default search action
Xueluan Gong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Xueluan Gong, Yanjiao Chen, Huayang Huang, Weihan Kong, Ziyao Wang, Chao Shen, Qian Wang:
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework. IEEE Trans. Dependable Secur. Comput. 21(4): 1605-1620 (2024) - [j18]Xueluan Gong, Zheng Fang, Bowen Li, Tao Wang, Yanjiao Chen, Qian Wang:
Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models. IEEE Trans. Dependable Secur. Comput. 21(4): 2672-2685 (2024) - [j17]Yinghua Gao, Yiming Li, Xueluan Gong, Zhifeng Li, Shu-Tao Xia, Qian Wang:
Backdoor Attack With Sparse and Invisible Trigger. IEEE Trans. Inf. Forensics Secur. 19: 6364-6376 (2024) - [i4]Duanyi Yao, Songze Li, Xueluan Gong, Sizai Hou, Gaoning Pan:
Leveraging Label Information for Stealthy Data Stealing in Vertical Federated Learning. CoRR abs/2404.19582 (2024) - [i3]Xueluan Gong, Mingzhe Li, Yilin Zhang, Fengyuan Ran, Chen Chen, Yanjiao Chen, Qian Wang, Kwok-Yan Lam:
Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs. CoRR abs/2409.14866 (2024) - 2023
- [j16]Meng Xue, Kuang Peng, Xueluan Gong, Qian Zhang, Yanjiao Chen, Routing Li:
Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(3): 137:1-137:24 (2023) - [j15]Meng Xue, Yanjiao Chen, Xueluan Gong, Houze Cao, Jian Zhang, Qian Zhang:
Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges. IEEE Netw. 37(1): 88-94 (2023) - [j14]Yanjiao Chen, Zhicong Zheng, Xueluan Gong:
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 4188-4198 (2023) - [j13]Xueluan Gong, Ziyao Wang, Yanjiao Chen, Meng Xue, Qian Wang, Chao Shen:
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters. IEEE Trans. Dependable Secur. Comput. 20(6): 4993-5004 (2023) - [j12]Xueluan Gong, Ziyao Wang, Shuaike Li, Yanjiao Chen, Qian Wang:
A GAN-Based Defense Framework Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 18: 4475-4487 (2023) - [j11]Yanjiao Chen, Xiaotian Zhu, Xueluan Gong, Xinjing Yi, Shuyang Li:
Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions. IEEE Trans. Ind. Informatics 19(1): 20-28 (2023) - [j10]Xueluan Gong, Yanjiao Chen, Wenbin Yang, Huayang Huang, Qian Wang:
B3: Backdoor Attacks against Black-box Machine Learning Models. ACM Trans. Priv. Secur. 26(4): 43:1-43:24 (2023) - [j9]Xueluan Gong, Yanjiao Chen, Qian Wang, Weihan Kong:
Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions. IEEE Wirel. Commun. 30(2): 114-121 (2023) - [c7]Huayang Huang, Qian Wang, Xueluan Gong, Tao Wang:
Orion: Online Backdoor Sample Detection via Evolution Deviance. IJCAI 2023: 864-874 - [c6]Yanjiao Chen, Rui Guan, Xueluan Gong, Jianshuo Dong, Meng Xue:
D-DAE: Defense-Penetrating Model Extraction Attacks. SP 2023: 382-399 - [c5]Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. SP 2023: 755-772 - [c4]Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. USENIX Security Symposium 2023: 5163-5180 - [c3]Xueluan Gong, Ziyao Wang, Yanjiao Chen, Qian Wang, Cong Wang, Chao Shen:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - [i2]Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. CoRR abs/2302.12434 (2023) - [i1]Yinghua Gao, Yiming Li, Xueluan Gong, Shu-Tao Xia, Qian Wang:
Backdoor Attack with Sparse and Invisible Trigger. CoRR abs/2306.06209 (2023) - 2022
- [j8]Xueluan Gong, Yanjiao Chen, Qian Wang, Meng Wang, Shuyang Li:
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions. IEEE Commun. Mag. 60(9): 46-52 (2022) - [j7]Meng Xue, Yanjiao Chen, Xueluan Gong, Jian Zhang, Chunkai Fan:
Wet-Ra: Monitoring Diapers Wetness with Wireless Signals. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 84:1-84:26 (2022) - [j6]Xueluan Gong, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, Qian Wang:
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers. IEEE Netw. 36(1): 84-90 (2022) - [j5]Yanjiao Chen, Yuyang Ran, Jingyue Zhou, Jian Zhang, Xueluan Gong:
MPCN-RP: A Routing Protocol for Blockchain-Based Multi-Charge Payment Channel Networks. IEEE Trans. Netw. Serv. Manag. 19(2): 1229-1242 (2022) - [c2]Xueluan Gong, Yanjiao Chen, Jianshuo Dong, Qian Wang:
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks. NDSS 2022 - 2021
- [j4]Xueluan Gong, Yanjiao Chen, Qian Wang, Huayang Huang, Lingshuo Meng, Chao Shen, Qian Zhang:
Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment. IEEE J. Sel. Areas Commun. 39(8): 2617-2631 (2021) - [c1]Xueluan Gong, Yanjiao Chen, Wenbin Yang, Guanghao Mei, Qian Wang:
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion. IJCAI 2021: 2439-2447 - 2020
- [j3]Xueluan Gong, Qian Wang, Yanjiao Chen, Wang Yang, Xinchang Jiang:
Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models. IEEE Commun. Mag. 58(12): 83-89 (2020) - [j2]Yanjiao Chen, Xueluan Gong, Runmin Ou, Lingjie Duan, Qian Zhang:
Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT. IEEE Internet Things J. 7(6): 5599-5612 (2020) - [j1]Yanjiao Chen, Xueluan Gong, Qian Wang, Xing Di, Huayang Huang:
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments. IEEE Netw. 34(5): 141-147 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint