2024
-
[CCS’24] SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems
Oubo Ma, Yuwen Pu, doiang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, and Shouling JiACM Conference on Computer and Communications Security, ACM, Salt Lake City, USA, 2024.
[PDF]|[DOI] -
[ASE’24] Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection
Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo Lo, Lili Bo, Bin Li, Xiaolei Liu, Xingwei Lin, and Wei LiuIEEE/ACM International Conference on Automated Software Engineering, IEEE, California, USA, 2024.
[PDF]|[DOI]|[VIDEO]|[CODE] -
[TIFS’24] Unstoppable Attack: Label-Only Model Inversion via Conditional Diffusion Model
Rongke Liu, Dong Wang, Yizhi Ren, Kaitian Guo, Qianqian Qin, and Xiaolei LiuIEEE Transactions on Information Forensics and Security, 19 :3958–3973, 2024.
[PDF]|[DOI] -
[TIFS’24] Query-Efficient Model Inversion Attacks: An Information Flow View
Yixiao Xu, Binxing Fang, Mohan Li, Xiaolei Liu, and Zhihong TianIEEE Transactions on Information Forensics and Security, :1–1, 2024.
[DOI] -
[IEEE Network’24] An Adversarial Example Defense Algorithm for Intelligent Driving
Jiazhong Lu, Chenli Wang, Yuanyuan Huang, Kangyi Ding, and Xiaolei LiuIEEE Network, 2024.
[DOI] -
[TCSS’24] Backdoor Attack and Defense on Deep Learning: A Survey
Yang Bai, Gaojie Xing, Hongyan Wu, Zhihong Rao, Chuan Ma, Shiping Wang, Xiaolei Liu, Yimin Zhou, Jiajia Tang, Kaijun Huang, and Jiale KangIEEE Transactions on Computational Social Systems, 2024.
[DOI] -
[JCC’24] Attack Detection Model for BCoT based on Contrastive Variational Autoencoder and Metric Learning
Chunwang Wu, Xiaolei Liu, Kangyi Ding, Bangzhou Xin, Jiazhong Lu, Jiayong Liu, and Cheng Huang
2023
-
[ICASSP’23] Sparse Black-Box Inversion Attack with Limited Information
Yixiao Xu, Xiaolei Liu, Teng Hu, Bangzhou Xin, and Run YangICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1–5, IEEE, 2023.
[PDF]|[DOI] -
[J.Grid Comput.’23] Anti-attack Intrusion Detection Model based on MPNN and Traffic Spatiotemporal Characteristics
Jiazhong Lu, Jin Lan, Yuanyuan Huang, Maojia Song, and Xiaolei Liu -
[Appl.Sci.’23] A Robust Adversarial Example Attack Based on Video Augmentation
Mingyong Yin, Yixiao Xu, Teng Hu, and Xiaolei Liu
2022
-
[ICASSP’22] Sparse Adversarial Attack For Video Via Gradient-Based Keyframe Selection
Yixiao Xu, Xiaolei Liu, Mingyong Yin, Teng Hu, and Kangyi DingICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2874–2878, IEEE, 2022.
[PDF]|[DOI] -
[ICME’22] Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models
Kangyi Ding, Teng Hu, Xiaolei Liu, Weina Niu, Yanping Wang, and Xiaosong Zhang2022 IEEE International Conference on Multimedia and Expo (ICME), pp. 1–6, IEEE, 2022.
[PDF]|[DOI] -
[Sensors’22] IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
Yixiao Xu, Xiaolei Liu, Kangyi Ding, and Bangzhou Xin -
[Sensors’22] A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks
Kangyi Ding, Teng Hu, Weina Niu, Xiaolei Liu, Junpeng He, Mingyong Yin, and Xiaosong Zhang
2021
-
[TITS’21] Compiler-Based Efficient CNN Model Construction for 5G Edge Devices
Kun Wan, Xiaolei Liu, Jianyu Yu, Xiaosong Zhang, Xiaojiang Du, and Nadra GuizaniIEEE Transactions on Intelligent Transportation Systems, 2021.
