default search action
Kui Ren 0001
Person information
- affiliation: Zhejiang University, School of Cyber Science and Technology, Hangzhou, China
- affiliation (former): State University of New York af Buffalo, Department of Computer Science and Engineering, NY, USA
- affiliation (former): Illinois Institute of Technology, Chicago, IL, USA
- affiliation (former, PhD): Worcester Polytechnic Institute, MA, USA
Other persons with the same name
- Kui Ren — disambiguation page
- Kui Ren 0002 — Columbia University, Department of Applied Physics and Applied Mathematics, NY, USA (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j228]Xiaochen Li, Weiran Liu, Jian Lou, Yuan Hong, Lei Zhang, Zhan Qin, Kui Ren:
Local Differentially Private Heavy Hitter Detection in Data Streams with Bounded Memory. Proc. ACM Manag. Data 2(1): 30:1-30:27 (2024) - [j227]Haocheng Xia, Xiang Li, Junyuan Pang, Jinfei Liu, Kui Ren, Li Xiong:
P-Shapley: Shapley Values on Probabilistic Classifiers. Proc. VLDB Endow. 17(7): 1737-1750 (2024) - [j226]Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li, Kui Ren:
SWAT: A System-Wide Approach to Tunable Leakage Mitigation in Encrypted Data Stores. Proc. VLDB Endow. 17(10): 2445-2458 (2024) - [j225]Yiding Zhu, Hongwei Zhang, Jiayao Zhang, Jinfei Liu, Kui Ren:
DataPrice: An Interactive System for Pricing Datasets in Data Marketplaces. Proc. VLDB Endow. 17(12): 4433-4436 (2024) - [j224]Peng Cheng, Yuexin Wu, Yuan Hong, Zhongjie Ba, Feng Lin, Li Lu, Kui Ren:
UniAP: Protecting Speech Privacy With Non-Targeted Universal Adversarial Perturbations. IEEE Trans. Dependable Secur. Comput. 21(1): 31-46 (2024) - [j223]Yijie Shen, Feng Lin, Chao Wang, Tiantian Liu, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
MotoPrint: Reconfigurable Vibration Motor Fingerprint via Homologous Signals Learning. IEEE Trans. Dependable Secur. Comput. 21(1): 372-387 (2024) - [j222]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. IEEE Trans. Dependable Secur. Comput. 21(1): 403-418 (2024) - [j221]Meng Luo, Bo Feng, Long Lu, Engin Kirda, Kui Ren:
On the Complexity of the Web's PKI: Evaluating Certificate Validation of Mobile Browsers. IEEE Trans. Dependable Secur. Comput. 21(1): 419-433 (2024) - [j220]Jianwei Liu, Yinghui He, Chaowei Xiao, Jinsong Han, Kui Ren:
Time to Think the Security of WiFi-Based Behavior Recognition Systems. IEEE Trans. Dependable Secur. Comput. 21(1): 449-462 (2024) - [j219]Jianwei Liu, Xiang Zou, Leqi Zhao, Yusheng Tao, Sideng Hu, Jinsong Han, Kui Ren:
Privacy Leakage in Wireless Charging. IEEE Trans. Dependable Secur. Comput. 21(2): 501-514 (2024) - [j218]Xiaochen Li, Weiran Liu, Hanwen Feng, Kunzhe Huang, Yuke Hu, Jinfei Liu, Kui Ren, Zhan Qin:
Privacy Enhancement Via Dummy Points in the Shuffle Model. IEEE Trans. Dependable Secur. Comput. 21(3): 1001-1016 (2024) - [j217]Zhihua Tian, Rui Zhang, Xiaoyang Hou, Lingjuan Lyu, Tianyi Zhang, Jian Liu, Kui Ren:
${\sf FederBoost}$: Private Federated Learning for GBDT. IEEE Trans. Dependable Secur. Comput. 21(3): 1274-1285 (2024) - [j216]Tianpei Lu, Bingsheng Zhang, Kui Ren:
PrivData Network: A Privacy-Preserving On-Chain Data Factory and Trading Market. IEEE Trans. Dependable Secur. Comput. 21(3): 1424-1436 (2024) - [j215]Zhibo Wang, Wenxin Liu, Jiahui Hu, Hengchang Guo, Zhan Qin, Jian Liu, Kui Ren:
