Follow
Shasha Li
Shasha Li
Visual Search and AR, Amazon
Verified email at ucr.edu
Title
Cited by
Cited by
Year
Adversarial perturbations against real-time video classification systems
S Li, A Neupane, S Paul, C Song, SV Krishnamurthy, AKR Chowdhury, ...
NDSS 2019, 2018
912018
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency
S Li, S Zhu, S Paul, A Roy-Chowdhury, C Song, S Krishnamurthy, ...
ECCV 2020, 2020
222020
Adversarial Attacks on Black Box Video Classifiers: Leveraging the Power of Geometric Transformations
S Li, A Aich, S Zhu, MS Asif, C Song, AK Roy-Chowdhury, ...
NeurIPS 2021, 2021
152021
Multi-Expert Adversarial Attack Detection in Person Re-identification Using Context Inconsistency
X Wang, S Li, M Liu, Y Wang, AK Roy-Chowdhury
ICCV 2021, 2021
152021
Exploiting Multi-Object Relationships for Detecting Adversarial Attacks in Complex Scenes
M Yin, S Li, Z Cai, C Song, MS Asif, AK Roy-Chowdhury, ...
ICCV 2021, 2021
132021
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning
S Zhu, S Li, Z Wang, X Chen, Z Qian, SV Krishnamurthy, KS Chan, ...
CoNEXT 2020, 2020
122020
ADC: Adversarial attacks against object Detection that evade Context consistency checks
M Yin, S Li, C Song, MS Asif, AK Roy-Chowdhury, SV Krishnamurthy
WCAC 2022, 2021
62021
A4: Evading Learning-based Adblockers
S Zhu, Z Wang, X Chen, S Li, U Iqbal, Z Qian, KS Chan, SV Krishnamurthy, ...
arXiv preprint arXiv:2001.10999, 2020
62020
DeepTrack: Grouping RFID Tags Based on Spatio-temporal Proximity in Retail Spaces
S Li, M Arslan, A Khojastepour, SV Krishnamurthy, S Rangarajan
InfoCom 2020, 2020
62020
Adaptive LPQ: An efficient descriptor for blurred face recognition
J Li, S Li, J Hu, W Deng
2015 11th IEEE International Conference and Workshops on Automatic Face and …, 2015
52015
A priority-based dynamic web requests scheduling for web servers over content-centric networking
Y Tu, X Qiao, G Nan, J Chen, S Li
2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies …, 2015
42015
Measurement-driven Security Analysis of Imperceptible Impersonation Attacks
S Li, K Khalil, R Panda, C Song, SV Krishnamurthy, AK Roy-Chowdhury, ...
ICCCN 2020, 2020
22020
Eluding ML-based Adblockers With Actionable Adversarial Examples
S Zhu, Z Wang, X Chen, S Li, K Man, U Iqbal, Z Qian, KS Chan, ...
Annual Computer Security Applications Conference, 541-553, 2021
12021
Simultaneous blurred face restoration and recognition
J Li, S Li, J Hu, W Deng
2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), 001-005, 2015
12015
Amazon Shop the Look: A Visual Search System for Fashion and Home
M Du, A Ramisa, AK KC, S Chanda, M Wang, N Rajesh, S Li, Y Hu, ...
Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and …, 2022
2022
Tracking rfid groups with spatio-temporal proximity
M Arslan, M Khojastepour, S Li, S Rangarajan
US Patent App. 16/817,115, 2020
2020
Face recognition based on random feature
S Li, W Deng
2015 Visual Communications and Image Processing (VCIP), 1-4, 2015
2015
Face Recognition Using Local PCA Filters
Y Wang, S Li, J Hu, W Deng
Chinese Conference on Biometric Recognition, 35-42, 2015
2015
Noise-resistant local binary pattern based on random projection
S Li, Y Tu, W Deng, J Lu
2015 3rd IAPR Asian Conference on Pattern Recognition (ACPR), 806-810, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–19