Adversarial attacks against network intrusion detection in IoT systems H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu IEEE Internet of Things Journal 8 (13), 10327-10335, 2020 | 237 | 2020 |
Hidden backdoors in human-centric language models S Li, H Liu, T Dong, BZH Zhao, M Xue, H Zhu, J Lu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 101 | 2021 |
Privacy for free: How does dataset condensation help privacy? T Dong, B Zhao, L Lyu International Conference on Machine Learning, 5378-5396, 2022 | 82 | 2022 |
Measuring vulnerabilities of malware detectors with explainability-guided evasion attacks R Sun, W Wang, T Dong, S Li, M Xue, G Tyson, H Zhu, M Guo, S Nepal arXiv preprint arXiv:2111.10085, 2021 | 18* | 2021 |
Backdoors Against Natural Language Processing: A Review S Li, T Dong, BZH Zhao, MJ Xue, S Du, H Zhu IEEE Security & Privacy, 2022 | 17 | 2022 |
An interpretable federated learning-based network intrusion detection framework T Dong, S Li, H Qiu, J Lu arXiv preprint arXiv:2201.03134, 2022 | 13 | 2022 |
Fingerprinting multi-exit deep neural network models via inference time T Dong, H Qiu, T Zhang, J Li, H Li, J Lu arXiv preprint arXiv:2110.03175, 2021 | 8 | 2021 |
Towards Fast Network Intrusion Detection based on Efficiency-preserving Federated Learning T Dong, H Qiu, J Lu, M Qiu, C Fan ISPA21 18 (10), 5, 2021 | 8 | 2021 |
RAI 2: Responsible Identity Audit Governing the Artificial Intelligence T Dong, S Li, G Chen, M Xue, H Zhu, Z Liu The Network and Distributed System Security Symposium (NDSS), 2023 | 5 | 2023 |
Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors R Sun, M Xue, G Tyson, T Dong, S Li, S Wang, H Zhu, S Camtepe, ... Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 4 | 2023 |
Learn what you want to unlearn: Unlearning inversion attacks against machine unlearning H Hu, S Wang, T Dong, M Xue arXiv preprint arXiv:2404.03233, 2024 | 2 | 2024 |
Unleashing cheapfakes through trojan plugins of large language models T Dong, G Chen, S Li, M Xue, R Holland, Y Meng, Z Liu, H Zhu arXiv preprint arXiv:2312.00374, 2023 | 2 | 2023 |
Mind your heart: Stealthy backdoor attack on dynamic deep neural network in edge computing T Dong, Z Zhang, H Qiu, T Zhang, H Li, T Wang IEEE INFOCOM 2023-IEEE Conference on Computer Communications, 1-10, 2023 | 2 | 2023 |
Privacy Computing with Right to Be Forgotten in Trusted Execution Environment H Liu, H Luo, S Li, T Dong, G Chen, Y Meng, H Zhu GLOBECOM 2023-2023 IEEE Global Communications Conference, 2566-2571, 2023 | | 2023 |