Neil Zhenqiang Gong
Neil Zhenqiang Gong
Assistant Professor, Duke University
Verified email at - Homepage
Cited by
Cited by
Stealing Hyperparameters in Machine Learning
B Wang, NZ Gong
IEEE Symposium on Security and Privacy, 2018
On the feasibility of internet-scale author identification
A Narayanan, H Paskov, NZ Gong, J Bethencourt, E Stefanov, ECR Shin, ...
IEEE Symposium on Security and Privacy, 2012
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
M Fang, X Cao, J Jia, NZ Gong
USENIX Security Symposium, 2020
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, ER Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 27, 2014
Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
ACM Internet Measurement Conference (IMC), 2012
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 2014
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
X Cao, NZ Gong
Annual Computer Security Applications Conference (ACSAC), 2017
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
J Jia, A Salem, M Backes, Y Zhang, NZ Gong
ACM Conference on Computer and Communications Security (CCS), 2019
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
S Ji, W Li, NZ Gong, P Mittal, R Beyah
ISOC Network and Distributed System Security Symposium (NDSS), 2015
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
ACM International Conference on Web Search and Data Mining (WSDM), 2015
Poisoning Attacks to Graph-Based Recommender Systems
M Fang, G Yang, NZ Gong, J Liu
Annual Computer Security Applications Conference (ACSAC), 2018
You are who you know and how you behave: Attribute inference attacks via users' social friends and behaviors
NZ Gong, B Liu
USENIX Security Symposium, 2016
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
J Jia, NZ Gong
USENIX Security Symposium, 2018
Random walk based fake account detection in online social networks
J Jia, B Wang, NZ Gong
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017
Attribute inference attacks in online social networks
NZ Gong, B Liu
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal
IEEE Conference on Communications and Network Security (CNS), 2018
AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields
J Jia, B Wang, L Zhang, NZ Gong
International Conference on World Wide Web (WWW), 2017
Fake Co-visitation Injection Attacks to Recommender Systems
G Yang, NZ Gong, Y Cai
ISOC Network and Distributed System Security Symposium (NDSS), 2017
Backdoor Attacks to Graph Neural Networks
Z Zhang, J Jia, B Wang, NZ Gong
ACM Symposium on Access Control Models and Technologies (SACMAT), 2021
GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs
B Wang, NZ Gong, H Fu
IEEE International Conference on Data Mining (ICDM), 2017
The system can't perform the operation now. Try again later.
Articles 1–20