Neil Zhenqiang Gong
Neil Zhenqiang Gong
Assistant Professor, Duke University
Verified email at - Homepage
Cited by
Cited by
On the feasibility of internet-scale author identification
A Narayanan, H Paskov, NZ Gong, J Bethencourt, E Stefanov, ECR Shin, ...
IEEE Symposium on Security and Privacy, 2012
Stealing Hyperparameters in Machine Learning
B Wang, NZ Gong
IEEE Symposium on Security and Privacy, 2018
Joint link prediction and attribute inference using a social-attribute network
NZ Gong, A Talwalkar, L Mackey, L Huang, ECR Shin, E Stefanov, ER Shi, ...
ACM Transactions on Intelligent Systems and Technology (TIST) 5 (2), 27, 2014
Evolution of Social-Attribute Networks: Measurements, Modeling, and Implications using Google+
NZ Gong, W Xu, L Huang, P Mittal, E Stefanov, V Sekar, D Song
ACM Internet Measurement Conference (IMC), 2012
SybilBelief: A Semi-supervised Learning Approach for Structure-based Sybil Detection
NZ Gong, M Frank, P Mittal
IEEE Transactions on Information Forensics and Security 9 (6), 2014
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification
X Cao, NZ Gong
Annual Computer Security Applications Conference (ACSAC), 2017
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
M Fang, X Cao, J Jia, NZ Gong
USENIX Security Symposium, 2020
Personalized mobile app recommendation: Reconciling app functionality and user privacy preference
B Liu, D Kong, L Cen, NZ Gong, H Jin, H Xiong
Proceedings of the Eighth ACM International Conference on Web Search and …, 2015
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge
S Ji, W Li, NZ Gong, P Mittal, R Beyah
ISOC Network and Distributed System Security Symposium (NDSS), 2015
MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples
J Jia, A Salem, M Backes, Y Zhang, NZ Gong
ACM Conference on Computer and Communications Security (CCS), 2019
You are who you know and how you behave: Attribute inference attacks via users' social friends and behaviors
NZ Gong, B Liu
USENIX Security Symposium, 2016
SybilFuse: Combining Local Attributes with Global Structure to Perform Robust Sybil Detection
P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal
IEEE Conference on Communications and Network Security (CNS), 2018
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
J Jia, NZ Gong
USENIX Security Symposium, 2018
Poisoning Attacks to Graph-Based Recommender Systems
M Fang, G Yang, NZ Gong, J Liu
Annual Computer Security Applications Conference (ACSAC), 2018
Random walk based fake account detection in online social networks
J Jia, B Wang, NZ Gong
47th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2017
SybilSCAR: Sybil detection in online social networks via local rule based propagation
B Wang, L Zhang, NZ Gong
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs
B Wang, NZ Gong, H Fu
IEEE International Conference on Data Mining (ICDM), 465-474, 2017
AttriInfer: Inferring User Attributes in Online Social Networks Using Markov Random Fields
J Jia, B Wang, L Zhang, NZ Gong
Proceedings of the 26th International Conference on World Wide Web (WWW …, 2017
Attribute inference attacks in online social networks
NZ Gong, B Liu
ACM Transactions on Privacy and Security (TOPS) 21 (1), 1-30, 2018
Fake Co-visitation Injection Attacks to Recommender Systems
G Yang, NZ Gong, Y Cai
ISOC Network and Distributed System Security Symposium (NDSS), 2017
The system can't perform the operation now. Try again later.
Articles 1–20