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 21(4): 1572-1586 (2024) - [j214]Hongwei Yao, Zheng Li, Kunzhe Huang, Jian Lou, Zhan Qin, Kui Ren:
RemovalNet: DNN Fingerprint Removal Attacks. IEEE Trans. Dependable Secur. Comput. 21(4): 2645-2658 (2024) - [j213]Anxiao He, Kai Bu, Jiongrui Huang, Yifei Pang, Qianping Gu, Kui Ren:
SwiftParade: Anti-Burst Multipath Validation. IEEE Trans. Dependable Secur. Comput. 21(4): 2720-2734 (2024) - [j212]Feng Lin, Chao Wang, Tiantian Liu, Ziwei Liu, Yijie Shen, Zhongjie Ba, Li Lu, Wenyao Xu, Kui Ren:
High-Quality Speech Recovery Through Soundproof Protections via mmWave Sensing. IEEE Trans. Dependable Secur. Comput. 21(4): 3065-3081 (2024) - [j211]Yibiao Lu, Bingsheng Zhang, Kui Ren:
Maliciously Secure MPC From Semi-Honest 2PC in the Server-Aided Model. IEEE Trans. Dependable Secur. Comput. 21(4): 3109-3125 (2024) - [j210]Guodong Cao, Zhibo Wang, Yunhe Feng, Xiaowei Dong, Zhifei Zhang, Zhan Qin, Kui Ren:
Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models. IEEE Trans. Dependable Secur. Comput. 21(4): 3390-3405 (2024) - [j209]Zhuo Chen, Lei Wu, Yubo Hu, Jing Cheng, Yufeng Hu, Yajin Zhou, Zhushou Tang, Yexuan Chen, Jinku Li, Kui Ren:
Lifting the Grey Curtain: Analyzing the Ecosystem of Android Scam Apps. IEEE Trans. Dependable Secur. Comput. 21(4): 3406-3421 (2024) - [j208]Mengming Li, Kai Bu, Chenlu Miao, Kui Ren:
TreasureCache: Hiding Cache Evictions Against Side-Channel Attacks. IEEE Trans. Dependable Secur. Comput. 21(5): 4574-4588 (2024) - [j207]Jian Liu, Peilun Li, Fan Zhang, Kui Ren:
$\mathsf {monoCash}$monoCash: A Channel-Free Payment Network via Trusted Monotonic Counters. IEEE Trans. Dependable Secur. Comput. 21(5): 4770-4783 (2024) - [j206]Meng Chen, Li Lu, Jiadi Yu, Zhongjie Ba, Feng Lin, Kui Ren:
AdvReverb: Rethinking the Stealthiness of Audio Adversarial Examples to Human Perception. IEEE Trans. Inf. Forensics Secur. 19: 1948-1962 (2024) - [j205]Feng Lin, Hao Yan, Jin Li, Ziwei Liu, Li Lu, Zhongjie Ba, Kui Ren:
PhaDe: Practical Phantom Spoofing Attack Detection for Autonomous Vehicles. IEEE Trans. Inf. Forensics Secur. 19: 4199-4214 (2024) - [j204]Zhongjie Ba, Bin Gong, Yuwei Wang, Yuxuan Liu, Peng Cheng, Feng Lin, Li Lu, Kui Ren:
Indelible "Footprints" of Inaudible Command Injection. IEEE Trans. Inf. Forensics Secur. 19: 8485-8499 (2024) - [j203]Ming Gao, Yike Chen, Yimin Li, Lingfeng Zhang, Jianwei Liu, Li Lu, Feng Lin, Jinsong Han, Kui Ren:
A Resilience Evaluation Framework on Ultrasonic Microphone Jammers. IEEE Trans. Mob. Comput. 23(2): 1914-1929 (2024) - [j202]Zhibo Wang, Yunan Sun, Defang Liu, Jiahui Hu, Xiaoyi Pang, Yuke Hu, Kui Ren:
Location Privacy-Aware Task Offloading in Mobile Edge Computing. IEEE Trans. Mob. Comput. 23(3): 2269-2283 (2024) - [j201]Ming Gao, Lingfeng Zhang, Leming Shen, Xiang Zou, Jinsong Han, Feng Lin, Kui Ren:
Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF Systems. IEEE Trans. Mob. Comput. 23(5): 3539-3557 (2024) - [j200]Jiahui Hu, Zhibo Wang, Yongsheng Shen, Bohan Lin, Peng Sun, Xiaoyi Pang, Jian Liu, Kui Ren:
Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning. IEEE/ACM Trans. Netw. 32(2): 1407-1422 (2024) - [c280]Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren:
