Chang Liu
Chang Liu
Quant Researcher, Citadel Securities
Verified email at - Homepage
Cited by
Cited by
Delving into transferable adversarial examples and black-box attacks
Y Liu, X Chen, C Liu, D Song
arXiv preprint arXiv:1611.02770, 2016
ObliVM: A Programming Framework for Secure Computation
C Liu, XS Wang, K Nayak, Y Huang, E Shi
IEEE Symposium on Security and Privacy (S & P), 2015
Targeted backdoor attacks on deep learning systems using data poisoning
X Chen, C Liu, B Li, K Lu, D Song
arXiv preprint arXiv:1712.05526, 2017
Neural network-based graph embedding for cross-platform binary code similarity detection
X Xu, C Liu, Q Feng, H Yin, L Song, D Song
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE Symposium on Security and Privacy (SP), 19-35, 2018
Ghostrider: A hardware-software system for memory trace oblivious computation
C Liu, A Harris, M Maas, M Hicks, M Tiwari, E Shi
ACM SIGPLAN Notices 50 (4), 87-101, 2015
Oblivious data structures
XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
The secret sharer: Measuring unintended neural network memorization & extracting secrets
N Carlini, C Liu, J Kos, Ś Erlingsson, D Song
arXiv preprint arXiv:1802.08232, 2018
Automating efficient RAM-model secure computation
C Liu, Y Huang, E Shi, J Katz, M Hicks
2014 IEEE Symposium on Security and Privacy, 623-638, 2014
Sqlnet: Generating structured queries from natural language without reinforcement learning
X Xu, C Liu, D Song
arXiv preprint arXiv:1711.04436, 2017
Memory trace oblivious program execution
C Liu, M Hicks, E Shi
2013 IEEE 26th Computer Security Foundations Symposium, 51-65, 2013
Spotting code optimizations in data-parallel pipelines through PeriSCOPE
Z Guo, X Fan, R Chen, J Zhang, H Zhou, S McDirmid, C Liu, W Lin, J Zhou, ...
Presented as part of the 10th {USENIX} Symposium on Operating Systems Design …, 2012
The secret sharer: Evaluating and testing unintended memorization in neural networks
N Carlini, C Liu, Ś Erlingsson, J Kos, D Song
28th {USENIX} Security Symposium ({USENIX} Security 19), 267-284, 2019
Tree-to-tree neural networks for program translation
X Chen, C Liu, D Song
Advances in neural information processing systems, 2547-2557, 2018
Large Scale Fuzzy pD * Reasoning Using MapReduce
C Liu, G Qi, H Wang, Y Yu
International Semantic Web Conference, 405-420, 2011
Latent attention for if-then program synthesis
C Liu, X Chen, EC Shin, M Chen, D Song
Advances in Neural Information Processing Systems, 4574-4582, 2016
Robust linear regression against training data poisoning
C Liu, B Li, Y Vorobeychik, A Oprea
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security …, 2017
Towards efficient SPARQL query processing on RDF data
C Liu, H Wang, Y Yu, L Xu
Tsinghua science and technology 15 (6), 613-622, 2010
Lightweight integration of IR and DB for scalable hybrid search with integrated ranking support
H Wang, T Tran, C Liu, L Fu
Journal of Web Semantics 9 (4), 490-503, 2011
Can you fool AI with adversarial examples on a visual Turing test
X Xu, X Chen, C Liu, A Rohrbach, T Darell, D Song
arXiv preprint arXiv:1709.08693 3, 2017
The system can't perform the operation now. Try again later.
Articles 1–20