Jie Shi
Jie Shi
Security Expert in Huawei Singapore Research Centre
Verified email at - Homepage
Cited by
Cited by
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
Authorized keyword search on encrypted data
J Shi, J Lai, Y Li, RH Deng, J Weng
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
BDPL: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
Causality-based neural network repair
B Sun, J Sun, LH Pham, J Shi
Proceedings of the 44th International Conference on Software Engineering …, 2022
SecTTS: A secure track & trace system for RFID-enabled supply chains
J Shi, Y Li, W He, D Sim
Computers in Industry, 2012
A fine-grained access control model for relational databases
J Shi, H Zhu
Journal of Zhejiang University-Science C 11 (8), 575-586, 2010
Online event detection in synchrophasor data with graph signal processing
J Shi, B Foggo, X Kong, Y Cheng, N Yu, K Yamashita
2020 IEEE International conference on communications, control, and computing …, 2020
PrivKVM*: Revisiting key-value statistics estimation with local differential privacy
Q Ye, H Hu, X Meng, H Zheng, K Huang, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing 20 (1), 17-35, 2021
SecDS: a secure EPC discovery service system in EPCglobal network
J Shi, D Sim, Y Li, R Deng
Proceedings of the second ACM conference on Data and Application Security …, 2012
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS 21 (2021), 15-19, 2021
Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation
H Zheng, Q Ye, H Hu, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing, 2020
Constructing plausible innocuous pseudo queries to protect user query intention
Z Wu, J Shi, C Lu, E Chen, G Xu, G Li, S Xie, SY Philip
Information Sciences 325, 215-226, 2015
A Secure and Efficient Discovery Service System in EPCglobal Network
J Shi, Y Li, RH Deng
Computers & Security, 2012
Batch clone detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs
J Shi, H Zhu, G Fu, T Jiang
Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS …, 2009
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
Unified authentication for heterogeneous networks
H Wang, L Li, X Kang, J Shi
US Patent 10,849,191, 2020
Thief, beware of what get you there: Towards understanding model extraction attack
X Zhang, C Fang, J Shi
arXiv preprint arXiv:2104.05921, 2021
Rethinking natural adversarial examples for classification models
X Li, J Li, T Dai, J Shi, J Zhu, X Hu
arXiv preprint arXiv:2102.11731, 2021
Fine grained transaction log for data recovery in database systems
G Fu, H Zhu, Y Feng, Y Zhu, J Shi, M Chen, X Wang
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 123-131, 2008
The system can't perform the operation now. Try again later.
Articles 1–20