Explainability-based backdoor attacks against graph neural networks J Xu, M Xue, S Picek Proceedings of the 3rd ACM Workshop on Wireless Security and Machine …, 2021 | 56 | 2021 |
Can you hear it? backdoor attacks via ultrasonic triggers S Koffas, J Xu, M Conti, S Picek Proceedings of the 2022 ACM workshop on wireless security and machine …, 2022 | 46 | 2022 |
A multi-sensor information fusion method based on factor graph for integrated navigation system J Xu, G Yang, Y Sun, S Picek IEEE Access 9, 12044-12054, 2021 | 26 | 2021 |
Watermarking graph neural networks based on backdoor attacks J Xu, S Koffas, O Ersoy, S Picek 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 1179-1197, 2023 | 18 | 2023 |
More is better (mostly): On the backdoor attacks in federated graph neural networks J Xu, R Wang, K Liang, S Picek arXiv preprint arXiv:2202.03195, 2022 | 18 | 2022 |
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks M Conti, J Li, S Picek, J Xu Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security …, 2022 | 16 | 2022 |
Poster: Clean-label Backdoor Attack on Graph Neural Networks J Xu, S Picek Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 9 | 2022 |
Coin Recognition Method Based on SIFT Algorithm J Xu, G Yang, Y Liu, J Zhong 2017 4th International Conference on Information Science and Control …, 2017 | 6 | 2017 |
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification G Abad, J Xu, S Koffas, B Tajalli, S Picek, M Conti arXiv preprint arXiv:2302.01740, 2023 | 4 | 2023 |
Rethinking the trigger-injecting position in graph backdoor attack J Xu, G Abad, S Picek 2023 International Joint Conference on Neural Networks (IJCNN), 1-8, 2023 | 3 | 2023 |
Initial alignment of strapdown inertial navigation system with the aid of Doppler velocity log J Zhong, G Yang, Y Liu, J Xu 2017 4th International Conference on Information Science and Control …, 2017 | 1 | 2017 |