Follow
Jie Shi
Jie Shi
Security Expert in Huawei Singapore Research Centre
Verified email at huawei.com - Homepage
Title
Cited by
Cited by
Year
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
1192021
Authorized keyword search on encrypted data
J Shi, J Lai, Y Li, RH Deng, J Weng
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
812014
Causality-based neural network repair
B Sun, J Sun, LH Pham, J Shi
Proceedings of the 44th International Conference on Software Engineering …, 2022
792022
BDPL: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
652019
PrivKVM*: Revisiting key-value statistics estimation with local differential privacy
Q Ye, H Hu, X Meng, H Zheng, K Huang, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing 20 (1), 17-35, 2021
392021
SecTTS: A secure track & trace system for RFID-enabled supply chains
J Shi, Y Li, W He, D Sim
Computers in Industry, 2012
382012
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation
H Zheng, Q Ye, H Hu, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing, 2020
362020
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS 21 (2021), 15-19, 2021
342021
3dfed: Adaptive and extensible framework for covert backdoor attack in federated learning
H Li, Q Ye, H Hu, J Li, L Wang, C Fang, J Shi
2023 IEEE Symposium on Security and Privacy (SP), 1893-1907, 2023
312023
A fine-grained access control model for relational databases
J Shi, H Zhu
Journal of Zhejiang University-Science C 11 (8), 575-586, 2010
312010
Online event detection in synchrophasor data with graph signal processing
J Shi, B Foggo, X Kong, Y Cheng, N Yu, K Yamashita
2020 IEEE International conference on communications, control, and computing …, 2020
282020
Constructing plausible innocuous pseudo queries to protect user query intention
Z Wu, J Shi, C Lu, E Chen, G Xu, G Li, S Xie, SY Philip
Information Sciences 325, 215-226, 2015
272015
SecDS: a secure EPC discovery service system in EPCglobal network
J Shi, D Sim, Y Li, R Deng
Proceedings of the second ACM conference on Data and Application Security …, 2012
262012
A Secure and Efficient Discovery Service System in EPCglobal Network
J Shi, Y Li, RH Deng
Computers & Security, 2012
192012
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs
J Shi, H Zhu, G Fu, T Jiang
Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS …, 2009
192009
Batch clone detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
182014
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
152012
Towards certifying the asymmetric robustness for neural networks: Quantification and applications
C Li, S Ji, H Weng, B Li, J Shi, R Beyah, S Guo, Z Wang, T Wang
IEEE Transactions on Dependable and Secure Computing 19 (6), 3987-4001, 2021
142021
Unified authentication for heterogeneous networks
H Wang, L Li, X Kang, J Shi
US Patent 10,849,191, 2020
142020
Rethinking natural adversarial examples for classification models
X Li, J Li, T Dai, J Shi, J Zhu, X Hu
arXiv preprint arXiv:2102.11731, 2021
132021
The system can't perform the operation now. Try again later.
Articles 1–20