Folgen
Chang Liu
Chang Liu
Alibaba DAMO Academy
Bestätigte E-Mail-Adresse bei alibaba-inc.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Delving into transferable adversarial examples and black-box attacks
Y Liu, X Chen, C Liu, D Song
arXiv preprint arXiv:1611.02770, 2016
14152016
Targeted backdoor attacks on deep learning systems using data poisoning
X Chen, C Liu, B Li, K Lu, D Song
arXiv preprint arXiv:1712.05526, 2017
9582017
Manipulating machine learning: Poisoning attacks and countermeasures for regression learning
M Jagielski, A Oprea, B Biggio, C Liu, C Nita-Rotaru, B Li
2018 IEEE symposium on security and privacy (SP), 19-35, 2018
5962018
The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks.
N Carlini, C Liu, Ú Erlingsson, J Kos, D Song
USENIX Security Symposium 267, 2019
5412019
Neural network-based graph embedding for cross-platform binary code similarity detection
X Xu, C Liu, Q Feng, H Yin, L Song, D Song
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
4832017
ObliVM: A Programming Framework for Secure Computation
C Liu, XS Wang, K Nayak, Y Huang, E Shi
IEEE Symposium on Security and Privacy (S & P), 2015
3692015
Sqlnet: Generating structured queries from natural language without reinforcement learning
X Xu, C Liu, D Song
arXiv preprint arXiv:1711.04436, 2017
3052017
Oblivious data structures
XS Wang, K Nayak, C Liu, THH Chan, E Shi, E Stefanov, Y Huang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2102014
Tree-to-tree neural networks for program translation
X Chen, C Liu, D Song
Advances in neural information processing systems 31, 2018
1982018
The secret sharer: Measuring unintended neural network memorization & extracting secrets
N Carlini, C Liu, J Kos, Ú Erlingsson, D Song
arXiv preprint arXiv:1802.08232 5, 2018
1862018
Ghostrider: A hardware-software system for memory trace oblivious computation
C Liu, A Harris, M Maas, M Hicks, M Tiwari, E Shi
ACM SIGPLAN Notices 50 (4), 87-101, 2015
1752015
Automating efficient RAM-model secure computation
C Liu, Y Huang, E Shi, J Katz, M Hicks
2014 IEEE Symposium on Security and Privacy, 623-638, 2014
1292014
Curriculum adversarial training
QZ Cai, M Du, C Liu, D Song
arXiv preprint arXiv:1805.04807, 2018
1162018
Execution-guided neural program synthesis
X Chen, C Liu, D Song
International Conference on Learning Representations, 2019
952019
Robust linear regression against training data poisoning
C Liu, B Li, Y Vorobeychik, A Oprea
Proceedings of the 10th ACM workshop on artificial intelligence and security …, 2017
932017
Latent attention for if-then program synthesis
C Liu, X Chen, EC Shin, M Chen, D Song
Advances in Neural Information Processing Systems 29, 2016
812016
Lifelong anomaly detection through unlearning
M Du, Z Chen, C Liu, R Oak, D Song
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
732019
Memory trace oblivious program execution
C Liu, M Hicks, E Shi
2013 IEEE 26th Computer Security Foundations Symposium, 51-65, 2013
732013
Deepsniffer: A dnn model extraction framework based on learning architectural hints
X Hu, L Liang, S Li, L Deng, P Zuo, Y Ji, X Xie, Y Ding, C Liu, T Sherwood, ...
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
632020
Spotting code optimizations in data-parallel pipelines through periscope
Z Guo, X Fan, R Chen, J Zhang, H Zhou, S McDirmid, C Liu, W Lin, J Zhou, ...
Presented as part of the 10th {USENIX} Symposium on Operating Systems Design …, 2012
602012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20