Top-tier Conferences and Journal articles
-
[CCS’24] SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems
Oubo Ma, Yuwen Pu, doiang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, and Shouling JiACM Conference on Computer and Communications Security, ACM, Salt Lake City, USA, 2024.
[PDF]|[DOI] -
[ASE’24] Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection
Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo Lo, Lili Bo, Bin Li, Xiaolei Liu, Xingwei Lin, and Wei LiuIEEE/ACM International Conference on Automated Software Engineering, IEEE, California, USA, 2024.
[PDF]|[DOI]|[VIDEO]|[CODE] -
[TIFS’24] Unstoppable Attack: Label-Only Model Inversion via Conditional Diffusion Model
Rongke Liu, Dong Wang, Yizhi Ren, Kaitian Guo, Qianqian Qin, and Xiaolei LiuIEEE Transactions on Information Forensics and Security, 19 :3958–3973, 2024.
[PDF]|[DOI] -
[TIFS’24] Query-Efficient Model Inversion Attacks: An Information Flow View
Yixiao Xu, Binxing Fang, Mohan Li, Xiaolei Liu, and Zhihong TianIEEE Transactions on Information Forensics and Security, :1–1, 2024.
[DOI] -
[IEEE Network’24] An Adversarial Example Defense Algorithm for Intelligent Driving
Jiazhong Lu, Chenli Wang, Yuanyuan Huang, Kangyi Ding, and Xiaolei LiuIEEE Network, 2024.
[DOI] -
[IPM’21] Transaction-based classification and detection approach for Ethereum smart contract
Teng Hu, Xiaolei Liu, Ting Chen, Xiaosong Zhang, Xiaoming Huang, Weina Niu, Jiazhong Lu, Kun Zhou, and Yuan LiuInformation Processing & Management, 58(2) :102462, 2021.
[PDF]|[DOI] -
[TITS’21] Compiler-Based Efficient CNN Model Construction for 5G Edge Devices
Kun Wan, Xiaolei Liu, Jianyu Yu, Xiaosong Zhang, Xiaojiang Du, and Nadra GuizaniIEEE Transactions on Intelligent Transportation Systems, 2021.
[PDF]|[DOI] -
[KBS’21] A low-query black-box adversarial attack based on transferability
Kangyi Ding, Xiaolei Liu, Weina Niu, Teng Hu, Yanping Wang, and Xiaosong Zhang -
[AAAI’20] Weighted-sampling audio adversarial example attack
Xiaolei Liu, Kun Wan, Yufei Ding, Xiaosong Zhang, and Qingxin ZhuProceedings of the AAAI Conference on Artificial Intelligence, pp. 4908–4915 2020.
[PDF]|[DOI]|[WEBSITE]