Gangsweep: Sweep out neural backdoors by gan L Zhu, R Ning, C Wang, C Xin, H Wu Proceedings of the 28th ACM International Conference on Multimedia, 3173-3181, 2020 | 67 | 2020 |
Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks R Ning, J Li, CS Xin, H Wu IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 2021 | 61 | 2021 |
Capjack: Capture in-browser crypto-jacking by deep capsule network through behavioral analysis R Ning, C Wang, CS Xin, J Li, L Zhu, H Wu IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 1873-1881, 2019 | 50 | 2019 |
Deepmag: Sniffing mobile apps in magnetic field through deep convolutional neural networks R Ning, C Wang, CS Xin, J Li, H Wu 2018 IEEE international conference on pervasive computing and communications …, 2018 | 46 | 2018 |
Puncturable attribute-based encryption for secure data delivery in Internet of Things TVX Phuong, R Ning, C Xin, H Wu IEEE INFOCOM 2018-IEEE conference on computer communications, 1511-1519, 2018 | 43 | 2018 |
TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers R Ning, CS Xin, H Wu IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 2022 | 20 | 2022 |
Hunter: HE-friendly structured pruning for efficient privacy-preserving deep learning Y Cai, Q Zhang, R Ning, C Xin, H Wu Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 19 | 2022 |
Optimal deployment for target-barrier coverage problems in wireless sensor networks P Si, S Wang, L Shu, R Ning, Z Fu IEEE Systems Journal 15 (2), 2241-2244, 2020 | 14 | 2020 |
CLEAR: Clean-up sample-targeted backdoor in neural networks L Zhu, R Ning, C Xin, C Wang, H Wu Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2021 | 13 | 2021 |
Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks R Ning, J Li, CS Xin, H Wu, C Wang AAAI Conference on Artificial Intelligence, 2022 | 11 | 2022 |
Optimizing the heterogeneous network on-chip design in manycore architectures TT Le, R Ning, D Zhao, H Wu, M Bayoumi 2017 30th IEEE International System-on-Chip Conference (SOCC), 184-189, 2017 | 10 | 2017 |
DeepMag+: Sniffing mobile apps in magnetic field through deep learning R Ning, C Wang, CS Xin, J Li, H Wu Pervasive and Mobile Computing 61, 101106, 2020 | 7 | 2020 |
Acadia: Efficient and robust adversarial attacks against deep reinforcement learning H Ali, M Al Ameedi, A Swami, R Ning, J Li, H Wu, JH Cho 2022 IEEE Conference on Communications and Network Security (CNS), 1-9, 2022 | 4 | 2022 |
SEER: Backdoor Detection for Vision-Language Models through Searching Target Text and Image Trigger Jointly L Zhu, R Ning, J Li, C Xin, H Wu Proceedings of the AAAI Conference on Artificial Intelligence 38 (7), 7766-7774, 2024 | 2 | 2024 |
Time-Series Misalignment Aware DNN Adversarial Attacks for Connected Autonomous Vehicles Q Liu, H Shen, T Sen, R Ning 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems …, 2023 | 2 | 2023 |
Sub-Band Backdoor Attack in Remote Sensing Imagery KA Islam, H Wu, C Xin, R Ning, L Zhu, J Li Algorithms 17 (5), 182, 2024 | 1 | 2024 |
BlockFed: A High-Performance and Trustworthy Blockchain-Based Federated Learning Framework R Ning, C Wang, X Li, R Gazda, H Wu GLOBECOM 2023-2023 IEEE Global Communications Conference, 892-897, 2023 | 1 | 2023 |
Most and Least Retrievable Images in Visual-Language Query Systems L Zhu, R Ning, J Li, C Xin, H Wu European Conference on Computer Vision, 1-18, 2022 | 1 | 2022 |
Deep Incomplete Multi-view Clustering via Multi-level Imputation and Contrastive Alignment Z Wang, Y Du, Y Wang, R Ning, L Li Neural Networks 181, 106851, 2025 | | 2025 |
Spot: Structure patching and overlap tweaking for effective pipelining in privacy-preserving mlaas with tiny clients X Xu, Q Zhang, R Ning, C Xin, H Wu 2024 IEEE 44th International Conference on Distributed Computing Systems …, 2024 | | 2024 |