[PDF]|[DOI] -
[NCA’21] Research on information steganography based on network data stream
Jiazhong Lu, Weisha Zhang, Ziye Deng, Shibin Zhang, Yan Chang, and Xiaolei LiuNeural Computing and Applications, 33 :851–866, 2021.
[DOI] -
[IPM’21] Transaction-based classification and detection approach for Ethereum smart contract
Teng Hu, Xiaolei Liu, Ting Chen, Xiaosong Zhang, Xiaoming Huang, Weina Niu, Jiazhong Lu, Kun Zhou, and Yuan LiuInformation Processing & Management, 58(2) :102462, 2021.
[PDF]|[DOI] -
[KBS’21] A low-query black-box adversarial attack based on transferability
Kangyi Ding, Xiaolei Liu, Weina Niu, Teng Hu, Yanping Wang, and Xiaosong Zhang -
[ICMLWS’21] Audio injection adversarial example attack
Xiaolei Liu, Xingshu Chen, Mingyong Yin, Yulong Wang, Teng Hu, and Kangyi DingICML 2021 Workshop on Adversarial Machine Learning 2021.
[PDF] -
[SCN’21] A Hybrid Association Rule-Based Method to Detect and Classify Botnets
Yuanyuan Huang, Lu Jiazhong, Haozhe Tang, and Xiaolei LiuSecurity and Communication Networks, 2021 :1–9, 2021.
[PDF]|[DOI] -
[SCN’21] HTTP-based APT malware infection detection using URL correlation analysis
Weina Niu, Jiao Xie, Xiaosong Zhang, Chong Wang, Xinqiang Li, Ruidong Chen, and Xiaolei LiuSecurity and Communication Networks, 2021 :1–12, 2021.
[PDF]|[DOI]
2020
-
[AAAI’20] Weighted-sampling audio adversarial example attack
Xiaolei Liu, Kun Wan, Yufei Ding, Xiaosong Zhang, and Qingxin ZhuProceedings of the AAAI Conference on Artificial Intelligence, pp. 4908–4915 2020.
[PDF]|[DOI]|[WEBSITE] -
[ACISP’20] A black-box attack on neural networks based on swarm evolutionary algorithm
Xiaolei Liu, Teng Hu, Kangyi Ding, Yang Bai, Weina Niu, and Jiazhong LuInformation Security and Privacy: 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30–December 2, 2020, Proceedings 25, pp. 268–284, Springer International Publishing, 2020.
[DOI] -
[Sensors’20] Tracking the insider attacker: A blockchain traceability system for insider threats
Teng Hu, Bangzhou Xin, Xiaolei Liu, Ting Chen, Kangyi Ding, and Xiaosong Zhang -
[SCN’20] Research and analysis of electromagnetic Trojan detection based on deep learning
Jiazhong Lu, Xiaolei Liu, Shibin Zhang, and Yan ChangSecurity and Communication Networks, 2020 :1–13, 2020.
[PDF]|[DOI]
2019
-
[Sensors’19] Adversarial Samples on Android Malware Detection Systems for IoT Systems
Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Hao Wang, and Mohsen Guizani -
[SCN’19] An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning
Teng Hu, Weina Niu, Xiaosong Zhang, Xiaolei Liu, Jiazhong Lu, and Yuan Liu -
[SCN’19] Integrating Traffics with Network Device Logs for Anomaly Detection
Jiazhong Lu, Fengmao Lv, Zhongliu Zhuo, Xiaosong Zhang, Xiaolei Liu, Teng Hu, and Wei Deng -
[CEE’19] Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment
Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, and Mohsen GuizaniComputers & Electrical Engineering, 80 :106493, 2019.
[DOI]
2018
-
[Sensors’18] TLTD: a testing framework for learning-based IoT traffic detection systems
Xiaolei Liu, Xiaosong Zhang, Nadra Guizani, Jiazhong Lu, Qingxin Zhu, and Xiaojiang Du -
[CSR’18] Adversarial Attacks Against Profile HMM Website Fingerprinting Detection Model
Xiaolei Liu, Zhongliu Zhuo, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, and Mohsen GuizaniCognitive Systems Research, 2018.
[DOI]