-
How to Trace Latent Generative Model Generated Images without Artificial Watermark?
Zhenting Wang, Vikash Sehwag, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma
International Conference on Machine Learning 2024 (ICML 2024)
Vienna, Austria, July 2024
-
Merlin: Multi-tier Optimization of eBPF Code for Performance and Compactness
Jinsong Mao, Hailun Ding, Juan Zhai, Shiqing Ma
ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2024)
San Diego, CA, April 2024
-
Towards General Robustness Verification of MaxPool-based Convolutional Neural Networks via Tightening Linear Approximation
Yuan Xiao, Shiqing Ma, Juan Zhai, Chunrong Fang, Jinyuan Jia, Zhenyu Chen
Conference on Computer Vision and Pattern Recognition (CVPR 2024)
Seattle, WA, June 2024
-
LOTUS: Evasive and Resilient Backdoor Attacks through Sub-Partitioningn
Siyuan Cheng, Guanhong Tao, Yingqi Liu, Guangyu Shen, Shengwei An, Shiwei Feng, Xiangzhe Xu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang.
Conference on Computer Vision and Pattern Recognition (CVPR 2024)
Seattle, WA, June 2024
-
DIAGNOSIS: Detecting Unauthorized Data Usage in Text-to-image Diffusion Models
Zhenting Wang, Chen Chen, Lingjuan Lyu, Dimitris N. Metaxas, Shiqing Ma
International Conference on Learning Representations (ICLR 2024)
Vienna, Austria, May 2024
-
COSTELLO: Contrastive Testing for Embedding-based Large Language Model as a Service Embeddings
Weipeng Jiang, Juan Zhai, Shiqing Ma,
Xiaoyu Zhang, Chao Shen
Foundations of Software Engineering (FSE 2024)
Porto de Galinhas, Brazil, July 2024
-
Finding Deviated Behaviors of the Compressed DNN Models for Image Classifications
Yongqiang Tian, Wuqi Zhang, Ming Wen, Shing-Chi Cheung, Chengnian Sun, Shiqing Ma, Yu Jiang
International conference on Software Engineering (ICSE 2024), Journal first
Lisbon, Portugal, April 2024
-
Elijah: Eliminating Backdoors Injected in Diffusion Models via Distribution Shift
Sengwei An, Sheng-Yen Chou, Kaiyuan Zhang, Qiuling Xu, Guanhong Tao, Guangyu Shen, Siyuan Cheng, Shiqing Ma, Pin-Yu Chen, Tsung-Yi Ho, Xiangyu Zhang
The AAAI Conference on Artificial Intelligence (AAAI 2024)
VANCOUVER, CANADA, February 2024
-
Exploring the Orthogonality and Linearity of Backdoor Attacks
Kaiyuan Zhang, Siyuan Cheng, Guangyu Shen, Guanhong Tao, Shengwei An, Anuran Makur, Shiqing Ma, Xiangyu Zhang
IEEE Symposiums on Security and Prifacy (S&P 2024)
San Francisco, CA, USA, May 2024
-
ODSCAN: Backdoor Scanning for Object Detection Models
Siyuan Cheng, Guangyu Shen, Guanhong Tao, Kaiyuan Zhang, Zhuo Zhang, Shengwei An, Xiangzhe Xu, Yingqi Liu, Shiqing Ma, Xiangyu Zhang.
