Follow
Huiying Li
Title
Cited by
Cited by
Year
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
6112019
Latent Backdoor Attacks on Deep Neural Networks
Y Yao, H Li, H Zheng, BY Zhao
2019 ACM SIGSAC Conference on Computer and Communications Security (CCS ’19), 2019
1752019
Fawkes: Protecting privacy against unauthorized deep learning models
S Shan, E Wenger, J Zhang, H Li, H Zheng, BY Zhao
29th USENIX security symposium (USENIX Security 20), 1589-1604, 2020
1112020
Piracy Resistant Watermarks for Deep Neural Networks
H Li, E Wenger, BY Zhao, H Zheng
arXiv preprint arXiv:1910.01226, 2020
40*2020
Wearable Microphone Jamming
Y Chen, H Li, SY Teng, S Nagels, Z Li, P Lopes, BY Zhao, H Zheng
The ACM CHI Conference on Human Factors in Computing Systems, 2020, 2020
37*2020
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
H Li, S Shan, E Wenger, J Zhang, H Zheng, BY Zhao
2022 Conference 31th USENIX security symposium (USENIX Security 22), 2022
19*2022
Can Backdoor Attacks Survive Time-Varying Models?
H Li, AN Bhagoji, BY Zhao, H Zheng
arXiv preprint arXiv:2206.04677, 2022
2022
Demonstrating Wearable Microphone Jamming
Y Chen, H Li, SY Teng, S Nagels, Z Li, P Lopes, H Zheng, BY Zhao
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–8