Top-tier Conferences and Journal articles

    1. [CCS’24] SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems

      Oubo Ma, Yuwen Pu, Linkang Du, Yang Dai, Ruo Wang, Xiaolei Liu, Yingcai Wu, and Shouling Ji

      ACM Conference on Computer and Communications Security, ACM, Salt Lake City, USA, 2024.

    2. [TIFS’24] Unstoppable Attack: Label-Only Model Inversion via Conditional Diffusion Model

      Rongke Liu, Dong Wang, Yizhi Ren, Kaitian Guo, Qianqian Qin, and Xiaolei Liu

      IEEE Transactions on Information Forensics and Security, 19 :3958–3973, 2024.
      [Link]

    3. [IEEE Network’24] An Adversarial Example Defense Algorithm for Intelligent Driving

      Jiazhong Lu, Chenli Wang, Yuanyuan Huang, Kangyi Ding, and Xiaolei Liu

      IEEE Network, 2024.
      [Link]

    4. [IPM’21] Transaction-based classification and detection approach for Ethereum smart contract

      Teng Hu, Xiaolei Liu, Ting Chen, Xiaosong Zhang, Xiaoming Huang, Weina Niu, Jiazhong Lu, Kun Zhou, and Yuan Liu

      Information Processing & Management, 58(2) :102462, 2021.
      [Link]

    5. [ITS’21] Compiler-Based Efficient CNN Model Construction for 5G Edge Devices

      Kun Wan, Xiaolei Liu, Jianyu Yu, Xiaosong Zhang, Xiaojiang Du, and Nadra Guizani

      IEEE Transactions on Intelligent Transportation Systems, 2021.
      [Link]

    6. [KBS’21] A low-query black-box adversarial attack based on transferability

      Kangyi Ding, Xiaolei Liu, Weina Niu, Teng Hu, Yanping Wang, and Xiaosong Zhang

      Knowledge-Based Systems, 226 :107102, 2021.
      [Link]

    7. [AAAI’20] Weighted-sampling audio adversarial example attack

      Xiaolei Liu, Kun Wan, Yufei Ding, Xiaosong Zhang, and Qingxin Zhu

      Proceedings of the AAAI Conference on Artificial Intelligence, pp. 4908–4915 2020.
      [PDF] | [Link]

A complete list may be found at publications.