IEEE Symposiums on Security and Privacy (S&P 2024)
San Francisco, CA, USA, May 2024
-
Distribution Preserving Backdoor Attack in Self-supervised Learning
Guanhong Tao*, Zhenting Wang*, Shiwei Feng, Guangyu Shen, Shiqing Ma, Xiangyu Zhang
Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P 2024)
San Francisco, CA, USA, May 2024
-
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering
Rui Zhu, Di Tang, Siyuan Tang, Zihao Wang, Guanhong Tao, Shiqing Ma, XiaoFeng Wang, Haixu Tang
Network and Distributed System Security 2024 (NDSS 2024)
San Diego, CA, USA, February 2024
-
Where Did I Come From? Origin Attribution of AI-Generated Images
Zhenting Wang, Chen Chen, Yi Zeng, Lingjuan Lyu, Shiqing Ma
Conference on Neural Information Processing Systems (NeurIPS 2023)
New Orleans, LA, Dec. 2023
-
Django: Detecting Trojans in Object Detection Models via Gaussian Focus Calibration
Guangyu Shen, Siyuan Cheng, Guanhong Tao, Kaiyuan Zhang, Yingqi Liu, Shengwei An, Shiqing Ma, Xiangyu Zhang
Conference on Neural Information Processing Systems (NeurIPS 2023)
New Orleans, LA, Dec. 2023
-
NOTABLE: Transferable Backdoor Attacks Against Prompt-based NLP Models
Kai Mei, Zheng Li, Zhenting Wang, Yang Zhang, Shiqing Ma
Annual Meeting of the Association for Computational Linguistics (ACL 23)
Toronto, Canada, July 2023
-
CILIATE: Towards Fairer Class-based Incremental Learning by Dataset and Training Refinement
Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Shiwei Wang
ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023)
Seattle, Washington, July 2023
-
ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes
Shengwei An, Yuan Yao, Qiuling Xu, Shiqing Ma, Guanhong Tao, Siyuan Cheng, Kaiyuan Zhang, Yingqi Liu, Guangyu Shen, Ian Kelk, Xiangyu Zhang
IEEE Symposiums on Security and Privacy (Oakland 2023)
San Francisco, CA, May 2023
-
Get Your Cyber-Physical Tests Done! Data-Driven Vulnerability Assessment of Robotic Vehicles
Aolin Ding, Matthew Chan, Amin Hassanzadeh, Nils Ole Tippenhauer, Shiqing Ma, Saman Zonouz
Annual IEEE/IFIP International Conference on Dependable Systems and Network (DSN 2023)
Porto, Portugal, June 2023
-
Detecting Backdoors in Pre-trained Encoders
Shiwei Feng, Guanhong Tao, Siyuan Cheng, Guangyu Shen, Xiangzhe Xu, Yingqi Liu, Kaiyuan Zhang, Shiqing Ma, Xiangyu Zhang
Conference on Computer Vision and Pattern Recognition (CVPR 2023)
Vancouver, BC, Canada, June 2023
-
The Case for Learned Provenance Graph Storage Systems
Hailun Ding, Juan Zhai, Dong Deng, Shiqing Ma
32nd USENIX Security Symposium (Security 2023)
ANAHEIM, CA, Aug. 2023
-
AirTag: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts
Hailun Ding, Juan Zhai, Yuhong Nan, Shiqing Ma
32nd USENIX Security Symposium (Security 2023)
ANAHEIM, CA, Aug. 2023
-
KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems
Xinghui Wu, Shiqing Ma, Chao Shen, Chenhao Lin, Qian Wang, Qi Li, Yuan Rao
32nd USENIX Security Symposium (Security 2023)
ANAHEIM, CA, Aug. 2023
-
UNICORN: A Unified Backdoor Trigger Inversion Framework
Zhenting Wang, Kai Mei, Juan Zhai, Shiqing Ma
In International Conference on Learning Representations (ICLR 2023) Spotlight
Kigali Rwanda, May 2023
-
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-yu Chen, Shiqing Ma, Xiangyu Zhang
In International Conference on Learning Representations (ICLR 2023)
Kigali Rwanda, May 2023
-
BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense
Siyuan Cheng, Guanhong Tao, Yingqi Liu, Shengwei An, Xiangzhe Xu, Shiwei Feng, Guangyu Shen, Kaiyuan Chen, Qiuling Xu, Shiqing Ma, Xiangyu Zhang
