang, Sifeng He, Feng Qian, Xiaobo Zhang, Lei Yang:
Let All be Whitened: Multi-teacher Distillation for Efficient Visual Retrieval. CoRR abs/2312.09716 (2023) - [i63]Zeyu Li, Chenghui Shi, Yuwen Pu, Xuhong Zhang, Yu Li, Jinbao Li, Shouling Ji:
MEAOD: Model Extraction Attack against Object Detectors. CoRR abs/2312.14677 (2023) - 2022
- [j75]Juan Du, Dajian Zeng, Zhao Li, Jingxuan Liu, Mingqi Lv, Ling Chen, Dan Zhang, Shouling Ji:
An interpretable outcome prediction model based on electronic health records and hierarchical attention. Int. J. Intell. Syst. 37(6): 3460-3479 (2022) - [j74]Lirong Fu, Shouling Ji, Changchang Liu, Peiyu Liu, Fuzheng Duan, Zonghui Wang, Whenzhi Chen, Ting Wang:
Focus : Function clone identification on cross-platform. Int. J. Intell. Syst. 37(8): 5082-5112 (2022) - [j73]Tianyu Du, Shouling Ji, Bo Wang, Sirui He, Jinfeng Li, Bo Li, Tao Wei, Yunhan Jia, Raheem Beyah, Ting Wang:
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks. Int. J. Intell. Syst. 37(9): 6463-6492 (2022) - [j72]Rui Wang, Zhihua Wei, Haoran Duan, Shouling Ji, Yang Long, Zhen Hong:
EfficientTDNN: Efficient Architecture Search for Speaker Recognition. IEEE ACM Trans. Audio Speech Lang. Process. 30: 2267-2279 (2022) - [j71]Yuwei Li, Shouling Ji, Chenyang Lyu, Yuan Chen, Jianhai Chen, Qinchen Gu, Chunming Wu, Raheem Beyah:
V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs. IEEE Trans. Cybern. 52(5): 3745-3756 (2022) - [j70]