Seeing isn't believing: Towards more robust adversarial attack against real world object detectors Y Zhao, H Zhu, R Liang, Q Shen, S Zhang, K Chen Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 213 | 2019 |
{FuzzGuard}: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning P Zong, T Lv, D Wang, Z Deng, R Liang, K Chen 29th USENIX security symposium (USENIX security 20), 2255-2269, 2020 | 152 | 2020 |
An inside look at IoT malware A Wang, R Liang, X Liu, Y Zhang, K Chen, J Li Industrial IoT Technologies and Applications: Second EAI International …, 2017 | 68 | 2017 |
A robustness-assured white-box watermark in neural networks P Lv, P Li, S Zhang, K Chen, R Liang, H Ma, Y Zhao, Y Li IEEE Transactions on Dependable and Secure Computing 20 (6), 5214-5229, 2023 | 25 | 2023 |
Evaluation indicators for open-source software: a review Y Zhao, R Liang, X Chen, J Zou Cybersecurity 4, 1-24, 2021 | 20 | 2021 |
Neutron: an attention-based neural decompiler R Liang, Y Cao, P Hu, K Chen Cybersecurity 4, 1-13, 2021 | 19 | 2021 |
Dbia: Data-free backdoor injection attack against transformer networks P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang arXiv preprint arXiv:2111.11870, 2021 | 17 | 2021 |
A data-free backdoor injection approach in neural networks P Lv, C Yue, R Liang, Y Yang, S Zhang, H Ma, K Chen 32nd USENIX Security Symposium (USENIX Security 23), 2671-2688, 2023 | 16 | 2023 |
A survey of audiovisual deepfake detection techniques R Liang, M Li, K Chen Journal of Cyber Security 5 (2), 1-17, 2020 | 15 | 2020 |
Boosting neural networks to decompile optimized binaries Y Cao, R Liang, K Chen, P Hu Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 14 | 2022 |
DeGPT: Optimizing Decompiler Output with LLM P Hu, R Liang, K Chen Proceedings 2024 Network and Distributed System Security Symposium (2024 …, 2024 | 13 | 2024 |
Invisible Backdoor Attacks Using Data Poisoning in Frequency Domain C Yue, P Lv, R Liang, K Chen ECAI 2023, 2954-2961, 2023 | 11 | 2023 |
HufuNet: embedding the left piece as watermark and keeping the right piece for ownership verification in deep neural networks P Lv, P Li, S Zhang, K Chen, R Liang, Y Zhao, Y Li arXiv preprint arXiv:2103.13628, 2021 | 8 | 2021 |
MEA-Defender: A Robust Watermark against Model Extraction Attack P Lv, H Ma, K Chen, J Zhou, S Zhang, R Liang, S Zhu, P Li, Y Zhang arXiv preprint arXiv:2401.15239, 2024 | 7 | 2024 |
视听觉深度伪造检测技术研究综述 梁瑞刚, 吕培卓, 赵月, 陈鹏, 邢豪, 张颖君, 韩冀中, 赫然, 赵险峰, 李明, ... 信息安全学报 5 (2), 1-17, 2020 | 7 | 2020 |
Ssl-wm: A black-box watermarking approach for encoders pre-trained by self-supervised learning P Lv, P Li, S Zhu, S Zhang, K Chen, R Liang, C Yue, F Xiang, Y Cai, H Ma, ... arXiv preprint arXiv:2209.03563, 2022 | 6 | 2022 |
{AURC}: Detecting Errors in Program Code and Documentation P Hu, R Liang, Y Cao, K Chen, R Zhang 32nd USENIX Security Symposium (USENIX Security 23), 1415-1432, 2023 | 4 | 2023 |
DBIA: Data-Free Backdoor Attack Against Transformer Networks P Lv, H Ma, J Zhou, R Liang, K Chen, S Zhang, Y Yang 2023 IEEE International Conference on Multimedia and Expo (ICME), 2819-2824, 2023 | 3 | 2023 |
Semantics-recovering decompilation through neural machine translation R Liang, Y Cao, P Hu, J He, K Chen arXiv preprint arXiv:2112.15491, 2021 | 3 | 2021 |
Evaluating the Effectiveness of Decompilers Y Cao, R Zhang, R Liang, K Chen Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024 | 1 | 2024 |