Network and Distributed System Security (NDSS 2023)
San Diego, CA, Feb. 2023
-
Finding Deviated Behaviors of the Compressed DNN Models for Image Classifications
Yongqiang Tian, Wuqi Zhang, Ming Wen, Shing-Chi Cheung, Chengnian Sun, Shiqing Ma, Yu Jiang
ACM Transactions on Software Engineering and Methodology (TOSEM 2023)
-
autoMPI: Automated Multiple Perspective Attack Investigation with Semantics Aware Execution Partitioning
Mohannad Alhanahnah, Shiqing Ma, Ashish Gehani, Gabriela Ciocarlie, Vinod Yegneswaran, Somesh Jha, Xiangyu Zhang
IEEE Transactions on Software Engineering (TSE 2022)
-
Rethinking the Reverse-engineering of Trojan Triggers
Zhenting Wang, Kai Mei, Hailun Ding, Juan Zhai, Shiqing Ma
Thirty-sixth Conference on Neural Information Processing Systems (NeurIPS 2022)
New Orleans, LA, Dec. 2022
-
Training with More Confidence: Mitigating Injected and Natural Backdoors During Training
Zhenting Wang, Hailun Ding, Juan Zhai, Shiqing Ma
Thirty-sixth Conference on Neural Information Processing Systems (NeurIPS 2022)
New Orleans, LA, Dec. 2022
-
Achieving Both Model Accuracy and Robustness by Adversarial Training with Batch Norm Shaping
Brian Zhang and Shiqing Ma
34th International Conference on Tool with Artificial Intelligence (ICTAI 2022)
Best Student Paper Recognition Award
Virtual, Oct. 2022
-
FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning
Kaiyuan Zhang, Guanhong Tao, Qiuling Xu, Siyuan Cheng, Shengwei An, Yingqi Liu, Shiwei Feng, Guangyu Shen, Pin-Yu Chen, Shiqing Ma, Xiangyu Zhang
ECCV 2022 Workshop on Adversarial Robustness in the Real World (AROW)
Best Paper Award
Virtual, Oct. 2022
-
TnT Attacks! Universal Naturalistic Adversarial Patches Against Deep Neural Network Systems
Bao Gia Doan, Minhui Xue, Shiqing Ma, Ehsan Abbasnejad, Damith C. Ranasinghe
IEEE Transactions on Information Forensics and Security (TIFS 2022)
-
Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense
Guangyu Shen, Yingqi Liu, Guanhong Tao, Xiuling Xu, Zhuo Zhang, Shengwei An, Shiqing Ma, Xiangyu Zhang
International Conference on Machine Learning 2022 (ICML 2022)
Baltimore, MD, July 2022
-
PICCOLO: Exposing Complex Backdoors in NLP Transformer Models
Yingqi Liu, Guangyu Shen, Guanhong Tao, Shengwei An, Shiqing Ma, Xiangyu Zhang
IEEE Symposiums on Security and Privacy (Oakland 2022)
San Francisco, CA, May 2022
-
Complex Backdoor Detection by Symmetric Feature Differencing
Yingqi Liu, Guangyu Shen, Guanhong Tao, Zhenting Wang, Shiqing Ma, Xiangyu Zhang
IEEE/CVF Conference on Computer Vision and Pattern Recognition 2022 (CVPR 2022)
New Orleans, LA, June 2022
-
Better Trigger Inversion Optimization in Backdoor Scanning
Guanhong Tao, Guangyu Shen, Yingqi Liu, Shengwei An, Qiuling Xu, Shiqing Ma, Pan Li, Xiangyu Zhang
IEEE/CVF Conference on Computer Vision and Pattern Recognition 2022 (CVPR 2022)
New Orleans, LA, June 2022
-
BppAttack: Stealthy and Efficient Trojan Attacks against Deep Neural Networks via Image Quantization and Contrastive Adversarial Learning
Zhenting Wang, Juan Zhai, Shiqing Ma
IEEE/CVF Conference on Computer Vision and Pattern Recognition 2022 (CVPR 2022)
New Orleans, LA, June 2022
-
Dynamic Backdoor Attacks Against Machine Learning Models
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang
7th IEEE European Symposium on Security and Privacy (EuroS&P 2022)
Genoa, Italy, June 2022
-
To What Extent Do DNN-based Image Classification Models Make Unreliable Inferences?
