Model extraction attacks and defenses on cloud-based machine learning models X Gong, Q Wang, Y Chen, W Yang, X Jiang IEEE Communications Magazine 58 (12), 83-89, 2020 | 41 | 2020 |
Backdoor attacks and defenses in federated learning: State-of-the-art, taxonomy, and future directions X Gong, Y Chen, Q Wang, W Kong IEEE Wireless Communications 30 (2), 114-121, 2022 | 35 | 2022 |
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion. X Gong, Y Chen, W Yang, G Mei, Q Wang IJCAI, 2439-2447, 2021 | 34 | 2021 |
Defense-resistant backdoor attacks against deep neural networks in outsourced cloud environment X Gong, Y Chen, Q Wang, H Huang, L Meng, C Shen, Q Zhang IEEE Journal on Selected Areas in Communications 39 (8), 2617-2631, 2021 | 34 | 2021 |
Coordinated backdoor attacks against federated learning with model-dependent triggers X Gong, Y Chen, H Huang, Y Liao, S Wang, Q Wang IEEE network 36 (1), 84-90, 2022 | 30 | 2022 |
Backdoor attacks and defenses for deep neural networks in outsourced cloud environments Y Chen, X Gong, Q Wang, X Di, H Huang IEEE Network 34 (5), 141-147, 2020 | 29 | 2020 |
Marnet: Backdoor attacks against cooperative multi-agent reinforcement learning Y Chen, Z Zheng, X Gong IEEE Transactions on Dependable and Secure Computing, 2022 | 18 | 2022 |
Crowdcaching: Incentivizing D2D-enabled caching via coalitional game for IoT Y Chen, X Gong, R Ou, L Duan, Q Zhang IEEE Internet of Things Journal 7 (6), 5599-5612, 2020 | 18 | 2020 |
MPCN-RP: A routing protocol for blockchain-based multi-charge payment channel networks Y Chen, Y Ran, J Zhou, J Zhang, X Gong IEEE Transactions on Network and Service Management 19 (2), 1229-1242, 2021 | 15 | 2021 |
D-dae: Defense-penetrating model extraction attacks Y Chen, R Guan, X Gong, J Dong, M Xue 2023 IEEE Symposium on Security and Privacy (SP), 382-399, 2023 | 12 | 2023 |
Private data inference attacks against cloud: Model, technologies, and research directions X Gong, Y Chen, Q Wang, M Wang, S Li IEEE Communications Magazine 60 (9), 46-52, 2022 | 12 | 2022 |
Data poisoning attacks in internet-of-vehicle networks: Taxonomy, state-of-the-art, and future directions Y Chen, X Zhu, X Gong, X Yi, S Li IEEE Transactions on Industrial Informatics 19 (1), 20-28, 2022 | 10 | 2022 |
ATTEQ-NN: Attention based QoE-aware evasive backdoor attacks X Gong, Y Chen, J Dong, Q Wang Annual Network and Distributed System Security Symposium. The Internet Society, 2022 | 10 | 2022 |
Redeem myself: Purifying backdoors in deep learning models using self attention distillation X Gong, Y Chen, W Yang, Q Wang, Y Gu, H Huang, C Shen 2023 IEEE Symposium on Security and Privacy (SP), 755-772, 2023 | 7 | 2023 |
Kaleidoscope: Physical backdoor attacks against deep neural networks with RGB filters X Gong, Z Wang, Y Chen, M Xue, Q Wang, C Shen IEEE Transactions on Dependable and Secure Computing, 2023 | 6 | 2023 |
B3: Backdoor Attacks against Black-box Machine Learning Models X Gong, Y Chen, W Yang, H Huang, Q Wang ACM Transactions on Privacy and Security 26 (4), 1-24, 2023 | 4 | 2023 |
A gan-based defense framework against model inversion attacks X Gong, Z Wang, S Li, Y Chen, Q Wang IEEE Transactions on Information Forensics and Security, 2023 | 4 | 2023 |
Catch You and I Can: Revealing source voiceprint against voice conversion J Deng, Y Chen, Y Zhong, Q Miao, X Gong, W Xu 32nd USENIX Security Symposium (USENIX Security 23), 5163-5180, 2023 | 3 | 2023 |
Wet-Ra: Monitoring Diapers Wetness with Wireless Signals M Xue, Y Chen, X Gong, J Zhang, C Fan Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022 | 3 | 2022 |
A survey of adversarial attacks on wireless communications X Luo, Q Qin, X Gong, M Xue International Conference on Edge Computing and IoT, 83-91, 2021 | 3 | 2021 |