Chengfang Fang
Chengfang Fang
Principal Researcher, Huawei International
Verified email at
Cited by
Cited by
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
BDPL: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
Mitigating application layer distributed denial of service attacks via effective trust management
J Yu, C Fang, L Lu, Z Li
IET communications 4 (16), 1952-1962, 2010
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 111-120, 2009
A lightweight mechanism to mitigate application layer DDoS attacks
J Yu, C Fang, L Lu, Z Li
Scalable Information Systems: 4th International ICST Conference, INFOSCALE …, 2009
PrivKVM*: Revisiting key-value statistics estimation with local differential privacy
Q Ye, H Hu, X Meng, H Zheng, K Huang, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing 20 (1), 17-35, 2021
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS 21 (2021), 15-19, 2021
Protecting decision boundary of machine learning model with differentially private perturbation
H Zheng, Q Ye, H Hu, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing 19 (3), 2007-2022, 2020
An optimization model for aesthetic two-dimensional barcodes
C Fang, C Zhang, EC Chang
MultiMedia Modeling: 20th Anniversary International Conference, MMM 2014 …, 2014
3dfed: Adaptive and extensible framework for covert backdoor attack in federated learning
H Li, Q Ye, H Hu, J Li, L Wang, C Fang, J Shi
2023 IEEE Symposium on Security and Privacy (SP), 1893-1907, 2023
Differential privacy with δ-neighbourhood for spatial and dynamic datasets
C Fang, EC Chang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
Secure sketch for multiple secrets
C Fang, Q Li, EC Chang
Applied Cryptography and Network Security: 8th International Conference …, 2010
Thief, beware of what get you there: Towards understanding model extraction attack
X Zhang, C Fang, J Shi
arXiv preprint arXiv:2104.05921, 2021
Securing interactive sessions using mobile device through visual channel and visual inspection
C Fang, EC Chang
Proceedings of the 26th Annual Computer Security Applications Conference, 69-78, 2010
Information leakage in optimal anonymized and diversified data
C Fang, EC Chang
Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008
A goal-oriented approach for modeling and analyzing attack graph
X Liu, C Fang, D Xiao, H Xu
2010 International Conference on Information Science and Applications, 1-8, 2010
Intrusion diagnosis and prediction with expert system
X Liu, C Fang, D Xiao
Security and Communication Networks 4 (12), 1483-1494, 2011
System and method for verifying integrity of an electronic device
WU Yongzheng, X Wen, F Chengfang, LI Tieyan
US Patent 10,659,237, 2020
Adaptive differentially private histogram of low-dimensional data
C Fang, EC Chang
International Symposium on Privacy Enhancing Technologies Symposium, 160-179, 2012
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers
J Zhang, H Fang, WJW Tann, K Xu, C Fang, EC Chang
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
The system can't perform the operation now. Try again later.
Articles 1–20