Yongqiang Tian, Shiqing Ma, Ming Wen, Yepang Liu, Shing-Chi Cheung, Xiangyu Zhang
Empirical Software Engineering (EMSE)
44th International Conference on Software Engineering (ICSE 2022), Journal First
Pittsburgh, PA, May 2022
-
FairNeuron: Improving Deep Neural Network Fairness with Adversary Games on Selective Neurons
Xuanqi Gao, Juan Zhai, Shiqing Ma, Chao Shen, Yufei Chen, Qian Wang
44th International Conference on Software Engineering (ICSE 2022)
Pittsburgh, PA, May 2022
-
BadNL: Backdoor Attacks against NLP Models with Semantic-preserving Improvements
Xiaoyi Chen, Ahmed Salem, Dingfan Chen, Michael Backes, Shiqing Ma, Qingni Shen, Zhonghai Wu, Yang Zhang
Annual Computer Security Applications Conference (ACSAC 2021)
Virtual, December 2021
-
SemFlow: Accurate Semantic Identification from Low-Level System Data
Mohammad Kavousi, Ruiqing Yang, Shiqing Ma, Yan Chen
EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2021)
Canterbury, Great Britain (online), September 2021
-
ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning
Hailun Ding, Shenao Yan, Juan Zhai, Shiqing Ma
USENIX Security Symposium 2021 (Security 2021)
VANCOUVER, B.C., CANADA, August 2021
-
ATLAS: A Sequence-based Learning Approach for Attack Investigation
Abdulellah Alsaheel, Yuhong Nan, Shiqing Ma, Le Yu, Gregory Walkup, Z. Berkay Celik, Xiangyu Zhang, Dongyan Xu
USENIX Security Symposium 2021 (Security 2021)
VANCOUVER, B.C., CANADA, August 2021
-
Backdoor Scanning for Deep Neural Networks through K-Arm Optimization
Guangyu Shen, Yingqi Liu, Guanhong Tao, Shengwei An, Qiuling Xu, Siyuan Cheng, Shiqing Ma, Xiangyu Zhang
International Conference on Machine Learning 2021 (ICML 2021)
VIRTUAL, July 2021
-
BadNL: Backdoor Attacks Against NLP Models
Xiaoyi Chen, Ahmed Salem, Michael Backes, Shiqing Ma, Yang Zhang
AML Workshop, co-located with ICML 2021
VIRTUAL, July 2021
-
FIRM: Detecting Adversarial Audios by Recursive Filters with Randomization
Guanhong Tao, Xiaowei Chen, Yunhan Jia, Zhenyu Zhong, Shiqing Ma, Xiangyu Zhang
ICLR 2021 Security and Safety in Machine Learning Systems Workshop (ICLR 2021 Workshop)
VIRTUAL, May 2021
-
AutoTrainer: An Automatic DNN Training Problem Detection and Repair System
Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Chao Shen
Proceedings of the 43rd International Conference on Software Engineering (ICSE 2021)
Madrid, Spain, May 2021
-
Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification
Siyuan Cheng, Yingqi Liu, Shiqing Ma, Xiangyu Zhang
The AAAI Conference on Artificial Intelligence (AAAI 2021)
Virtual, February 2021
-
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation
Le Yu, Shiqing Ma, Zhuo Zhang, Guanhong Tao, Xiangyu Zhang, Dongyan Xu, Vincent E. Urias, Han Wei Lin, Gabriela Ciocarlie, Vinod Yegneswaran, Ashish Gehani
Processdings of the 28th Network and Distributed System Security Symposium (NDSS 2021)
Virtual, February 2021
-
FineLock: Automatically Refactoring Coarse-grained Locks into Fine-grained Locks
Yang Zhang, Shuai Shao, Juan Zhai and Shiqing Ma
ISSTA Tool Demo 2020, LA, CA, July 2020
-
Dynamic Backdoor Attacks Against Machine Learning Models
Ahmed Salem, Rui Wen, Michael Backes, Shiqing Ma, Yang Zhang
CV-COPS 2020, SEC, Glasgow, August, 2020
-
C2S: Translating Natural Language Comments to Formal Program Specifications
Juan Zhai,
Yu Shi,
Minxue Pan,
Guian Zhou,
Yongxiang Liu,
Chunrong Fang,
Shiqing Ma,
Lin Tan,
Xiangyu Zhang
Proceedings of the 2020 ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2020)
Sacramento, CA, Nov 2020
-
Correlations Between Deep Neural Network Model Coverage
Criteria and Model Quality
Shenao Yan,
Guanhong Tao,
Xuwei Liu,
Juan Zhai,
Shiqing Ma,
Lei Xu,
Xiangyu Zhang