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. AAAI 2024: 719-728 - [c279]Wenqing Chen, Weicheng Wang, Zhixuan Chu, Kui Ren, Zibin Zheng, Zhichao Lu:
Self-Para-Consistency: Improving Reasoning Tasks at Low Cost for Large Language Models. ACL (Findings) 2024: 14162-14167 - [c278]Jun Bao, Buyu Liu, Kui Ren, Jun Yu:
GLOW: Global Layout Aware Attacks on Object Detection. CVPR 2024: 12057-12066 - [c277]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Practical Constructions for Single Input Functionality Against a Dishonest Majority. EuroS&P 2024: 398-414 - [c276]Xiaoyang Hou, Jian Liu, Tianyu Tu, Rui Zhang, Kui Ren:
PrivRE: Regular Expression Matching for Encrypted Packet Inspection. ICDCS 2024: 1306-1317 - [c275]Xinle Cao, Yuhan Li, Dmytro Bogatov, Jian Liu, Kui Ren:
Secure and Practical Functional Dependency Discovery in Outsourced Databases. ICDE 2024: 1645-1658 - [c274]Yuran Bi, Jinfei Liu, Chen Zhao, Junyi Zhao, Kui Ren, Li Xiong:
Share: Stackelberg-Nash based Data Markets. ICDE 2024: 3573-3586 - [c273]Yuran Bi, Yihang Wu, Jinfei Liu, Kui Ren, Li Xiong:
When Data Pricing Meets Non-Cooperative Game Theory. ICDE 2024: 5548-5559 - [c272]Xiong Xu, Kunzhe Huang, Yiming Li, Zhan Qin, Kui Ren:
Towards Reliable and Efficient Backdoor Trigger Inversion via Decoupling Benign Features. ICLR 2024 - [c271]Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren:
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem. ICSE 2024: 24:1-24:13 - [c270]Pingchuan Ma, Zhenlan Ji, Peisen Yao, Shuai Wang, Kui Ren:
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning. ICSE 2024: 30:1-30:13 - [c269]Mingxue Zhang, Wei Meng, You Zhou, Kui Ren:
CSChecker: Revisiting GDPR and CCPA Compliance of Cookie Banners on the Web. ICSE 2024: 174:1-174:12 - [c268]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. INFOCOM 2024: 151-160 - [c267]Yajie Zhou, Xiaoyi Pang, Zhibo Wang, Jiahui Hu, Peng Sun, Kui Ren:
Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments. INFOCOM 2024: 2448-2457 - [c266]Qianniu Chen, Zhehan Gu, Li Lu, Xiangyu Xu, Zhongjie Ba, Feng Lin, Zhenguang Liu, Kui Ren:
Conan's Bow Tie: A Streaming Voice Conversion for Real-Time VTuber Livestreaming. IUI 2024: 35-50 - [c265]Anxiao He, Jiandong Fu, Kai Bu, Ruiqi Zhou, Chenlu Miao, Kui Ren:
Symphony: Path Validation at Scale. NDSS 2024 - [c264]Ge Ren, Gaolei Li, Shenghong Li, Libo Chen, Kui Ren:
ActiveDaemon: Unconscious DNN Dormancy and Waking Up via User-specific Invisible Token. NDSS 2024 - [c263]Xiang Chen, Qingjiang Xiao, Hongyan Liu, Qun Huang, Dong Zhang, Xuan Liu, Longbing Hu, Haifeng Zhou, Chunming Wu, Kui Ren:
Eagle: Toward Scalable and Near-Optimal Network-Wide Sketch Deployment in Network Measurement. SIGCOMM 2024: 291-310 - [c262]Hongwei Yao, Jian Lou, Zhan Qin, Kui Ren:
PromptCARE: Prompt Copyright Protection by Watermark Injection and Verification. SP 2024: 845-861 - [c261]Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. SP 2024: 1628-1645 - [c260]Xinyu Zhang, Hanbin Hong, Yuan Hong, Peng Huang, Binghui Wang, Zhongjie Ba, Kui Ren:
Text-CRS: A Generalized Certified Robustness Framework against Textual Adversarial Attacks. SP 2024: 2920-2938 - [c259]Jian Liu, Jingyu Li, Di Wu, Kui Ren:
PIRANA: Faster Multi-query PIR via Constant-weight Codes. SP 2024: 4315-4330 - [c258]Tiantian Liu, Feng Lin, Zhongjie Ba, Li Lu, Zhan Qin, Kui Ren:
MicGuard: A Comprehensive Detection System against Out-of-band Injection Attacks for Different Level Microphone-based Devices. USENIX Security Symposium 2024 - [c257]Kun Wang, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition. USENIX Security Symposium 2024 - [c256]Chao Wang, Feng Lin, Hao Yan, Tong Wu, Wenyao Xu, Kui Ren:
VibSpeech: Exploring Practical Wideband Eavesdropping via Bandlimited Signal of Vibration-based Side Channel. USENIX Security Symposium 2024 - [c255]Meng Chen, Xiangyu Xu, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
Devil in the Room: Triggering Audio Backdoors in the Physical World. USENIX Security Symposium 2024 - [c254]Shuaifan Jin, He Wang, Zhibo Wang, Feng Xiao, Jiahui Hu, Yuan He, Wenwen Zhang, Zhongjie Ba, Weijie Fang, Shuhong Yuan, Kui Ren:
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition. USENIX Security Symposium 2024 - [c253]Jian Liu, Rui Zhang, Sebastian Szyller, Kui Ren, N. Asokan:
False Claims against Model Ownership Resolution. USENIX Security Symposium 2024 - [i126]Shoupeng Ren, Tianyu Tu, Jian Liu, Di Wu, Kui Ren:
LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts. CoRR abs/2401.07261 (2024) - [i125]Zhixuan Chu, Yan Wang, Qing Cui, Longfei Li, Wenqing Chen, Sheng Li, Zhan Qin, Kui Ren:
LLM-Guided Multi-View Hypergraph Learning for Human-Centric Explainable Recommendation. CoRR abs/2401.08217 (2024) - [i124]Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Yang Wang, Kui Ren:
Phoneme-Based Proactive Anti-Eavesdropping with Controlled Recording Privilege. CoRR abs/2401.15704 (2024) - [i123]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. CoRR abs/2401.17606 (2024) - [i122]Qi Zhou, Dongxia Wang, Tianlin Li, Zhihong Xu, Yang Liu, Kui Ren, Wenhai Wang, Qing Guo:
FoolSDEdit: Deceptively Steering Your Edits Towards Targeted Attribute-aware Distribution. CoRR abs/2402.03705 (2024) - [i121]Zhihao Liu, Jian Lou, Wenjie Bao, Yuke Hu, Bo Li, Zhan Qin, Kui Ren:
Differentially Private Zeroth-Order Methods for Scalable Large Language Model Finetuning. CoRR abs/2402.07818 (2024) - [i120]Zhongjie Ba, Qingyu Liu, Zhenguang Liu, Shuang Wu, Feng Lin, Li Lu, Kui Ren:
Exposing the Deception: Uncovering More Forgery Clues for Deepfake Detection. CoRR abs/2403.01786 (2024) - [i119]Di Wu, Jian Liu, Zhengwei Hou, Wu Wen, Kui Ren:
ECHO: Efficient Off-Chain Payments and Cross-Chain Swaps for Cryptocurrencies. CoRR abs/2403.15191 (2024) - [i118]Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Zhenqiang Gong, Kui Ren:
SoK: Gradient Leakage in Federated Learning. CoRR abs/2404.05403 (2024) - [i117]Jianhong Zhao, Yongwang Zhao, Peisen Yao, Fanlang Zeng, Bohua Zhan, Kui Ren:
KBX: Verified Model Synchronization via Formal Bidirectional Transformation. CoRR abs/2404.18771 (2024) - [i116]Yiling He, Junchi Lei, Zhan Qin, Kui Ren:
Going Proactive and Explanatory Against Malware Concept Drift. CoRR abs/2405.04095 (2024) - [i115]Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren:
A Causal Explainable Guardrails for Large Language Models. CoRR abs/2405.04160 (2024) - [i114]Zhixuan Chu, Lei Zhang, Yichen Sun, Siqiao Xue, Zhibo Wang, Zhan Qin, Kui Ren:
Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models. CoRR abs/2405.04180 (2024) - [i113]Shuo Shao, Yiming Li, Hongwei Yao, Yiling He, Zhan Qin, Kui Ren:
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution. CoRR abs/2405.04825 (2024) - [i112]Xiaohan Yuan, Jinfeng Li, Dongxia Wang, Yuefeng Chen, Xiaofeng Mao, Longtao Huang, Hui Xue, Wenhai Wang, Kui Ren, Jingyi Wang:
S-Eval: Automatic and Adaptive Test Generation for Benchmarking Safety Evaluation of Large Language Models. CoRR abs/2405.14191 (2024) - [i111]Zhibo Wang, Peng Kuang, Zhixuan Chu, Jingyi Wang, Kui Ren:
Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation. CoRR abs/2405.15240 (2024) - [i110]Lei Liu, Xiaoyan Yang, Junchi Lei, Xiaoyang Liu, Yue Shen, Zhiqiang Zhang, Peng Wei, Jinjie Gu, Zhixuan Chu, Zhan Qin, Kui Ren:
A Survey on Medical Large Language Models: Technology, Application, Trustworthiness, and Future Directions. CoRR abs/2406.03712 (2024) - [i109]Jiacheng Du, Zhibo Wang, Kui Ren:
Textual Unlearning Gives a False Sense of Unlearning. CoRR abs/2406.13348 (2024) - [i108]Yihao Zheng, Haocheng Xia, Junyuan Pang, Jinfei Liu, Kui Ren, Lingyang Chu, Yang Cao, Li Xiong:
TabularMark: Watermarking Tabular Datasets for Machine Learning. CoRR abs/2406.14841 (2024) - [i107]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. CoRR abs/2406.15731 (2024) - [i106]Yichen Sun, Zhixuan Chu, Zhan Qin, Kui Ren:
Prompt-Consistency Image Generation (PCIG): A Unified Framework Integrating LLMs, Knowledge Graphs, and Controllable Diffusion Models. CoRR abs/2406.16333 (2024) - [i105]Sifan Wu, Zhenguang Liu, Beibei Zhang, Roger Zimmermann, Zhongjie Ba, Xiaosong Zhang, Kui Ren:
Do As I Do: Pose Guided Human Motion Copy. CoRR abs/2406.16601 (2024) - [i104]Binhao Ma, Tianhang Zheng, Hongsheng Hu, Di Wang, Shuo Wang, Zhongjie Ba, Zhan Qin, Kui Ren:
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning. CoRR abs/2407.05112 (2024) - [i103]Yuchen Yang, Hongwei Yao, Bingrun Yang, Yiling He, Yiming Li, Tianwei Zhang, Zhan Qin, Kui Ren:
TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs. CoRR abs/2407.09164 (2024) - [i102]Huiyu Xu, Wenhui Zhang, Zhibo Wang, Feng Xiao, Rui Zheng, Yunhe Feng, Zhongjie Ba, Kui Ren:
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent. CoRR abs/2407.16667 (2024) - [i101]Peng Cheng, Yuwei Wang, Peng Huang, Zhongjie Ba, Xiaodong Lin, Feng Lin, Li Lu, Kui Ren:
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features. CoRR abs/2408.01808 (2024) - [i100]Jiawen Zhang, Jian Liu, Xinpeng Yang, Yinghao Wang, Kejia Chen, Xiaoyang Hou, Kui Ren, Xiaohu Yang:
Secure Transformer Inference Made Non-interactive. IACR Cryptol. ePrint Arch. 2024: 136 (2024) - [i99]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal. IACR Cryptol. ePrint Arch. 2024: 305 (2024) - [i98]Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Distributed Point Function with Constraints, Revisited. IACR Cryptol. ePrint Arch. 2024: 937 (2024) - [i97]Tianpei Lu, Xin Kang, Bingsheng Zhang, Zhuo Ma, Xiaoyuan Zhang, Yang Liu, Kui Ren:
Efficient 2PC for Constant Round Secure Equality Testing and Comparison. IACR Cryptol. ePrint Arch. 2024: 949 (2024) - [i96]Xiaoyang Hou, Jian Liu, Jingyu Li, Jiawen Zhang, Kui Ren:
Faster Lookup Table Evaluation with Application to Secure LLM Inference. IACR Cryptol. ePrint Arch. 2024: 1093 (2024) - [i95]Tianpei Lu, Bingsheng Zhang, Xiaoyuan Zhang, Kui Ren:
A New PPML Paradigm for Quantized Models. IACR Cryptol. ePrint Arch. 2024: 1132 (2024) - 2023
- [j199]Zhibo Wang, Jingjing Ma, Xue Wang, Jiahui Hu, Zhan Qin, Kui Ren:
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. ACM Comput. Surv. 55(7): 134:1-134:36 (2023) - [j198]Lei Wang, Meng Chen, Li Lu, Zhongjie Ba, Feng Lin, Kui Ren:
VoiceListener: A Training-free and Universal Eavesdropping Attack on Built-in Speakers of Mobile Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(1): 32:1-32:22 (2023) - [j197]Meng Chen, Li Lu, Junhao Wang, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 48:1-48:21 (2023) - [j196]Antonino Rullo, Elisa Bertino, Kui Ren:
Guest Editorial Special Issue on Intrusion Detection for the Internet of Things. IEEE Internet Things J. 10(10): 8327-8330 (2023) - [j195]Jiayao Zhang, Qiheng Sun, Jinfei Liu, Li Xiong, Jian Pei, Kui Ren:
Efficient Sampling Approaches to Shapley Value Approximation. Proc. ACM Manag. Data 1(1): 48:1-48:24 (2023) - [j194]Xinle Cao, Jian Liu, Yongsheng Shen, Xiaohua Ye, Kui Ren:
Frequency-revealing attacks against Frequency-hiding Order-preserving Encryption. Proc. VLDB Endow. 16(11): 3124-3136 (2023) - [j193]Haocheng Xia, Jinfei Liu, Jian Lou, Zhan Qin, Kui Ren, Yang Cao, Li Xiong:
Equitable Data Valuation Meets the Right to Be Forgotten in Model Markets. Proc. VLDB Endow. 16(11): 3349-3362 (2023) - [j192]Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo:
Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 519-542 (2023) - [j191]Jian Lin, Dingding Wang, Rui Chang, Lei Wu, Yajin Zhou, Kui Ren:
EnBinDiff: Identifying Data-Only Patches for Binaries. IEEE Trans. Dependable Secur. Comput. 20(1): 343-359 (2023) - [j190]Xinliang Miao, Rui Chang, Jianhong Zhao, Yongwang Zhao, Shuang Cao, Tao Wei, Liehui Jiang, Kui Ren:
CVTEE: A Compatible Verified TEE Architecture With Enhanced Security. IEEE Trans. Dependable Secur. Comput. 20(1): 377-391 (2023) - [j189]Jianwei Liu, Chaowei Xiao, Kaiyan Cui, Jinsong Han, Xian Xu, Kui Ren:
Behavior Privacy Preserving in RF Sensing. IEEE Trans. Dependable Secur. Comput. 20(1): 784-796 (2023) - [j188]Zhiguo Wan, Yan Zhou, Kui Ren:
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof. IEEE Trans. Dependable Secur. Comput. 20(2): 1335-1347 (2023) - [j187]Jinmeng Zhou, Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang, Peng Ning, Kui Ren:
Automatic Permission Check Analysis for Linux Kernel. IEEE Trans. Dependable Secur. Comput. 20(3): 1849-1866 (2023) - [j186]Yiling He, Yiping Li, Lei Wu, Ziqi Yang, Kui Ren, Zhan Qin:
MsDroid: Identifying Malicious Snippets for Android Malware Detection. IEEE Trans. Dependable Secur. Comput. 20(3): 2025-2039 (2023) - [j185]Xiaoyi Pang, Zhibo Wang, Zeqing He, Peng Sun, Meng Luo, Ju Ren, Kui Ren:
Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation. IEEE Trans. Dependable Secur. Comput. 20(3): 2421-2432 (2023) - [j184]Keyu Ji, Bingsheng Zhang, Tianpei Lu, Lichun Li, Kui Ren:
UC Secure Private Branching Program and Decision Tree Evaluation. IEEE Trans. Dependable Secur. Comput. 20(4): 2836-2848 (2023) - [j183]