Who is real bob? adversarial attacks on speaker recognition systems G Chen, S Chenb, L Fan, X Du, Z Zhao, F Song, Y Liu 2021 IEEE Symposium on Security and Privacy (SP), 694-711, 2021 | 202 | 2021 |
Taking care of the discretization problem: A comprehensive study of the discretization problem and a black-box adversarial attack in discrete integer domain L Bu, Z Zhao, Y Duan, F Song IEEE Transactions on Dependable and Secure Computing, 2021 | 31* | 2021 |
Attack as Defense: Characterizing Adversarial Examples using Robustness Z Zhao, G Chen, J Wang, Y Yang, F Song, J Sun ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and …, 2021 | 29 | 2021 |
Towards understanding and mitigating audio adversarial examples for speaker recognition G Chen, Z Zhao, F Song, S Chen, L Fan, F Wang, J Wang IEEE Transactions on Dependable and Secure Computing, 2022 | 27 | 2022 |
BDD4BNN: a BDD-based quantitative analysis framework for binarized neural networks Y Zhang, Z Zhao, G Chen, F Song, T Chen International Conference on Computer Aided Verification, 175-200, 2021 | 25 | 2021 |
AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems G Chen, Z Zhao, F Song, S Chen, L Fan, Y Liu IEEE Transactions on Dependable and Secure Computing, 2022 | 20 | 2022 |
QVIP: an ILP-based formal verification approach for quantized neural networks Y Zhang, Z Zhao, G Chen, F Song, M Zhang, T Chen, J Sun Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 14 | 2022 |
SEC4SR: a security analysis platform for speaker recognition G Chen, Z Zhao, F Song, S Chen, L Fan, Y Liu arXiv preprint arXiv:2109.01766, 2021 | 14 | 2021 |
QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems G Chen, Y Zhang, Z Zhao, F Song 32nd USENIX Security Symposium, 2437-2454, 2023 | 8 | 2023 |
CLEVEREST: accelerating CEGAR-based neural network verification via adversarial attacks Z Zhao, Y Zhang, G Chen, F Song, T Chen, J Liu International Static Analysis Symposium, 449-473, 2022 | 8 | 2022 |
Precise quantitative analysis of binarized neural networks: a BDD-based approach Y Zhang, Z Zhao, G Chen, F Song, T Chen ACM Transactions on Software Engineering and Methodology 32 (3), 1-51, 2023 | 4 | 2023 |
Adversarial attacks on ml defense models competition Y Dong, QA Fu, X Yang, W Xiang, T Pang, H Su, J Zhu, J Tang, Y Chen, ... arXiv preprint arXiv:2110.08042, 2021 | 2 | 2021 |
Attack as detection: Using adversarial attack methods to detect abnormal examples Z Zhao, G Chen, T Liu, T Li, F Song, J Wang, J Sun ACM Transactions on Software Engineering and Methodology 33 (3), 1-45, 2024 | 1 | 2024 |
Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise and Reconstruction T Liu, Y Zhang, Z Zhao, Y Dong, G Meng, K Chen arXiv preprint arXiv:2402.18104, 2024 | | 2024 |
Additional Reviewers ICECCS 2022 JP Bodeveix, C Cai, Z Cheng, N Chondamrongkul, N Dong, G Filippi, ... | | |
External Reviewers ICECCS 2020 JH Boockmann, GAA Prana, G Caltais, YS Chang, T Chen, Z Cheng, ... | | |
ICECCS 2019 L Bao, JP Bodeveix, JH Boockmann, J Brotherston, Q Chen, T Chen, ... | | |