Proceedings of the 2020 ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE 2020)
Sacramento, CA, Nov 2020
-
UISCOPE: Accurate, Instrumentation-free and Visible Attack Investigation for GUI Applications
Runqing Yang,
Shiqing Ma,
Haitao Xu,
Xiangyu Zhang,
Yan Chen
Proceedings of the 27th Network and DIstributed System Security Symposium (NDSS 2020)
San Diego, CA, February 2020
-
TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural Networks
Guanhong Tao,
Shiqing Ma,
Yingqi Liu,
Qiuling Xu,
Xiangyu Zhang
Proceedings of the 42nd International Conference on Software Engineering (ICSE 2020)
Seoul, South Korea, May 2020
-
CPC: Automatically Classifying and Propagating Natural Language Comments via Program Analysis
Juan Zhai,
Xiangzhe Xu,
Yu Shi,
Guanhong Tao,
Minxue Pan,
Shiqing Ma,
Lei Xu,
Weifeng Zhang,
Lin Tan,
Xiangyu Zhang
Proceedings of the 42nd International Conference on Software Engineering (ICSE 2020)
Seoul, South Korea, May 2020
-
ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation
Yingqi Liu,
Wen-Chuan Lee,
Guanhong Tao,
Shiqing Ma,
Yousra Aafer,
Xiangyu Zhang
Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS 2019)
London, UK, Nov 2019
-
Testing Deep Learning Models for Image Analysis Using Object-Relevant Metamorphic Relations
Yongqiang Tian,
Shiqing Ma,
Ming Wen,
Yepang Liu,
Shing-Chi Cheung,
Xiangyu Zhang
Preprint, arXiv
-
Programming Support for Autonomizing Software
Wen-Chuan Lee,
Peng Liu,
Yingqi Liu,
Shiqing Ma,
Xiangyu Zhang
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2019)
Phoenix, Arizona, June 2019
-
SLF: Fuzzing without Valid Seed Inputs
Wei You,
Xuwei Liu,
Shiqing Ma,
David Perry,
Xiangyu Zhang,
Bin Liang
Proceedings of the 41st ACM/IEEE International Conference on Software Engineering (ICSE 2019)
Montréal, QC, Canada, May 2019
-
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery
Wei You,
Xueqiang Wang,
Shiqing Ma,
Jianjun Huang,
Xiangyu Zhang,
XiaoFeng Wang,
Bin Liang
CSAW 2019 Best Applied Security Paper Award TOP-10 Finalists
Proceedings of the 40th IEEE Symposiums on Security and Privacy (Oakland 2019)
San Francisco, CA, May 2019
-
NIC: Detecting Adversarial Samples with Neural Network Invariant Checking
Shiqing Ma,
Yingqi Liu,
Guanhong Tao,
Wen-Chuan Lee,
Xiangyu Zhang
Proceedings of the 26th Network and Distributed System Security Symposium (NDSS 2019)
San Diego, CA, February 2019
-
White-Box Program Tuning
Wen-Chuan Lee,
Yingqi Liu,
Peng Liu,
Shiqing Ma,
Hongjun Choi,
Xiangyu Zhang,
Rajiv Gupta
Proceedings of the International Symposium on Code Generation and Optimization 2019 (CGO 2019)
Washington DC, February 2019
-
Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples
Guanhong Tao,
Shiqing Ma,
Yingqi Liu,
Xiangyu Zhang
Proceedings of Neural Information Processing Systems 2018 (NeurIPS 2018 Spotlight)
Palais des Congrès de Montréal, Montréal, Canada, December 2018
-
LROV: Practical Library-aware Provenance Tracing
Fei Wang,
Yonghwi Kwon,
Shiqing Ma,
Xiangyu Zhang,
Dongyan Xu
Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC 2018)
San Juan, Puerto Rico, USA, December 2018
-
Dual-Force: Understanding WebView Malware via Cross-language Forced Execution
Zhenhao Tang,
Juan Zhai,
Minxue Pan,
Yousra Aafer,
Shiqing Ma,
Xiangyu Zhang,
Jianhua Zhao
Proceedings of the 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2018)
Montpellier, France, September 2018
-
MODE: Automated Neural Network Model Debugging via State Differential Analysis and Input Selection
Shiqing Ma,
Yingqi Liu,
Wen-Chuan Lee,
Xiangyu Zhang,
Ananth Grama
Proceedings of the ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engneering (ESEC/FSE 2018)
Lake Buena Vista, FL, November 2018
-
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
Shiqing Ma,
