Towards security threats of deep learning systems: A survey Y He, G Meng, K Chen, X Hu, J He IEEE Transactions on Software Engineering 48 (5), 1743-1770, 2020 | 115 | 2020 |
Deepobliviate: a powerful charm for erasing data residual memory in deep neural networks Y He, G Meng, K Chen, J He, X Hu arXiv preprint arXiv:2105.06209, 2021 | 26 | 2021 |
{DRMI}: A dataset reduction technology based on mutual information for black-box attacks Y He, G Meng, K Chen, X Hu, J He 30th USENIX Security Symposium (USENIX Security 21), 1901-1918, 2021 | 24 | 2021 |
Towards privacy and security of deep learning systems: a survey Y He, G Meng, K Chen, X Hu, J He arXiv preprint arXiv:1911.12562, 2019 | 20 | 2019 |
机器学习系统的隐私和安全问题综述 何英哲, 胡兴波, 何锦雯, 孟国柱, 陈恺 计算机研究与发展 56 (10), 2049-2070, 2019 | 7 | 2019 |
Semantics-recovering decompilation through neural machine translation R Liang, Y Cao, P Hu, J He, K Chen arXiv preprint arXiv:2112.15491, 2021 | 3 | 2021 |
Llm factoscope: Uncovering llms’ factual discernment through measuring inner states J He, Y Gong, Z Lin, Y Zhao, K Chen Findings of the Association for Computational Linguistics ACL 2024, 10218-10230, 2024 | 2 | 2024 |
LLM Factoscope: Uncovering LLMs' Factual Discernment through Intermediate Data Analysis J He, Y Gong, K Chen, Z Lin, C Wei, Y Zhao arXiv preprint arXiv:2312.16374, 2023 | 2* | 2023 |
Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing J He, K Chen, G Meng, J Zhang, C Li Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
I Don't Know You, But I Can Catch You: Real-Time Defense against Diverse Adversarial Patches for Object Detectors Z Lin, Y Zhao, K Chen, J He arXiv preprint arXiv:2406.10285, 2024 | | 2024 |