Follow
Guanhong Tao
Guanhong Tao
Ph.D. Candidate, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
ABS: Scanning neural networks for back-doors by artificial brain stimulation
Y Liu, WC Lee, G Tao, S Ma, Y Aafer, X Zhang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
4092019
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking
S Ma, Y Liu, G Tao, WC Lee, X Zhang
Proceedings of the 26th Network and Distributed System Security Symposium …, 2019
2892019
Attacks meet interpretability: Attribute-steered detection of adversarial samples
G Tao, S Ma, Y Liu, X Zhang
Proceedings of the 32nd International Conference on Neural Information …, 2018
1842018
MalPat: Mining patterns of malicious and benign Android apps via permission-related APIs
G Tao, Z Zheng, Z Guo, MR Lyu
IEEE Transactions on Reliability 67 (1), 355-369, 2017
1072017
Backdoor scanning for deep neural networks through k-arm optimization
G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang
International Conference on Machine Learning, 9525-9536, 2021
952021
Correlations between deep neural network model coverage criteria and model quality
S Yan, G Tao, X Liu, J Zhai, S Ma, L Xu, X Zhang
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
682020
Physical attack on monocular depth estimation with optimal adversarial patches
Z Cheng, J Liang, H Choi, G Tao, Z Cao, D Liu, X Zhang
European conference on computer vision, 514-532, 2022
672022
Precise android api protection mapping derivation and reasoning
Y Aafer, G Tao, J Huang, X Zhang, N Li
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
582018
Better trigger inversion optimization in backdoor scanning
G Tao, G Shen, Y Liu, S An, Q Xu, S Ma, P Li, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
542022
Piccolo: Exposing complex backdoors in nlp transformer models
Y Liu, G Shen, G Tao, S An, S Ma, X Zhang
2022 IEEE Symposium on Security and Privacy (SP), 2025-2042, 2022
512022
Towards feature space adversarial attack by style perturbation
Q Xu, G Tao, S Cheng, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 35 (12), 10523 …, 2021
49*2021
Complex backdoor detection by symmetric feature differencing
Y Liu, G Shen, G Tao, Z Wang, S Ma, X Zhang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
47*2022
CPC: Automatically classifying and propagating natural language comments via program analysis
J Zhai, X Xu, Y Shi, G Tao, M Pan, S Ma, L Xu, W Zhang, L Tan, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
422020
Model orthogonalization: Class distance hardening in neural networks for better security
G Tao, Y Liu, G Shen, Q Xu, S An, Z Zhang, X Zhang
2022 IEEE Symposium on Security and Privacy (SP), 1372-1389, 2022
412022
Stochfuzz: Sound and cost-effective fuzzing of stripped binaries by incremental and stochastic rewriting
Z Zhang, W You, G Tao, Y Aafer, X Liu, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 659-676, 2021
362021
Code search based on context-aware code translation
W Sun, C Fang, Y Chen, G Tao, T Han, Q Zhang
Proceedings of the 44th International Conference on Software Engineering …, 2022
342022
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
L Yu, S Ma, Z Zhang, G Tao, X Zhang, D Xu, VE Urias, HW Lin, ...
NDSS, 2021
322021
Osprey: Recovery of variable and data structure via probabilistic analysis for stripped binary
Z Zhang, Y Ye, W You, G Tao, W Lee, Y Kwon, Y Aafer, X Zhang
2021 IEEE Symposium on Security and Privacy (SP), 813-832, 2021
312021
Flip: A provable defense framework for backdoor mitigation in federated learning
K Zhang, G Tao, Q Xu, S Cheng, S An, Y Liu, S Feng, G Shen, PY Chen, ...
The Eleventh International Conference on Learning Representations (ICLR), 2022
302022
Mirror: Model inversion for deep learning network with high fidelity
S An, G Tao, Q Xu, Y Liu, G Shen, Y Yao, J Xu, X Zhang
Proceedings of the 29th Network and Distributed System Security Symposium, 2022
302022
The system can't perform the operation now. Try again later.
Articles 1–20