Juan Zhai,
Yonghwi Kwon,
Kyu Hyung Lee,
Xiangyu Zhang,
Gabriela Ciocarlie,
Ashish Gehani,
Vinod Yegneswaran,
Dongyan Xu,
Somesh Jha
Proceedings of the 2018 USENIX Annual Technical Conference (ATC 2018)
Boston, MA, July 2018
-
Debugging with Intelligence via Probabilistic Inference
Zhaogui Xu,
Shiqing Ma,
Xiangyu Zhang,
Shuofei Zhu,
Baowen Xu
Proceedings of the 40th International Conference on Software Engineering (ICSE 2018)
Gothenburg, Sweden, May 2018
-
Trojaning Attack on Neural Networks
Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, Xiangyu Zhang
Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018)
San Diego, CA, February 2018
-
MCI: Modeling-Based Causality Inference in Audit Logging for Attach Investigation
Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran
Proceedings of the 25th Network and Distributed System Security Symposium (NDSS 2018)
San Diego, CA, February 2018
-
HProve: A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware
(short)
Chonghua Wang, Shiqing Ma,
Xiangyu Zhang,
Junghwan Rhee,
Xiaochun Yun, Zhiyu Hao
Proceedings of the 13th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2017)
Niagara Falls, Canada, October, 2017
-
LAMP: Data Provenance for Graph Based Machine Learning Algorithms Through Derivative Computation
Shiqing Ma, Yousra Aafer, Zhaogui Xu, Wen-Chuan Lee, Juan Zhai, Yingqi Liu,
Xiangyu Zhang
Proceedings of the 11th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2017)
Paderborn, Germany, September 2017
-
MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning
Shiqing Ma, Juan Zhai, Fei Wang,
Kyu Hyung Lee,
Xiangyu Zhang,
Dongyan Xu
Distinguished Paper Award
Proceedings of the 26th USENIX Security Symposium (Security 2017)
Vancouver, BC, Canada, August 2017
-
HERCULE: Attack Story Reconstruction via Community Discovery on Correlated Log Graph
Kexin Pei,
Zhongshu Gu,
Brendan Saltaformaggio,
Shiqing Ma, Fei Wang, Zhiwei Zhang,
Luo Si,
Xiangyu Zhang,
Dongyan Xu
Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC 2016)
Los Angeles, CA, December 2016
-
Automatic Model Generation from Documentation for Java API Function
Juan Zhai,
Jianjun Huang,
Shiqing Ma,
Xiangyu Zhang,
Lin Tan,
Jianhua Zhao,
Feng Qin
Proceedings of the 38th International Conference on Software Engineering (ICSE 2016)
Austin, TX, May 2016
-
ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting
Shiqing Ma,
Xiangyu Zhang,
Dongyan Xu
Distinguished Paper Award
Proceedings of the 23rd Network and Distributed System Security Symposium (NDSS 2016)
San Diego, CA, February 2016
-
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
Shiqing Ma,
Kyu Hyung Lee,
Chung Hwan Kim,
Junghwan Rhee,
Xiangyu Zhang,
Dongyan Xu
Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC 2015)
Los Angeles, CA, December 2015
-
COLO: COarse-grained LOck-stepping Virtual Machines for Non-stop Service
Yaozu Dong, Wei Ye, Yunhong Jiang, Ian Pratt, Shiqing Ma, Jian Li, Haibing Guan.
Proceedings of the 2013 ACM Symposium on Cloud Computing (SoCC 2013)
Santa Clara, CA, October 2013
-
Log-centric analytics for advanced persistent threat detection
Shiqing Ma, Xiangyu Zhang, Dongyan Xu
Proceedings of the 15th Annual Information Security Symposium (CERIAS 2014)
West Lafayette, IN, March 2014
-
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows
Shiqing Ma,
Kyu Hyung Lee,
Chung Hwan Kim,
Junghwan Rhee,
Xiangyu Zhang,
Dongyan Xu
The Midwest PL Summit (MWPLS 2015)
West Lafayette, IN, December 2015
-
Li, S., Ma, S., Xue, M., Zhao, B.Z.H. (2022). Deep Learning Backdoors. In: Batina, L., Bäck, T., Buhan, I., Picek, S. (eds) Security and Artificial Intelligence. Lecture Notes in Computer Science, vol 13049. Springer, Cham. https://doi.org/10.1007/978-3-030-98795-4_13