Cited By
View all- Chen HBabar M(2024)Security for Machine Learning-based Software Systems: A Survey of Threats, Practices, and ChallengesACM Computing Surveys10.1145/363853156:6(1-38)Online publication date: 23-Feb-2024
- Zhou MGao XWu JLiu KSun HLi LRoychoudhury APaiva AAbreu RStorey M(2024)Investigating White-Box Attacks for On-Device ModelsProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639144(1-12)Online publication date: 20-May-2024
- Ren PZuo CLiu XDiao WZhao QGuo SRoychoudhury APaiva AAbreu RStorey M(2024)DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile AppsProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3623325(1-13)Online publication date: 20-May-2024
- Show More Cited By