Obserwuj
Shiqing Ma
Shiqing Ma
Zweryfikowany adres z umass.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Trojaning attack on neural networks
Y Liu, S Ma, Y Aafer, WC Lee, J Zhai, W Wang, X Zhang
25th Annual Network And Distributed System Security Symposium (NDSS 2018), 2018
10472018
Abs: Scanning neural networks for back-doors by artificial brain stimulation
Y Liu, WC Lee, G Tao, S Ma, Y Aafer, X Zhang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
3382019
Nic: Detecting adversarial samples with neural network invariant checking
S Ma, Y Liu, G Tao, WC Lee, X Zhang
26th Annual Network And Distributed System Security Symposium (NDSS 2019), 2019
2632019
Badnl: Backdoor attacks against nlp models with semantic-preserving improvements
X Chen, A Salem, D Chen, M Backes, S Ma, Q Shen, Z Wu, Y Zhang
Annual computer security applications conference, 554-569, 2021
2382021
Protracer: Towards practical provenance tracing by alternating between logging and tainting
S Ma, X Zhang, D Xu
23rd Annual Network And Distributed System Security Symposium (NDSS 2016), 2016
2132016
Dynamic backdoor attacks against machine learning models
A Salem, R Wen, M Backes, S Ma, Y Zhang
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 703-718, 2022
2112022
MODE: automated neural network model debugging via state differential analysis and input selection
S Ma, Y Liu, WC Lee, X Zhang, A Grama
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
1742018
Attacks meet interpretability: Attribute-steered detection of adversarial samples
G Tao, S Ma, Y Liu, X Zhang
Advances in Neural Information Processing Systems 31, 2018
1732018
Hercule: Attack story reconstruction via community discovery on correlated log graph
K Pei, Z Gu, B Saltaformaggio, S Ma, F Wang, Z Zhang, L Si, X Zhang, ...
Proceedings of the 32Nd Annual Conference on Computer Security Applications …, 2016
1682016
{MPI}: Multiple perspective attack investigation with semantic aware execution partitioning
S Ma, J Zhai, F Wang, KH Lee, X Zhang, D Xu
26th USENIX Security Symposium (USENIX Security 17), 1111-1128, 2017
1242017
Profuzzer: On-the-fly input type probing for better zero-day vulnerability discovery
W You, X Wang, S Ma, J Huang, X Zhang, XF Wang, B Liang
2019 IEEE symposium on security and privacy (SP), 769-786, 2019
1232019
MCI: Modeling-based causality inference in audit logging for attack investigation
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
Network and Distributed Systems Security (NDSS) Symposium, 2018
1022018
Deep feature space trojan attack of neural networks by controlled detoxification
S Cheng, Y Liu, S Ma, X Zhang
Proceedings of the AAAI Conference on Artificial Intelligence 35 (2), 1148-1156, 2021
1002021
{ATLAS}: A sequence-based learning approach for attack investigation
A Alsaheel, Y Nan, S Ma, L Yu, G Walkup, ZB Celik, X Zhang, D Xu
30th USENIX security symposium (USENIX security 21), 3005-3022, 2021
952021
Accurate, low cost and instrumentation-free security audit logging for windows
S Ma, KH Lee, CH Kim, J Rhee, X Zhang, D Xu
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
922015
Colo: Coarse-grained lock-stepping virtual machines for non-stop service
YZ Dong, W Ye, YH Jiang, I Pratt, SQ Ma, J Li, HB Guan
Proceedings of the 4th annual Symposium on Cloud Computing, 1-16, 2013
762013
Backdoor scanning for deep neural networks through k-arm optimization
G Shen, Y Liu, G Tao, S An, Q Xu, S Cheng, S Ma, X Zhang
International Conference on Machine Learning, 9525-9536, 2021
722021
{Kernel-Supported}{Cost-Effective} Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
2018 USENIX Annual Technical Conference (USENIX ATC 18), 241-254, 2018
702018
Correlations between deep neural network model coverage criteria and model quality
S Yan, G Tao, X Liu, J Zhai, S Ma, L Xu, X Zhang
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
622020
Automatic model generation from documentation for Java API functions
J Zhai, J Huang, S Ma, X Zhang, L Tan, J Zhao, F Qin
Proceedings of the 38th International Conference on Software Engineering …, 2016
592016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20